Over 30,000 Fertility Clinic Patients Hit in Ransomware Data Breach

Over 30,000 Fertility Clinic Patients Hit in Ransomware Data Breach

Tens of thousands of patients at a US fertility clinic have had sensitive personal and medical information stolen in a ransomware attack. Reproductive Biology Associates (RBA) was the first organization of its kind to offer IVF in the US state of Georgia and is the founding partner of the nationwide fertility clinic network My Egg Bank. In a new breach notification, RBA claimed to have first become aware of a cyber-incident on April 16 this…

Read More

Nuclear Research Institute Breached by Suspected North Korean Hackers

Nuclear Research Institute Breached by Suspected North Korean Hackers

A South Korean nuclear power research organization has admitted it’s currently investigating a security breach after reports suggested its neighbor to the north may be responsible.   Lawmaker Ha Tae-keung, who sits on the parliamentary intelligence committee, cited third-party research attributing the May 14 attack to Pyeongyang-backed APT group Kimsuky. One of 13 IP addresses used to attack the Korea Atomic Energy Research Institute (KAERI) was traced back to the group, which has been in…

Read More

Nearly Half of Manufacturers Suffered a Digital Attack in the Last Year

Nearly Half of Manufacturers Suffered a Digital Attack in the Last Year

Confidence isn’t new when it comes to cybersecurity. All the way back in 2015, for example, 86% of security professionals working in the energy sector told Tripwire that they were confident they could detect a breach in a week. Just less than half (49%) said it wouldn’t take them longer than a day to spot an attack. It was the same story a year later when Tripwire surveyed infosec professionals in the retail sector. Most…

Read More

Protecting the New Most Vulnerable Population – Subscription Scams

Protecting the New Most Vulnerable Population – Subscription Scams

In a previous article, we introduced the fact that one of our largest growing populations is that of the “Baby Boomer” generation (those born between 1946 to 1964). As the Boomers get older, they become susceptible to many of the emerging dirty tricks that exist on the Internet. Phone scams, lottery scams, tech support scams, and a host of other frauds have existed for years. The scammers have adapted by finding new ways to become convincing. As…

Read More

How artificial intelligence can transform event venue security operations

How artificial intelligence can transform event venue security operations

How artificial intelligence can transform event venue security operations | 2021-06-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

Improving insider threat awareness

Improving insider threat awareness

Improving insider threat awareness | 2021-06-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Finding Trusted Suppliers and Sourcing Products Efficiently: New Innovations for Security Leaders

Finding Trusted Suppliers and Sourcing Products Efficiently: New Innovations for Security Leaders

Finding Trusted Suppliers and Sourcing Products Efficiently: New Innovations for Security Leaders | 2019-06-21 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy…

Read More

Why We Care About Cybersecurity Hygiene

Why We Care About Cybersecurity Hygiene

By James Opiyo, Senior Consultant Security Strategy, Kinetic By Windstream Maintaining good cybersecurity hygiene habits is just as important as maintaining good personal hygiene habits. We must maintain high cybersecurity standards to protect our digital health from some common cyber threats. Common threats to our digital health Malicious software (malwares) designed to steal information and or cause damage to our connected devices. Viruses that infect connected devices and then spread to others while giving cybercriminals…

Read More

UNC2465 cybercrime group launched a supply chain attack on CCTV vendor

UNC2465 cybercrime group launched a supply chain attack on CCTV vendor

UNC2465 cybercrime group that is affiliated with the Darkside ransomware gang has infected with malware the website of a CCTV camera vendor. An affiliate of the Darkside ransomware gang, tracked as UNC2465, has conducted a supply chain attack against a CCTV vendor, Mandiant researchers discovered. UNC2465 is considered one of the main affiliated of the DARKSIDE group, along with other affiliates gangs tracked by FireEye/Mandiant as UNC2628 and UNC2659. The crooks compromised the website of the…

Read More

Texan Admits Data Center Bomb Plot

Texan Admits Data Center Bomb Plot

A man from Texas could be facing up to 20 years in prison after pleading guilty to plotting to blow up a data center in Virginia. Seth Aaron Pendley, of Wichita Falls, was arrested in April after trying to purchase what he believed to be an explosive device from an undercover FBI employee in Fort Worth. The 28-year-old admitted that he had planned to use the device to destroy servers in an Amazon-owned data center located on…

Read More
1 2,220 2,221 2,222 2,223 2,224 2,583