Police in Germany and Ukraine detained two suspected core members of a ransomware criminal group with a track record of attacking hospitals and emergency services. Seized electronics may lead to additional arrests of members of the group, who are accused of spreading DoppelPaymer ransomware.
The Biden administration's national cybersecurity strategy emphasizes bolstering critical infrastructure sector protections, including setting minimum security requirements and enhancing collaboration. But observers says the industry needs more resources and a better security posture to comply.
The Royal ransomware group targeting critical infrastructure in the United States and other countries is made up of experienced ransomware attackers and has strong similarities to Conti, the infamous Russia-linked hacking group, according to a new alert issued by U.S. authorities.
The Biden administration, in its new national cybersecurity strategy, is doubling down on its efforts to combat ransomware, in part by designating it as a national security problem. Experts say this puts more "instruments of national power" - including military options - at the president's disposal.
In this week's roundup: an incident affecting News Corp and ransomware at Dish Network, Washington's Pierce Transit and the U.S. Marshals Service. Also: a DDoS attack on Danish hospitals from a threat actor that isn't what it claims and a bit of good news about a ransomware decryptor.
Hackers maliciously encrypted a system belonging to the U.S. Marshals Service, compromising and exfiltrating sensitive data law enforcement data. "The system was disconnected shortly and the Department of Justice initiated a forensic investigation," said an agency spokesman.
Healthcare last year was the most attacked sector within critical infrastructure, David Scott, deputy assistant director of the FBI Cyber Division, told a Scottish cybersecurity conference. The bureau in 2022 received 870 complaints showing indicators of a critical infrastructure ransomware attack.
The Asia-Pacific region had the dubious distinction of being the global region that faced the most cyberattacks during 2022, as observed by IBM's threat intelligence platform. IBM says the region accounted for 31% of all incidents monitored during 2022.
Federal authorities are urging the healthcare sector to ratchet up defenses against potential assaults by Russian-linked Clop on the heels of the ransomware-as-a-service group's recent alleged mass attacks exploiting a vulnerability in vendor Fortra's secure file transfer software GoAnyWhere MFT.
Between May 2021 and June 2022 about 10 terabytes of data were stolen each month. What should practitioners expect in 2023?
As ransomware attacks continue to evolve and disrupt businesses, MSPs must stay ahead of the curve with the latest protection technologies. Join this webinar to learn more on:
Current threat...
Cybercrime experts have long urged victims to never pay a ransom in return for any promise an attacker makes to delete stolen data. That's because, as a recent case highlights, whatever extortionists might promise, stolen personal data is lucrative, and it often gets sold six ways from Sunday.
Join Acronis experts Markus Bauer, Senior Technology Evangelist, EMEA, and Irina Artioli, Cyber Protection Evangelist for a live webinar on the latest ransomware threats and how to protect your MSP clients in 2023. The latest statistics indicate that ransomware remains the top concern for MSPs in 2023, with...
The “The future of cybercrime: Discussion on AI-enabled ransomware with cybersecurity experts” webinar is a must attend for senior-level corporate cybersecurity professionals.
The webinar, presented by Acronis experts Markus Bauer, Senior Technology Evangelist, EMEA, and Irina Artoli, Cyber Protection...
A Russian national accused by U.S. federal prosecutors of developing an application for decrypting login credentials pleaded not guilty during a first appearance in Tampa federal court. The man, Dariy Pankov, faces seven criminal counts, including conspiracy, access device fraud and computer fraud.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.