Tag: healthcare
-
CISOs are taking on ever more responsibilities and functional roles has it gone too far?
by
in SecurityNews
Tags: ai, business, cio, ciso, cloud, compliance, computing, control, corporate, cyber, cybersecurity, data, defense, framework, fraud, governance, healthcare, infosec, intelligence, international, Internet, jobs, law, mitigation, nist, privacy, regulation, resilience, risk, risk-management, service, skills, software, supply-chain, technology, threatth century alongside technology and internet-enabled threats, morphing to meet the demands of the moment. But the position hasn’t just matured; in many cases it has expanded, taking on additional domains.”The CISO role has expanded significantly over the years as companies realize that information security has a unique picture of what is going on across…
-
Europol Cracks Down on Euro6.7M Hearing Aid Fraud Scheme Exploiting French Healthcare
by
in SecurityNewsIn a high-impact cross-border operation, Europol has dismantled a criminal network responsible for a massive Euro6.7 million healthcare First seen on securityonline.info Jump to article: securityonline.info/europol-cracks-down-on-e6-7m-hearing-aid-fraud-scheme-exploiting-french-healthcare/
-
Fake Out: Babuk2 Ransomware Group Claims Bogus Victims
by
in SecurityNewsWhat Do You Mean, Hospital-Targeting Sociopath Ransomware Wielders Continue to Lie? A ransomware group reusing the Babuk ransomware brand claims to have stolen data from the likes of Amazon, Delta and US Bank. Just one problem: Security experts found a startling overlap between its claimed victims and previous attacks scored by the likes of Clop,…
-
UAT-5918 Hackers Exploit N-Day Vulnerabilities in Exposed Web and Application Servers
by
in SecurityNews
Tags: access, credentials, cyber, cybersecurity, data-breach, exploit, group, hacker, healthcare, infrastructure, theft, threat, vulnerabilityA recent cybersecurity threat, identified as UAT-5918, has been actively targeting entities in Taiwan, particularly those in critical infrastructure sectors such as telecommunications, healthcare, and information technology. This advanced persistent threat (APT) group is believed to be motivated by establishing long-term access for information theft and credential harvesting. UAT-5918 gains initial access by exploiting known…
-
Authorities Warn of Security Terror Threats to Hospitals
by
in SecurityNewsHealth ISAC, AHA Bulletin Urges Entities to Bolster Physical, Cyber, Preparedness. Threats transmitted on social media intimating coordinated terrorist attacks on hospitals in mid-tier U.S. cities have industry authorities warning the healthcare sector to shore up physical and cyber security, as well as emergency management response plans. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/authorities-warn-security-terror-threats-to-hospitals-a-27789
-
12 Hours or Else: Hong Kong’s Cybersecurity Explained
by
in SecurityNews
Tags: banking, cybersecurity, defense, framework, healthcare, infrastructure, law, risk, risk-assessmentHong Kong has officially enacted a new cybersecurity law aimed at securing critical infrastructure, a move that brings its regulatory framework closer to mainland China’s. The Protection of Critical Infrastructures (Computer Systems) Bill, passed on March 19, 2025, requires key industries”, such as banking, energy, healthcare, and telecommunications”, to strengthen their cybersecurity defenses, conduct regular…
-
The State of Digital Trust in 2025 Consumers Still Shoulder the Responsibility
by
in SecurityNews
Tags: access, ai, authentication, banking, breach, captcha, cloud, compliance, control, cyber, data, deep-fake, encryption, finance, fintech, framework, GDPR, government, healthcare, identity, india, insurance, law, login, malicious, metric, mfa, mitigation, password, privacy, regulation, resilience, risk, service, software, strategy, switch, technology, threat, toolThe State of Digital Trust in 2025 – Consumers Still Shoulder the Responsibility madhav Thu, 03/20/2025 – 04:52 Trust remains the cornerstone of digital interactions, yet its foundations are increasingly fragile in an era of sophisticated cyber threats and evolving consumer expectations. The 2024 Digital Trust Index gave us extremely important insights into the expectations…
-
How healthcare CISOs can balance security and accessibility without compromising care
by
