Live Webinar | Data Classification: The Foundation of Cybersecurity ComplianceWebinar.
Thank you for registering with ISMG
Complete your profile and stay up to date
The Federal Bureau of Investigation said that the same group of online extortionists blamed for striking the Irish health system last week have also hit at least 16 U.S. medical and first response networks in the past year. From a report: In an alert made public Thursday by the American Hospital Association, the FBI said…
In the quarterly Critical Patch Update for July 2021, Oracle has released 342 fixes for several of its products range. The security experts at Oracle have claimed that among those fixes there are some critical flaws, and a threat actor can easily exploit these flaws remotely. The most critical one is the deserialization flaw through…
The United States is launching three new research programs designed to protect America’s critical energy infrastructure systems. The Department of Energy released information on the projects earlier this week, which will be spearheaded by the department’s Office of Cybersecurity, Energy Security, and Emergency Response. The programs will aim to protect the US energy system from…
The FBI and the Department of Homeland Security’s (DHS) Cybersecurity and Infrastructure Security Agency (CISA) are warning about advanced persistent threat (APT) actors exploiting a Fortinet vulnerability to gain access to government and other networks, according to an April 2 joint advisory. The joint advisory warns that APT actors are trying to utilize common vulnerabilities…
The threat actor who hacked Poly Network’s cross-chain interoperability protocol yesterday to steal over $600 million worth of cryptocurrency assets is now returning the stolen funds. As the Chinese decentralized finance (DeFi) platform Poly Network shared two hours ago, the hacker has already returned almost $260 million worth of stolen cryptocurrency. In total, the attacker…
Ransom software works by encrypting victims’ data; typically hackers will offer the victim a key in return for cryptocurrency payments that can run into the hundreds of thousands or even millions of dollars. If the victim resists, hackers are increasingly threatening to leak confidential data in a bid to pile on the pressure. Loading DarkSide’s…