Federal authorities are warning healthcare and public health sector entities to be proactive and vigilant to at least three main potential threat groups, as well as various wiper malware, linked with Russia's attack on Ukraine.
The federal agency enforcing HIPAA is urging covered entities and business associates to sharpen their focus on protecting their organizations against cyberattacks. The agency has also laid out a list of priorities for rule-making, enforcement and other activities in 2022.
Amid what is now a prolonged struggle in Ukraine, cybersecurity officials in the U.S. and European Union have expressed some surprise over Russia's lack of pervasive cyber strikes to date. But they warn that these actions could follow as its economy reels from sanctions.
A previously undocumented advanced persistent threat campaign named Daxin has been found. It uses a stealthy rootkit backdoor to enable remote actors to communicate with secured devices not connected directly to the internet. Researchers say Chinese attackers used it to run an espionage campaign.
The Lapsus$ ransomware group says it has released some of the data trove stolen from chipmaker Nvidia. Leaked data contains proprietary source code, drivers and documentation on Nvidia's Falcon and LHR products. Experts discuss the impact on Nvidia, the stolen data's worth and remediation measures.
Where are you to likely gain insights from security experts on how SASE can help you achieve better visibility into IT systems, secure your unmanaged applications and devices and consolidate your investments as you move to a remote workforce environment? The answer is SASE Day.
As Russia continues its invasion of Ukraine, Western governments and certain hacktivists remain steadfast in opposition. On social media, international hacktivist collective Anonymous says it has successfully hacked websites of the Russian government, media and banks.
Mark Frogoso, VP and group CISO at Mynt, the largest fintech company in the Philippines and the operator of the No.1 e-wallet in the country - GCash, says oT and cloud technologies, digital transformation, digital realities, AI/ML and quantum computing are technology trends that hold most promise.
India's Data Protection Bill may be approved by Parliament in August. The country will also have new regulations to prevent companies from hiding data breach incidents. Some experts say the move is a step in the right direction and suggest CERT-In is not adequate as a law enforcement entity.
Belarus has renounced its nonnuclear status and is set to support moving the Kremlin's nuclear weapons into the country - within striking distance of Ukrainian capital Kyiv. This has sparked backlash from cyber hacktivist groups, who have now targeted and disrupted Belarus' critical services.
Days ago, the Ukrainian Ministry of Defense issued a call for Ukrainian hackers to safeguard its networks and tap into Russian infrastructure. Now, Mykhailo Fedorov, Ukraine's vice prime minister and minister of digital transformation, says he is creating an IT army and calling for digital talents.
Since 2019, the Global Cyber Alliance has been using a custom IoT honeypot solution that identifies global attack risks and collects data about IoT attacks. Leslie Daigle discusses its findings about how threats have evolved and offers advice on how to better secure IoT devices and tech.
Toyota Motor Corp. reportedly decided to suspend all operations starting Tuesday because of a suspected cyberattack on Kojima Industries, its manufacturing partner. The suspension means the company’s output will be down by around 10,000 cars, according to a report from media agency Nikkei Asia.
CISOs appreciate the SASE approach, which allows them to incorporate all their existing investments - often made in a phased manner - to undergo the digital transformation, says Sid Deshpande, field CTO at Palo Alto Networks. He discusses how SASE can solve CISOs' problems.
Gaps in federal regulations concerning the security and privacy of health data falling outside HIPAA's umbrella are getting filled to some extent by various state laws. But that's creating additional challenges, says privacy attorney Kirk Nahra of the law firm WilmerHale.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing databreachtoday.asia, you agree to our use of cookies.