Loading...
News2019-09-17T17:24:23-05:00

81% of UK Healthcare Organizations Hit by Ransomware in Last Year

From: Infosecurity Magazine -

81% of UK Healthcare Organizations Hit by Ransomware in Last Year

More than four-fifths (81%) of UK healthcare organizations suffered a ransomware attack in the last year, according to a new study by Obrela Security Industries.

The survey of 100 cybersecurity managers in the health sector found that 38% of UK healthcare organizations have elected to pay a ransom demand to get their files back. However, 44% revealed they had refused to pay a demand but

... Keep reading this article at Infosecurity Magazine

Twitter Pulls Account After Argentinian Mega Breach Claims

From: Infosecurity Magazine -

Twitter Pulls Account After Argentinian Mega Breach Claims

Twitter has suspended the account of an individual who claims to have obtained an ID card database covering the entire population of Argentina.

The hacker behind @aniballeaks claimed to have infiltrated the government’s Registro Nacional de las Personas, or Renaper registry, last month and took to the social media site to publish personal details on over 40 Argentinian celebrities including Lionel Messi.

According to Recorded Future, the individual

... Keep reading this article at Infosecurity Magazine

Microsoft, Intel and Goldman Sachs Team Up For New Supply Chain Security Initiative

From: Infosecurity Magazine -

Microsoft, Intel and Goldman Sachs Team Up For New Supply Chain Security Initiative

Microsoft has teamed up with Intel and Goldman Sachs to push for hardware security improvements that could help to mitigate supply chain risks.

Working under the auspices of the non-profit Trusted Computing Group (TCG), the companies have created a new Supply Chain Security work group which will aim to bring in experts from across the tech sphere.

The TCG argued that malicious and counterfeit hardware is

... Keep reading this article at Infosecurity Magazine

LightBasin Operation Compromises 13 Global Telcos in Two Years

From: Infosecurity Magazine -

LightBasin Operation Compromises 13 Global Telcos in Two Years

Researchers have uncovered a “highly sophisticated” two-year espionage campaign against global telcos that has already compromised 13 organizations.

Dubbed “LightBasin” by CrowdStrike, the group UNC1945 was actually uncovered by Mandiant in November last year. At that time, its targets were MSPs and their customers in finance and consulting.

According to CrowdStrike, LightBasin has been active since at least 2016, but the current campaign dates back to 2019.

... Keep reading this article at Infosecurity Magazine

Apple iCloud Hacker Steals Nudes

From: Infosecurity Magazine -

Apple iCloud Hacker Steals Nudes

A 40-year-old man from California has admitted his role in a conspiracy to break into the private digital photo libraries of Apple customers to locate and steal sexually explicit images.

Hao Kuo Chi, a resident of the city of La Puenta in Los Angeles County, pleaded guilty to charges of computer fraud and conspiracy on Friday, October 15. 

According to documents submitted to a court in Tampa, Florida, Chi conspired with

... Keep reading this article at Infosecurity Magazine

Prison for UPMC Data Thief

From: Infosecurity Magazine -

Prison for UPMC Data Thief

A hacker from Michigan who stole and sold the sensitive data of tens of thousands of University of Pittsburgh Medical Center (UPMC) employees has been sent to prison. 

Former Federal Emergency Management Agency (FEMA) IT specialist Justin Sean Johnson pleaded guilty on May 20 to counts 1 and 39 of a 43-count indictment.

The court heard that the 30-year-old former resident of Detroit admitted infiltrating and hacking into the UPMC's human

... Keep reading this article at Infosecurity Magazine

Data Breach Hits US Dental Patients

From: Infosecurity Magazine -

Data Breach Hits US Dental Patients

A cyber-attack on the vendor of a network of dental practices may have exposed the data of tens of thousands of patients. 

A cyber-criminal used a phishing attack to gain access to the computer systems of North American Dental Management between March 31 and April 1, 2021. Pittsburgh-based North American Dental Management provides administrative and technology support services for Professional Dental Alliance (PDA) offices.

