The COVID-19 pandemic has shunted business across the globe online — and the transition has created countless new money-making opportunities for cybercriminals.
Half of all organizations experienced security incidents associated with remote working during the lockdown period, according to a report by Tessian.
The coronavirus has been unkind to millions of people. We’ve been sent home to work from home offices rather than workplaces, and with it, there’s a significant risk of falling foul of hacking attacks.
Russia’s 2020 hacking campaigns might have included a successful data breach at the US government. In the wake of a CISA notice warning of a cyberattack on an unnamed federal agency’s network, Wired and security company Dragos have obtained evidence suggesting Russia’s state-backed APT28 group, better known as Fancy Bear, was behind the hack.
No patients were affected, but the incident was another reminder of the risks in the increasingly common assaults on computer networks.
Emergency 911 systems were down for more than an hour on Monday in towns and cities across 14 U.S. states.
The cost of RDP credentials is going down – and it’s probably happening because of poor cybersecurity is making log-in details easy to find.
80% of organizations experienced a cybersecurity breach that originated from vulnerabilities in their vendor ecosystem in the past 12 months, and the average organization had been breached in this way 2.7 times, according to a BlueVoyant survey.
“Criminals don’t just give up, they look for easier ways in,” ex-GCHQ boss Robert Hannigan tells ZDNet – and that easy way in is via your third-party suppliers.
Nearly 32 million patient records were breached in the first half of 2019, according to new data released this week in the Protenus Breach Barometer, an analysis of how data breaches are affecting the healthcare industry.