Hackers are going downstream in their attacks on healthcare sector entities and their third-party business associates because in many cases, these cybercriminals have already hit up the larger players, says Michael Hamilton, CISO of security firm Critical Insight.
Anytime critical infrastructure gets disrupted, the first question inevitably seems to be: Was a cyberattack to blame? So it went Wednesday when the Federal Aviation Administration announced a "ground stop," prohibiting all U.S. flights from taking off, due to an overnight system failure.
Hacking and third-party business associate incidents were the crux of the largest health data breaches reported to federal regulators in 2022, foreshadowing the top risks and threats that will likely plague healthcare entities and their vendors in the new year, as well.
The Hive ransomware-as-a-service group claimed responsibility for a data breach involving patients of a U.S. nursing home chain with a checkered past. The chain, Consulate Health Care, posted a notice saying the leak originated at an unnamed vendor.
Pennsylvania-based nonprofit Maternal and Family Health Services this week revealed a ransomware attack in April 2022 that compromised patient medical and financial data. Information accessed in the breach includes names, addresses and Social Security numbers.
A municipal ambulance services provider that serves 15 cities in a Texas county has reported to federal regulators a ransomware breach potentially affecting 612,000 individuals, which is equivalent to nearly 30% of the county's 2.1 million population.
In the latest weekly update, ISMG editors discuss how collaboration platform Zoom has strengthened its security features, the implications of a new law on medical device security for patient safety, and details on how a zero-day exploit enabled the ransomware hit on cloud computing firm Rackspace.
Hosting giant Rackspace says the recent ransomware attack resulted in Microsoft Exchange data for 27 customer organizations being accessed by attackers. But it says a digital forensic investigation has found "no evidence" that attackers "viewed, obtained, misused or disseminated emails or data."
Cybercriminals are becoming bolder in their attacks on healthcare entities and in how they're compromising patient data - and that's a very worrisome trend, says Nicholas Heesters of the Department of Health and Human Services' Office for Civil Rights.
Ransomware attacks and ransom demands ramped up in 2022, making resiliency the operative word. But as we head into 2023, speed of recovery is the new #1, says Andrew Stone of Pure Storage. He discusses strategies before, during and after attacks.
Hundreds of U.S. counties continue to work with pen and paper after a cyberattack on their digital records management vendor last week disrupted methods to view, add and edit government records. The attack slowed the processing of birth certificates, marriage licenses and real estate transactions.
Rail and locomotive company Wabtec Corp. notified customers about a data breach that exposed some individuals' personal and sensitive information. Ransomware-as-a-service group LockBit posted the data on its leak site after the company refused to pay a $30 million ransom.
Britain's The Guardian newspaper has asked staff to continue working from home until Jan. 23 as the company continues to resolve issues with its network, which was compromised by ransomware hackers in December. The attack affected on-premises infrastructure but left cloud-based systems unscathed.
Rackspace says the ransomware-wielding attackers who disrupted its hosted Microsoft Exchange Server environment last month wielded a zero-day exploit, described by CrowdStrike as being "a previously undisclosed exploit method for Exchange," to gain remote, direct access to servers it hosted.
The BlackCat ransomware-as-a-service group created a spoofed website closely mimicking the website of a victim in order to spread stolen data online. The victim is a small U.S. accounting firm whose stolen files apparently include tax returns and passport scans.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing inforisktoday.eu, you agree to our use of cookies.