A Seattle, Washington-based community health center operator is facing a class action lawsuit in the aftermath of a data exfiltration incident reported last year as affecting more than 650,000 individuals. The breach also involved data allegedly found posted for sale on the Marketo data leak site.
On Feb. 13, Adobe patched a critical vulnerability that affected its Commerce and Magento platforms, which customers use to manage their businesses' e-commerce. But a proof-of-concept exploit for the latest patch has resulted in yet another out-of-band patch update from Adobe for CVE-2022-24087.
In 2021, there was a spike in cybercrime, and the focus changed for threat actors from several countries, particularly Russia and China. Cybersecurity firm CrowdStrike provides an overview of the changes, analyzes the takedown of Russian threat actor REvil and adds to its list of adversaries.
Until recently, enterprise operational technology (OT) environments have been air-gapped from organizations’ information technology (IT) environments and connections to the internet. As such, OT has long been immune to a great extent from cyber threats, and therefore, cyber defense has not been a priority until...
This use case highlights the benefits of the Claroty platform for IT SOC and OT personnel. The Claroty Platform is a complete industrial cybersecurity solution powered by our Continuous Threat Detection (CTD) and Secure Remote Access (SRA) solutions. The platform provides a full range of industrial cybersecurity...
Employees with too much access can pose an insider threat. When employees have access to more than they need to do their job, there are more opportunities for mistakes, whether accidental or not. Lack of accountability means you
don’t know who did what, when. If too many people have the same level of access and...
Malware operators are increasingly targeting ONG and related energy industries to further political, economic, and national security goals. Their activity threatens the availability of industrial technologies and safety of those operating them. Industrial asset owners and operators can defend against these threat...
This independent, global survey of 1,100 information technology (IT) and operational technology (OT) security professionals who work full time for enterprises that own, operate, or otherwise support components of critical infrastructure, explores how they have dealt with the significant challenges in 2021, their...
Chip manufacturer Intel has released 22 security advisories, including seven with a high severity rating that let a privileged user enable local access to targeted devices.
Healthcare entities should implement a "proactive preparedness" approach for protecting their electronic health record systems, which are an increasingly attractive target for cyberattacks and other breaches, federal authorities warn.
Cisco's Email Security Appliance is affected by a high-rated vulnerability that can allow an unauthenticated remote attacker to launch a denial-of-service attack, the company says. The company and CISA advise that affected software be updated at the earliest.
Botnet attacks have affected multiple organizations recently, resulting in web scraping as well as theft of financial information. They include a massive bot attack to scrape data from a job listing site and a TrickBot malware attack targeting 60 high-profile companies.
In this CyberEdBoard Expert Insights interview, Agnidipta Sarkar, group CISO of Biocon Group, says organizations and CISOs are still missing the boat when it comes to treating cybersecurity as a business issue, but leaders can learn to think differently to protect against today's cyber incidents.
Are data breaches getting worse? So far for 2021, the number of records that were reportedly exposed declined slightly, while the total number of reported data breaches increased both in the U.S. and globally.
In the latest weekly update, four ISMG editors discuss how ransomware attacks got worse in 2021, the backlash from privacy experts sparked by the IRS' decision - now changed - to use facial recognition technology on American taxpayers, and why cybersecurity fosters competitive advantage.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.com, you agree to our use of cookies.