in SecurityNewsIn this Help Net Security interview, Sunil Seshadri, EVP and CSO at HealthEquity, talks about the growing risks to healthcare data and what organizations can do to stay ahead. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/03/20/sunil-seshadri-healthequity-healthcare-data-risk/
-
Why States Will Need to Step Up Cyber Help for Healthcare
by
in SecurityNewsAs uncertainty mounts about the range of cyber resources the federal government will continue to offer healthcare and other critical infrastructure sectors during the Trump administration, states will need to step up their support, said Mike Hamilton, field CISO of cybersecurity firm Lumifi Cyber. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/states-will-need-to-step-up-cyber-help-for-healthcare-i-5467
-
Medical Hallucinations Persist as Clinicians Integrate AI
by
in SecurityNewsResearchers Detail AI’s Fabricated Facts in Healthcare, Discuss Solutions. Hallucinations in artificial intelligence foundation models are pushing healthcare professionals and technologists to rethink how practitioners can safely use AI. Hallucinated lab result or an erroneous diagnostic recommendation could lead to harmful interventions or missed treatments. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/medical-hallucinations-persist-as-clinicians-integrate-ai-a-27756
-
Rethinking Risk: ICS OT Security with Purdue 2.0 and GRC
by
in SecurityNewsThe rise of the extended Internet of Things (XIoT) across industrial (IIoT), healthcare (IoMT), commercial (OT, BMS/EMS/ACS/iBAS/FMS), and other sectors… First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/03/rethinking-risk-ics-ot-security-with-purdue-2-0-and-grc/
-
How can I optimize costs while securing NHIs in cloud environments?
by
in SecurityNewsAre Cost Optimization and Security Identical Goals in Cloud Management? While cost optimization and robust security may appear to be odds with each other, an integrated approach that leverages Non-Human Identities (NHIs) can strike a perfect balance. From financial services to healthcare and travel, organizations operating in diverse sectors are realising the immense potential of……
-
AI Adoption For Cybersecurity Healthcare Poised For Surge
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/brief/ai-adoption-for-cybersecurity-healthcare-poised-for-surge
-
Biggest Cyber Threats to the Healthcare Industry Today
by
in SecurityNewsHealthcare organizations must enhance their cybersecurity arsenal. Doing so can help them prevent financial, compliance, and reputational damage. First seen on darkreading.com Jump to article: www.darkreading.com/vulnerabilities-threats/biggest-cyber-threats-healthcare-industry-today
-
The most notorious and damaging ransomware of all time
by
in SecurityNews
Tags: access, android, attack, backdoor, backup, banking, botnet, breach, communications, computer, control, credentials, cryptography, cyber, cybercrime, dark-web, data, defense, detection, email, encryption, endpoint, exploit, extortion, finance, flaw, framework, germany, google, government, group, hacker, hacking, healthcare, infection, infrastructure, international, jobs, korea, law, lazarus, leak, linux, malicious, malware, microsoft, mobile, msp, network, north-korea, office, open-source, oracle, password, phishing, phone, powershell, ransom, ransomware, russia, service, software, spam, switch, technology, threat, tool, ukraine, update, usa, virus, vulnerability, windowsConti: History: First appearing in May 2020, the Conti RaaS platform is considered the successor to the Ryuk ransomware. As of January 2021, Conti is believed to have infected over 150 organizations and earned millions of dollars for its criminal developers and their affiliates. At least three new versions have been found since its inception.How it works: Conti uses the…
-
CIOs and CISOs take on NIS2: Key challenges, security opportunities
by
in SecurityNews
Tags: access, cio, ciso, compliance, cybersecurity, data, GDPR, group, healthcare, ISO-27001, jobs, monitoring, nis-2, office, organized, privacy, regulation, risk, skills, software, strategy, supply-chain, technology, trainingCompliance will be easier for some: There are CIOs and CISOs who have found NIS2 compliance relatively easy: those who have worked toward ISO/IEC 27001:2022 certification, whether they remained in the preparation phase or actually got certified.Those who have the certification report having found themselves with “80% of the work done”: the company is ready…
