Verizon's 17th annual 2024 Data Breach Investigations Report highlights a troubling trend: The exploitation of vulnerabilities in the wild has tripled, primarily due to ransomware actors targeting zero-day vulnerabilities, such as the MOVEit flaw that triggered numerous data theft incidents.
How do data breaches happen? The latest annual Verizon Data Breach Investigations Report, which aims to help defenders answer that question, points in part to the ever-present threat of ransomware and data extortion and charts a surge in attackers exploiting zero-day and known vulnerabilities.
Deciding to pay cybercriminals a ransom in the attack on Change Healthcare was one of the most difficult choices UnitedHealth Group CEO Andrew Witty ever faced, according to written testimony ahead of two congressional hearings this week on the disruptive Change Healthcare mega-hack.
Twenty-two state attorneys general and some industry groups are urging Change Healthcare's parent company and regulators to be transparent and give more financial aid to providers as the firm recovers from a highly disruptive cyberattack and the industry braces for massive breach notifications.
UnitedHealth Group's admission that information for "a substantial portion" of the American population was compromised in its Change Healthcare cyberattack sets into motion the likelihood the incident will become the largest health data breach ever reported in U.S. What other details are emerging?
The Department of Health and Human Services has not yet received HIPAA breach reports from Change Healthcare or parent company UnitedHealth Group about their massive cyberattack. HHS is telling HIPAA-covered firms and their vendors to do their duty if a breach affects protected health information.
According to recent research, 31% of security leaders believe they have no cyber experience on their board.
Join us to explore effective strategies for bridging the communication gap between cybersecurity executives and corporate boards. Gain critical insights and strategies to enhance cybersecurity governance and...
What specific challenges are you encountering when trying to convey complex cybersecurity issues to your board and investors?
Join us to explore effective strategies for bridging this communication gap between cybersecurity executives and corporate boards/investors. Gain critical insights and strategies to enhance...
The aftershocks of the Change Healthcare cyberattack are still reverberating through the healthcare sector nearly 60 days into the recovery process. But on Tuesday, members of Congress and industry experts grappled with how to avoid a future replay - minus a key witness: UnitedHealth Group.
Cybersecurity experts are sounding the alarm over a rise in supply chain attacks targeting the interconnected systems of global corporate giants after the top U.S. cyber agency urged Sisense customers to reset their credentials following an apparent hack.
A global law firm that provides data breach legal services has agreed to an $8 million settlement to resolve a proposed class action lawsuit filed against the firm in the aftermath of its cyberattack last year, which affected some health sector clients and nearly 638,000 individuals.
In the latest weekly update, four ISMG editors discussed the unending twists and turns in the Change Healthcare cyberattack, positive signs of economic recovery in the cybersecurity tech market, and how artificial intelligence is shaking up supply chain security.
A Wisconsin nonprofit managed care organization is notifying nearly 534,000 individuals that their protected health information was copied and stolen in a recent attack by a "foreign ransomware gang" that also attempted - but failed - to encrypt the group's IT systems.
To prepare for compliance with the EU's Digital Operations Resilience Act (DORA), organizations must assess its impact on their supplier ecosystem and understand regulatory expectations by the 2025 deadline. This white paper offers insights into DORA's ICT-related regulations, implications for Third-Party Risk...
Organizations face a growing challenge in managing third-party risks due to the expanding number of relationships and limited resources. Traditional risk management practices are struggling to keep up, leaving organizations vulnerable to unassessed risks. A comprehensive solution incorporating advanced automation and...
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.