The latest edition of the ISMG Security Report analyzes how cybercriminals are exploiting the COVID-19 pandemic. Also featured: A discussion of potential 2020 election changes; tips for staying secure in a remote workplace.
Cybercriminals, and perhaps nation-state hackers, that are attempting to take advantage of the COVID-19 pandemic are now turning their attention to mobile devices to spread malware, including spyware and ransomware, security researchers warn.
Healthcare institutions and nonprofits are suffering badly from ransomware attacks, says Caleb Barlow, CEO of CynergisTek, who offers insights on shoring up defenses.
Attackers are continuing to use concerns over COVID-19 to distribute ransomware and malware, including for smartphones. The healthcare sector is perhaps at the greatest risk from these attacks because it's serving as the front-line defense against the disease.
Because so many organizations and government agencies are functioning in silos, a key component to India's soon to be finalized cybersecurity policy is the creation of an interministerial task force to respond to growing threats, says Lt. Gen. (Retd) Rajesh Pant, national cybersecurity coordinator.
As the COVID-19 pandemic intensifies, public health efforts are being complicated by ransomware attacks continuing to hit healthcare facilities that are not only handling cases but also running frontline virus-testing labs.
The latest edition of the ISMG Security Report offers an analysis of cybersecurity and privacy issues raised by COVID-19 research efforts. Also featured: the latest ransomware trends and an investor's take on hot cybersecurity sectors.
Microsoft has confirmed that a serious flaw in Windows SMB_v3 exists that could be exploited by attackers to remotely seize control of vulnerable systems. While no attacks have been seen in the wild, no patch for the wormable flaw is yet available. A workaround exists for servers, but not clients.
Security firm Emsisoft is offering free, customized decryptors to victims of PwndLocker ransomware, which first surfaced in late 2019 and has been tied to attacks against Lasalle County in Illinois and the Serbian city of Novi Sad, with the gang demanding up to $660,000 or more in bitcoins from its victims.
New ransomware variants are targeting managed service and cloud service providers: This is one of the predictions made by WatchGuard Technologies for 2020. CTO Corey Nachreiner discusses the top three predictions.
Targeted ransomware attacks continue to increase as gangs seek to obtain bigger ransom payoffs by hitting larger targets, aided by a cybercrime services economy that provides access to tools and tactics that were previously the domain of APT groups, security experts warn.
Ransomware has evolved in two alarming paths: One to create distraction, the other to ensure destruction. Microsoft's Diana Kelley describes the new trends and how enterprises can respond.
RSA 2020 touched on a number of topics, including the security of elections and supply chains, plus AI, zero trust and frameworks, among many others. But from sessions on cryptography, to this year's lower attendance, to the antibacterial dispensers dotted around venues, concerns over COVID-19 also dominated.
Visser Precision, a U.S. manufacturer that supplies Boeing, Lockheed Martin, Tesla and SpaceX, appears to have been hit by the DoppelPaymer ransomware gang, which has begun leaking internal data and threatening to leak more unless the victim pays a ransom.
Targeted ransomware attacks against enterprises and government agencies are likely to surge in the coming months as "ransomware as a service" continues to evolve into a lucrative model for cybercriminals, security experts interviewed at RSA 2020 warn.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.asia, you agree to our use of cookies.