COO Charged in Georgia Hospital Cyber-attack

COO Charged in Georgia Hospital Cyber-attack

The chief operating officer of an IoT security company has been indicted by a federal grand jury over a cyber-attack carried out on a hospital in Georgia.  Vikas Singla, of Marietta, Georgia, was arraigned on Thursday for his alleged role in the 2018 attack on Gwinnett Medical Center that exposed patients’ personal data.  The center, which is now known as Northside Hospital, was a not-for-profit health care network that provided health care services at two hospitals located in Georgia;…

Read More

US Launches National AI Task Force

US Launches National AI Task Force

The Biden administration has launched a new national artificial intelligence task force to make more government data available to AI researchers. News of the National Artificial Intelligence (AI) Research Resource Task Force was announced on Thursday by the White House Office of Science and Technology Policy (OSTP) and the National Science Foundation (NSF). A key role of the task force will be to serve as a federal advisory committee, assisting the creation and implementation of a blueprint…

Read More

Fallout of EA source code breach could be severe, cybersecurity experts say

Fallout of EA source code breach could be severe, cybersecurity experts say

Potential buyers could be interested in using the source code to game the game to make millions, perhaps sounding EA’s death knell in the process. Image: ValeryBrozhinsky, Getty Images/iStockphoto The news that games giant Electronic Arts was hacked and the source code and software development kits to many popular games like FIFA 21 and 22 as well as the source code to Frostbite, the games engine that powers many of popular titles such as Madden,…

Read More

McDonald’s Suffers Data Breach

McDonald’s Suffers Data Breach

A data breach at fast food restaurant McDonald’s has impacted customers and employees in South Korea and Taiwan and company operations in the United States. The breach, which was first reported Friday by the Wall Street Journal, was the result of a cyber-attack. Hackers who broke into the computer system of McDonald’s Corp. accessed only a small number of files before their intrusion was detected. During their period of unauthorized access, the cyber-criminals stole personal information belonging to…

Read More

A Digital Journey: A Long and Winding Road

A Digital Journey: A Long and Winding Road

How did we build the internet and not secure it? By David Jemmett, CEO and Founder, Cerberus Sentinel Many people are under the impression that the internet is essentially safe and secure. We use the internet daily for email, shopping, and social interaction. We depend on it for such essentials as our medical records, finances, homes, cars, schools, and power grid. All are reliant on the endless interconnected computer networks that we call the internet. The internet…

Read More

Centralized supply chain security programs yield efficiency

Centralized supply chain security programs yield efficiency

Centralized supply chain security programs yield efficiency | 2021-06-12 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

5 Acquisition Strategies to Support CIOs Keeping Pace with Innovation – Cisco Blogs

5 Acquisition Strategies to Support CIOs Keeping Pace with Innovation – Cisco Blogs

The pace of new technology adoption and innovation to help prevent future disruption while remaining competitive has accelerated beyond all expectations. When the global pandemic first hit, businesses scrambled to get their workforce and operations back online. What would have taken months, suddenly had to happen instantly. Now, as CIOs continue to drive transformation, there are several ways to get access to the technology needed to recover and grow without having to break your budget….

Read More

Fake Lazarus DDoS Gang Launches New ‘Attacks’

Fake Lazarus DDoS Gang Launches New ‘Attacks’

Cybercrime , DDoS Protection , Fraud Management & Cybercrime Proofpoint Reports Group Rebrands as Fancy Lazarus, Lowers Ransom Amount Doug Olenick (DougOlenick) • June 11, 2021     Traditional ransomware attacks may have taken over the news cycle, but Proofpoint researchers say the malicious actors who presents themselves as the North Korean-backed Lazarus advanced persistent threat group have revamped their distributed denial-of-service ransom extortion strategy and rebranded the group with a new moniker. See Also:…

Read More

Gaming Giant EA Suffers Major Data Breach

Gaming Giant EA Suffers Major Data Breach

Hackers have stolen a wealth of data from gaming giant Electronic Arts (EA), including game source code and tools for several popular games, it has been reported. Cyber-criminals made the claim in blog posts published on underground hacking forums, where they advertised a total of 780GB of data for sale. These posts were viewed and detailed by Motherboard, who EA informed that it had indeed suffered a data breach. Among the data stolen was the source…

Read More

Behind the Firewall: How 9 execs implement cybersecurity at home

Behind the Firewall: How 9 execs implement cybersecurity at home

Editor’s note: This article is part of Behind the Firewall, a recurring column for cybersecurity executives to digest, discuss and debate. Next up: How did you get started in security? Email us here. When 5 o’clock hits, many professionals log off to spend their evenings focused on anything but work. Personal and professional worlds are siloed from one another, with nary a care for the office until the next morning.  But working in cybersecurity, even after…

Read More
1 3,324 3,325 3,326 3,327 3,328 3,585