Yearly Archives: 2021

Feds will weigh whether cyber best practices were followed when assessing HIPAA fines

Organizations that can show they did their due diligence in protecting medical information will be better off, should a breach occur.

The post Feds will weigh whether cyber best practices were followed when assessing HIPAA fines appeared first on SC Media.

Continue reading

Posted in Breach, Compliance, Health Care, Healthcare, Security News | Comments Off on Feds will weigh whether cyber best practices were followed when assessing HIPAA fines

SolarWinds hack is the perfect foreword to new book on history’s biggest breaches

SC Media spoke to author and former CISO Neil Daswani about his upcoming new book “Big Breaches: Cybersecurity Lessons for Everyone.”

The post SolarWinds hack is the perfect foreword to new book on history’s biggest breaches appeared first on SC Media.

Continue reading

Posted in Breach, Data Breach, Featured, Network Security, Security News | Comments Off on SolarWinds hack is the perfect foreword to new book on history’s biggest breaches

Legal recourse? Nissan balances competitive and security fallout from source code leak

News that source code of Nissan North America tools leaked online because of a misconfigured Git server spurs questions not only about potential cyberattacks by bad actors, but also whether competitors could use the sensitive data against the automobile giant.

The post Legal recourse? Nissan balances competitive and security fallout from source code leak appeared first on SC Media.

Continue reading

Posted in Breach, Data Breach, DevOps, Featured, Insider Threat, Security News | Comments Off on Legal recourse? Nissan balances competitive and security fallout from source code leak

Malware variant becomes world’s most popular, thanks to ransomware surge

Ransomware actors are laundering hundreds of millions of dollars through pseudo-legitimate cryptocurrency exchanges, while early-stage malware that is often used to facilitate their attacks have become the most popular forms of malware in the world.

The post Malware variant becomes world’s most popular, thanks to ransomware surge appeared first on SC Media.

Continue reading

Posted in Cryptocurrency, Ransomware, Security News | Comments Off on Malware variant becomes world’s most popular, thanks to ransomware surge

Linux machines again targeted by hackers with new memory loader

The Ezuri loader filelessly executes malware on Linux machines from memory, using a technique that is more common in Windows.

The post Linux machines again targeted by hackers with new memory loader appeared first on SC Media.

Continue reading

Posted in Cloud, Cybercrime, Malware, Security News | Comments Off on Linux machines again targeted by hackers with new memory loader

Biden’s pick as White House cyber czar provides critical federal leadership and diversity

When Joe Biden assumes the presidency 13 days from now, as government grapples with fallout from the SolarWinds breach and an attack on the U.S. Capitol, veteran intelligence expert Anne Neuberger likely will be by his side as deputy national security advisor for cybersecurity on the National Security Council (NSC). Naming Neuberger to the newly…

The post Biden’s pick as White House cyber czar provides critical federal leadership and diversity appeared first on SC Media.

Continue reading

Posted in Careers, Government, Government/Defense, Leadership, Security News, Women in IT Security | Comments Off on Biden’s pick as White House cyber czar provides critical federal leadership and diversity

CISA discovers token abuse around SolarWinds hack, calls for full rebuild of affected networks

The agency has found evidence of authentication token abuse in networks infected with corrupted versions of Orion software and say restoring integrity will require a full network rebuild in certain cases.

The post CISA discovers token abuse around SolarWinds hack, calls for full rebuild of affected networks appeared first on SC Media.

Continue reading

Posted in Breach, Data Breach, Government, Government/Defense, Security News | Comments Off on CISA discovers token abuse around SolarWinds hack, calls for full rebuild of affected networks

Malspam campaign spoofs email chains to install IcedID info-stealer

A phishing campaign has been disguising its spam as an email chain, using messages taken from email clients on previously compromised hosts.

The post Malspam campaign spoofs email chains to install IcedID info-stealer appeared first on SC Media.

Continue reading

Posted in Cybercrime, Email Security, Malware, Phishing, Security News | Comments Off on Malspam campaign spoofs email chains to install IcedID info-stealer

The physical breach of the Capitol building opens a cybersecurity pandora’s box

The incident, as well as the response among those on Capitol Hill tasked with securing government technology assets, serves as a dramatic and evolving case study for public and private sector entities on the scope of the cybersecurity risk tied to a physical breach.

The post The physical breach of the Capitol building opens a cybersecurity pandora’s box appeared first on SC Media.

Continue reading

Posted in Breach, Data Breach, Data security, Featured, Government/Defense, Physical security, Security News | Comments Off on The physical breach of the Capitol building opens a cybersecurity pandora’s box