KIEV — A power failure that plunged parts of western Ukraine into the dark last month was caused by a cyberattack, IT experts said Tuesday, and one source called it a world first. The blackout, which hit a large part of the western region of Ivano-Frankivsk on December 23, was due to a computer virus, they said....
TIMESOFISRAEL
READ MORE
|
There’s little doubt the healthcare industry’s perception of security and compliance has changed to a serious one within the past few years. While regulatory demands and business needs are certainly strong drivers, what should healthcare organizations be focusing on as cybersecurity threats grow in stature?...
HEALTHITSECURITY
READ MORE
|
Five-year old startup Duo Security has emerged as a leader in providing secure but easy-to-use two-factor authentication technology to a fast-growing number of enterprise customers. To bolster its growth, the company has raised $12 million in Series B financing from Benchmark, and has added general partner Matt Cohler to its board....
TECHCRUNCH
READ MORE
|
The Lazarus APT group has been observed to be using a new malware that goes after Linux systems.
This malware is a Remote Access Trojan (RAT) dubbed Dacls that can also impact Windows devices. Also known as the HIDDEN COBRA, the Lazarus APT group is said to have surged in 2014 and 2015. The group has been active since at least 2009 and usually used tailored malware in their attacks.Several major attacks including the WannaCry ransomware attack and the Sony Pictures hack are said to be lau...
CYWARE
READ MORE
|
technology officer of Dell EMC‘s federal business, has said cybersecurity and digital transformation are two areas that will trend in the federal information technology sector in 2017 as the next administration takes office. Chehreh told ExecutiveBiz in an interview published Tuesday that cloud will have a major role in government agencies’ digital transformation efforts due to potential cost savings and flexibility in operations. He added that a “back to basics” approach...
GOVCONWIRE
READ MORE
|
In its second annual review of vulnerabilities and threat group activity specific to industrial control systems (ICS), Dragos found that the majority of the public vulnerability advisories it tracked in 2018 were network exploitable. The Year in Review is comprised of three parts: The Industrial Controls System Vulnerabilities Report, ICS Activity Groups and the Threat Landscape Report and, new this year, Lessons Learned from Hunting and Responding to Industrial Intrusions Reports, authored by D...
INFOSECURITY MAGAZINE
READ MORE
|