HackDig : Dig high-quality web security articles for hackers

2021 X-Force Threat Intelligence Index Reveals Peril From Linux Malware, Spoofed Brands and COVID-19 Targeting

From the front lines of incident response engagements to managed security services, IBM Security X-Force observes attack trends firsthand, yielding insights into the cyber threat landscape. Every year, X-Force collates billions of data points to assess cybersecurity threats to our customers. This report — the X-Force Threat Intelligence Index 202
Publish At:2021-02-24 10:59 | Read:90 | Comments:0 | Tags:Advanced Threats Data Protection Government Healthcare Malwa

Seven Tips for Protecting Your Internet-Connected Healthcare Devices

Seven Tips for Protecting Your Internet-Connected Healthcare Devices: Cybersecurity Awareness Month October is Cybersecurity Awareness Month, which is led by the U.S. government’s Cybersecurity and Infrastructure Security Agency (CISA) in conjunction with the National Cyber Security Alliance (NCSA)—a national non-profit focused on cybersecurity education &a
Publish At:2021-02-18 21:06 | Read:115 | Comments:0 | Tags:Consumer healthcare cybersecurity IoT HIPPA IoT in healthcar

Moving Threat Identification From Reactive to Predictive and Preventative

In a previous post, we focused on organizations’ characteristics, such as sector, geography, risk and impact, when discussing the pillars of building a threat identification program. Now, we move deeper into the concept and expand upon the threat identification process through example scenarios, helping translate the conceptual framework into daily pr
Publish At:2021-02-05 14:35 | Read:150 | Comments:0 | Tags:Healthcare Security Services Threat Intelligence Cyberthreat

The Importance of Mobile Technology in State Electronic Visit Verification (EVV) Programs

Under the federal Electronic Visit Verification mandate, care providers for people with disabilities or the elderly confined to their homes will need to check in and out with a device equipped with GPS. It isn’t a security risk mandate per se, but the use of connected devices for this could add some risk.  What is Electronic Visit Verificati
Publish At:2021-01-29 18:47 | Read:130 | Comments:0 | Tags:Government Healthcare Mobile Security Electronic Visit Verif

Healthcare organizations faced a 45% increase in attacks since November

According to a new report published by Check Point, organizations in the healthcare industry have faced a 45% increase in attacks since November. Check Point researchers reported a surge in the number of attacks against organizations in the healthcare industry, +45% since November. This is more than double the overall increase observed by the experts i
Publish At:2021-01-05 10:31 | Read:339 | Comments:0 | Tags:Breaking News Hacking Reports COVID-19 hacking news healthca

Vermont Hospital confirmed the ransomware attack

The Burlington-based University of Vermont Health Network has finally admitted that ransomware was behind the October attack. In October, threat actors hit the Wyckoff Heights Medical Center in Brooklyn and the University of Vermont Health Network. The cyber attack took place on October 28 and disrupted services at the UVM Medical Center and affiliated fa
Publish At:2020-12-27 15:24 | Read:480 | Comments:0 | Tags:Breaking News Cyber Crime Malware Hacking hacking news healt

Lessons from Teaching Cybersecurity: Week 11

As I had mentioned previously, this year, I’m going back to school. Not to take classes, but to teach a course at my alma mater, Fanshawe College. I did this about a decade ago and thought it was interesting, so I was excited to give it another go. Additionally, after a friend mentioned that their kid wanted to learn Python, I developed an Intro to Python co
Publish At:2020-12-15 02:44 | Read:244 | Comments:0 | Tags:Off Topic Healthcare human resources welfare security cyber

IBM Uncovers Global Phishing Campaign Targeting the COVID-19 Vaccine Cold Chain

At the onset of the COVID-19 pandemic, IBM Security X-Force created a threat intelligence task force dedicated to tracking down COVID-19 cyber threats against organizations that are keeping the vaccine supply chain moving. As part of these efforts, our team recently uncovered a global phishing campaign targeting organizations associated with a COVID-19
Publish At:2020-12-03 10:05 | Read:345 | Comments:0 | Tags:Government Healthcare Threat Research Phishing Phishing Emai

Chaos Engineering: Building the Next Generation of Cyber Ranges

In one of our past posts on the same subject, we discussed how to apply chaos engineering principles to cyber war-games and team simulation exercises in broad brush strokes. In short, ‘chaos engineering’ is the discipline of working and experimenting with new features and changes on a system that’s already in live production. The purpose i
Publish At:2020-11-30 11:53 | Read:335 | Comments:0 | Tags:Healthcare Incident Response Security Services Command Cente

FBI, CISA alert warns of imminent ransomware attacks on healthcare sector

FBI and the DHS’s CISA agencies published a joint alert to warn hospitals and healthcare providers of imminent ransomware attacks from Russia. The FBI, the DHS’s Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Health and Human Services (HHS) has issued a joint alert to warn hospitals and healthcare providers of imminent rans
Publish At:2020-10-29 15:41 | Read:708 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware healthcare informa

Finnish psychotherapy center Vastaamo suffered a shocking security breach

Private Finnish psychotherapy center Vastaamo suffered a security breach, hackers are now demanding ransom to avoid the leak of sensitive data they have stolen. Finland’s interior minister summoned an emergency meeting Sunday after the private Finnish psychotherapy center Vastaamo suffered a security breach that caused the exposure of patient records. To
Publish At:2020-10-26 09:41 | Read:552 | Comments:0 | Tags:Breaking News Cyber Crime Data Breach Hacking data breach ex

Lock and Code S1Ep17: Journalism’s role in cybersecurity with Alfred Ng and Seth Rosenblatt

Most everything about cybersecurity—the threats, the vulnerabilities, the breaches and the blunders—doesn’t happen in a vacuum. And the public doesn’t learn about those things because threat actors advertise their exploits, or because companies trumpet their lackluster data security practices. No, we often learn about cybersecurity issues because of
Publish At:2020-10-12 13:05 | Read:533 | Comments:0 | Tags:Podcast ai software disinformation fullz house healthcare im

A Recipe for Reducing Medical Device Internet of Things Risk

You may recall this blog post from March 2020. It highlighted the importance of factoring in clinical, organizational, financial and regulatory impact when determining which medical Internet-of-Things (IoMT) security vulnerabilities should be fixed first. Consider this post a part two. Whereas the previous post focused on the fact that IoMT devices are here
Publish At:2020-09-30 12:45 | Read:566 | Comments:0 | Tags:Data Protection Healthcare Healthcare Data Medical Data Risk

Major Duesseldorf hospital infected with ransomware, patient died for consequences

A major hospital in Duesseldorf was hit by a cyber attack, a woman who needed urgent admission died after she had to be hijacked to another city. The news is shocking, German authorities revealed that a cyber attack hit a major hospital in Duesseldorf, the Duesseldorf University Clinic, and a woman who needed urgent admission died after she had to be take
Publish At:2020-09-17 13:08 | Read:525 | Comments:0 | Tags:Breaking News Cyber Crime Hacking Malware hacking news healt

Covid-19 Exposure Logging: Key Privacy Considerations

Recently, both Apple and Google released new updates for iPhone and Android devices. One feature that was added was “Covid-19 Exposure Logging.” The feature is off (for now), and according to the text that accompanies the app, when turned on, it is set to communicate via Bluetooth to other devices.iPhone Android My initial response was that we are
Publish At:2020-09-03 16:25 | Read:630 | Comments:0 | Tags:Featured Articles Healthcare Android Apple COVID-19 crowdsou

Tools

Tag Cloud