Following the security breach, PDA notified

... Keep reading this article at Infosecurity Magazine

83% of Ransomware Victims Pay the Demand

From: Infosecurity Magazine -

83% of Ransomware Victims Pay the Demand

More than four in five (83%) ransomware victims in the last 12 months felt they had no option but to pay the extortion demand to restore their data, according to a new report by ThycoticCentrify.

The study, which was based on a survey of 300 US IT business decision-makers, also found that close to two-thirds (64%) of companies were victims of ransomware attacks in the last 12 months.

... Keep reading this article at Infosecurity Magazine

Shared Responsibility Key to Protecting Critical Infrastructure

From: Infosecurity Magazine -

Shared Responsibility Key to Protecting Critical Infrastructure

Protecting critical infrastructure from cyber-attacks requires adopting a shared responsibility model between vendors, network operators and governments, according to a panel speaking during a recent FT webinar.

The panel, moderated by Alex Irwin-Hunt, global markets editor of fDi Intelligence at FT Group, agreed that a range of parties has different responsibilities in ensuring the integrity of software and hardware products. The process begins with manufacturers “making sure that their

... Keep reading this article at Infosecurity Magazine

US Authorities Issue BlackMatter Ransomware Alert

From: Infosecurity Magazine -

US Authorities Issue BlackMatter Ransomware Alert

The US authorities have released more details on emerging ransomware group BlackMatter, which it says has already targeted multiple critical infrastructure providers in the country.

The alert comes from the Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the National Security Agency (NSA).

The ransomware-as-a-service (RaaS) operation appeared in July. It has been suggested that it may have links to the DarkSide group that came under pressure from Washington

... Keep reading this article at Infosecurity Magazine
  • UiPath partners with CrowdStrike to secure SaaS workflow automation
    UiPath is expanding its robotic process automation (RPA) platform with new features it hopes will put it on CIOs’ radar, including better security, a cloud-native delivery model, and the ability to automate through APIs as well as the UI.The security component comes through a partnership with CrowdStrike, while the API automation is the fruit of […]
  • What is AIOps? Injecting intelligence into IT operations
    Cloud platforms, managed service providers, and organizations undertaking digital transformations are beginning to reap the benefits of an emerging IT trend: the use of AI-powered IT operations technology to monitor and manage the IT portfolio automatically.This emerging practice, known as AIOps, is helping enterprises head off potential outages and performance issues before they negatively impact […]
  • 4 reasons to prioritize developers' infrastructure needs
    As companies make digital transformation both an immediate priority and an ongoing process for the future, I see a worrying trend in many organizations.While organizations commit resources and priorities to delivering the best digital experience to both internal and external customers through their production infrastructures, they may not extend the same attention and support to […]

DEFCON HACKING CONFERENCE 2020

CYBER SECURITY IN THE NEW AGE

Originally started in 1993, it was a meant to be a party for member of “Platinum Net”, a Fido protocol based hacking network out of Canada. As the main U.S. hub I was helping the Platinum Net organizer (I forget his name) plan a closing party for all the member BBS systems and their users. He was going to shut down the network when his dad took a new job and had to move away. We talking about where we might hold it, when all of a sudden he left early and disappeared. I was just planning a party for a network that was shut down, except for my U.S. nodes. I decided what the hell, I’ll invite the members of all the other networks my BBS (A Dark Tangent System) system was a part of including Cyber Crime International (CCI), Hit Net, Tired of Protection (ToP), and like 8 others I can’t remember. Why not invite everyone on #hack? Good idea!.

Take The First Step.

PROTECT YOUR CITIZENS, CLIENTS, CUSTOMERS AND EMPLOYEES
Contact Us

What We Do:

Government Cyber provides state-of-the-art, military grade cyber security solutions for municipal, state and federal government agencies as well as corporate clients.

Security Solutions For:

News

Contact Us