Jordan Shearer reports: Rochester Public Schools has clarified what it believes opened the door to the large-scale cyberattack that crippled the district’s operations this spring. Superintendent Kent Pekel spoke about the issue on Wednesday, Aug. 23, while giving a presentation about the district’s upcoming technology referendum in November. “We weren’t negligent,” Pekel said. “But clearly one of…
Category: Commentaries and Analyses
IoT Security Report Sheds Light on Hospitals’ Device Risks
Asimily, an Internet of Things (IoT) and Internet of Medical Things (IoMT) risk management platform, announced the availability of a new report: Total Cost of Ownership Analysis on Connected Device Cybersecurity Risk. The following is their press release: The full report highlights the unique cybersecurity challenges that healthcare delivery organizations (HDOs) face and the true…
FBI Identifies Cryptocurrency Funds Stolen by DPRK
[Press Release] The FBI is warning cryptocurrency companies of recent blockchain activity connected to the theft of hundreds of millions of dollars in cryptocurrency. Over the last 24 hours, the FBI tracked cryptocurrency stolen by the Democratic People’s Republic of Korea (DPRK) TraderTraitor-affiliated actors (also known as Lazarus Group and APT38). The FBI believes the…
Health Data Breach Lawsuits Surge as Cyberattacks Keep Climbing
Skye Witley and Christopher Brown report: Companies handling health data are fending off more cyberattacks each year, and those that do get hacked are facing costly litigation at rapidly rising rates, a Bloomberg Law analysis found. The monthly average of new class actions filed over health data breaches so far this year is nearly double…
A New Supply Chain Attack Hit Close to 100 Victims—and Clues Point to China
Andy Greenberg reports: Every software supply chain attack, in which hackers corrupt a legitimate application to push out their malware to hundreds or potentially thousands of victims, represents a disturbing new outbreak of a cybersecurity scourge. But when that supply chain attack is pulled off by a mysterious group of hackers, abusing a Microsoft trusted software…
Snatch Team starts really detailing their attacks and ups the ante for those who don’t pay up
Snatch Team has recently been exploring some novel uses of Telegram. Unlike other groups that use Telegram mainly to list new leaks, Snatch is providing commentaries and analyses of their breaches and more educational materials for readers. Some of their commentaries on specific incidents can be fodder for any lawsuits against the companies or entities…