Cyber attribution: Do you really need to know?

Cyber attribution: Do you really need to know?

Although Agatha Christie might disagree, sometimes mysteries should remain unsolved — at least in the cyber realm. Cyber attribution — finding exactly who perpetrated a given cyberattack — has seemingly become a cybersecurity goal in and of itself. But do organizations really need to know? Recognizing the “who” behind cyberattacks (not just the “what” and “how”) provides critical insights into the attacker’s objectives, infiltration methods, covert communication channels and more. Effective incident response hinges on…

Read More

UK Councils Warn of Data Breach After Attack on Medical Supplier

UK Councils Warn of Data Breach After Attack on Medical Supplier

Multiple UK councils have warned that citizens’ personal data may have been breached following a ransomware attack on a medical equipment supplier. Nottingham Rehab Supplies (NRS) Healthcare, which supplies health and care equipment numerous local authorities across the UK, was hit by a ransomware attack at the start of April 2024. The attack resulted in the NRS website being taken offline. The company said it is currently in its “recovery phase” following the incident. A…

Read More

How to Protect Yourself on Social Networks | McAfee Blog

How to Protect Yourself on Social Networks | McAfee Blog

There are now over 5 billion active social media users worldwide, representing 62.3% of the global population. While social networks serve as valuable tools for staying connected with loved ones and documenting life events, the ease of sharing information raises concerns. With a mere few clicks, posts and messages can inadvertently divulge significant personal details, potentially compromising privacy and leaving individuals vulnerable to identity theft. That’s why it’s crucial to make sure you’ve got the…

Read More

Black Basta Ransomware Struck More Than 500 Organizations Worldwide

Black Basta Ransomware Struck More Than 500 Organizations Worldwide

A joint cybersecurity advisory from the Federal Bureau of Investigation, Cybersecurity and Infrastructure Security Agency, Department of Health and Human services and Multi-State Information Sharing and Analysis Center was recently released to provide more information about the Black Basta ransomware. Black Basta affiliates have targeted organizations in the U.S., Canada, Japan, U.K., Australia and New Zealand. As of May 2024, these affiliates have impacted more than 500 organizations globally and stolen data from at least…

Read More

New Android Banking Trojan Mimics Google Play Update App

New Android Banking Trojan Mimics Google Play Update App

A new banking Trojan targeting Android devices has been detected by Cyble Research and Intelligence Labs (CRIL), the research branch of threat intelligence provider Cycble. In a report published on May 16, CRIL described sophisticated malware incorporating a range of malicious features, including overlay attacks, keylogging and obfuscation capabilities. The researchers called the Trojan “Antidot” after a string within its source code. What the Antidot Trojan Looks Like Antidot poses as a Google Play update…

Read More

To pay or not to pay? Negotiating in the age of ransomware

To pay or not to pay? Negotiating in the age of ransomware

In 2023, more than 2,200 networks across United States hospitals, schools and government organizations, as well as thousands of private businesses, were breached by cybercriminals. With another record-breaking year for ransomware and data extortion in the rearview mirror, organizations of all sizes are preparing for when they’ll need to make their big payout in 2024. But what if paying the ransom wasn’t the only way out?  There’s often room to negotiate with threat actors or,…

Read More

Get on Cybersecurity Certification Track With These Courses

Get on Cybersecurity Certification Track With These Courses

TL;DR: Dive into the world of cybersecurity with The Complete 2024 Cyber Security Expert Certification Training Bundle, now just $49.99 (reg. $195). As the world gets more and more online, cybersecurity threats become more and more complex and challenging to navigate. There’s a massive demand for cybersecurity experts, and if you’re interested in pursuing a lucrative new career or bringing a necessary business cost in-house, The Complete 2024 Cyber Security Expert Certification Training Bundle can…

Read More

Patient Data at Risk in MediSecure Ransomware Attack

Patient Data at Risk in MediSecure Ransomware Attack

Australian healthcare company MediSecure has suffered a “large scale” ransomware attack, putting individuals’ personal and health information at risk. The electronic prescriptions provider confirmed the incident in a statement on May 16, which it admitted has impacted the personal and health information of individuals. The company confirmed that the attack was caused by an attack on a third-party supplier. No indication has been given as to the nature of the information that has potentially been…

Read More

State of IT jobs: Mixed signals, changes ahead

State of IT jobs: Mixed signals, changes ahead

Dice reports that IT workers also seek stock programs (29%), training and education (24%), gym or fitness reimbursement (21%), and college tuition reimbursement (18%), among other perks. AI changes the equation Generative AI, and AI in general, has been the most talked about technology in the past year, with questions arising as to how it will impact the workforce. Sutton points to increasing use of AI to alleviate some of the administrative burden of work…

Read More

Girbau automatiza la separación y clasificación de la ropa sucia para lavanderías

Girbau automatiza la separación y clasificación de la ropa sucia para lavanderías

El fabricante de maquinaria para lavanderías industriales Girbau se apoya en la automatización de procesos con el firme propósito de catapultar sus índices de productividad y revalorizar los puestos de trabajo de los operarios. La multinacional catalana ha desarrollado una solución bautizada como Sortech para automatizar el proceso de separación y clasificación de la ropa sucia en lavanderías industriales, centros sanitarios e instalaciones con un gran volumen de producción, facilitando así el trabajo de los…

Read More
1 2 3 2,152