-
Radiology Clinic, Hospital Among Latest Rural Cyber Victims
by
in SecurityNewsIT Outages Are Affecting Patient Services, NC Practice Is ‘Temporarily Closed’. A small North Carolina radiology practice and a 25-bed Pennsylvania hospital and are among the latest rural healthcare providers struggling to recover from recent cyberattacks that are disrupting their technology operations and affecting patient care services. How will this end up? First seen on…
-
FBI, CISA Raise Alarms As Medusa Ransomware Attacks Grow
by
in SecurityNewsMedusa developers have been targeting a wide variety of critical infrastructure sectors, from healthcare and technology to manufacturing and insurance, racking up its victim count as it seemingly adds to its numbers of affiliates. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/fbi-cisa-alarmed-medusa-ransomware-attacks-grow
-
Healthcare cybersecurity set for AI boom in 2025
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/news/healthcare-cybersecurity-set-for-ai-boom-in-2025
-
The Case for Managed Security Services in Healthcare: Reducing Risk and Enhancing Patient Care
by
in SecurityNewsFirst seen on scworld.com Jump to article: www.scworld.com/perspective/the-case-for-managed-security-services-in-healthcare-reducing-risk-and-enhancing-patient-care
-
HealthTech Database Exposed 108GB Medical and Employment Records
by
in SecurityNewsA misconfigured database exposed 108.8 GB of sensitive data, including information on over 86,000 healthcare workers affiliated with… First seen on hackread.com Jump to article: hackread.com/healthtech-database-exposed-medical-employment-records/
-
ICYMI: Interesting Things We Learned at the HIMSS 2025 Conference
by
in SecurityNewsWe had a good time talking to folks last week in our ColorTokens booth at the Healthcare Information and Management Systems Society conference in Las Vegas. The crowd was plentiful and engaged at the Venetian Convention Center and Ceasar’s Forum. Perhaps even more interesting than the keynote addresses and the latest-and-greatest information from the vendor……
-
Medusa ransomware slams critical infrastructure organizations
by
in SecurityNewsThe ransomware-as-service gang tallied more than 300 victims in industries such as healthcare, manufacturing and technology. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/medusa-ransomware-slams-critical-infrastructure-organizations/742428/
-
86,000+ Healthcare Staff Records Exposed Due to AWS S3 Misconfiguration
by
in SecurityNewsA non-password-protected database belonging to ESHYFT, a New Jersey-based HealthTech company, was recently discovered by cybersecurity researcher Jeremiah Fowler. The database contained over 86,000 records, amounting to 108.8 GB of sensitive information. This data breach, while not attributed to intentional malice, highlights the critical need for robust cybersecurity measures in the healthcare sector. Background of…
-
Breaking the Barriers to a Password-Free Life in Enterprise: Meet SafeNet eToken Fusion NFC PIV security key
by
in SecurityNews
Tags: access, authentication, cloud, compliance, control, credentials, data, defense, encryption, fido, framework, government, healthcare, identity, infrastructure, mobile, nfc, password, phishing, regulation, service, software, strategy, technology, windowsBreaking the Barriers to a Password-Free Life in Enterprise: Meet SafeNet eToken Fusion NFC PIV security key madhav Thu, 03/13/2025 – 06:46 As large organizations increasingly shift towards passwordless solutions, the benefits are clear: enhanced user experience, improved security, and significant cost savings. The FIDO (Fast Identity Online) standard has emerged as the gold standard…
-
Abu Dhabi Guidelines Offer Blueprint for Cybersecurity in Health
by
in SecurityNewsFollowing increasing attacks on healthcare organizations, the United Arab Emirates has refined its regulatory strategy for improving cybersecurity in healthcare. First seen on darkreading.com Jump to article: www.darkreading.com/cyber-risk/abu-dhabi-guidelines-offer-blueprint-cybersecurity-health
-
Smashing Security podcast #408: A gag order backfires, and a snail mail ransom demand
by
in SecurityNewsWhat happens when a healthcare giant’s legal threats ignite a Streisand Effect wildfire”¦ while a ransomware gang appears to ditch the dark web for postage stamps? First seen on grahamcluley.com Jump to article: grahamcluley.com/smashing-security-podcast-408/