Waqas reports: A joint advisory from the Federal Bureau of Investigation (FBI), Cybersecurity and Infrastructure Security Agency (CISA), and the Multi-State Information Sharing and Analysis Center (MS-ISAC) reveals the ongoing threat of Ghost ransomware, also known as Cring. Active since early 2021, this group, operating out of China, has targeted organizations in over 70 countries, impacting…
Author: Dissent
Medusa ransomware gang demands $2M from UK private health services provider
Iain Thomson reports: HCRG Care Group, a private health and social services provider, has seemingly fallen victim to the Medusa ransomware gang, which is threatening to leak what’s claimed to be stolen internal records unless a substantial ransom is paid. Previously known as Virgin Care and now owned by Twenty20 Capital, HCRG runs child and…
Privilege Under Pressure: The Shifting Data Breach Investigation Landscape
Jena M. Valdetero and Emily S. Taetzsch of Greenberg Traurig, LLP write that in recent years, federal courts have narrowed the scope of protection for forensic reports produced in response to data breaches. As part of her discussion, she cites the Capital One case in 2020, the Wengui case in 2021, the Rutter’s case a few…
Major IVF provider Genea suffers ‘cyber incident’ (1)
Update: On February 24, 2025, the Termite ransomware group claimed responsibility for the attack on Genea. On their darkweb leak site, they claim to have ~700gb of data from company’s servers such as confidential, personal data of clients. They posted a number of screenshots with patient records as proof of claims. ACS Information Age…
How federal rules on cybersecurity breach transparency for businesses were challenged in court in 2024
Dom DiFurio reports: In October, four companies collectively paid nearly $7 million as part of a settlement with the Securities and Exchange Commission for allegedly failing to properly inform investors of a cyberbreach affecting their companies, a liability American businesses have not previously faced. The companies were compromised in a cyberattack targeting their IT software provider in…
Cyberespionage groups or cybercriminals? UAV and C-UAV vendors and buyers are increasingly targeted
As Unmanned Aerial Vehicles (UAVs or “drones”) and Unmanned Aerial Systems (UAS) are increasingly deployed as part of military operations, there has also been an upsurge in counter-UAV (C-UAV) and counter-UAS technologies designed to detect and neutralize the threats they pose. Unsurprisingly, there has been an uptick in cyberespionage groups and cybercriminals attempting to acquire…