Add this to the list of things I missed last week. Nathan Salminen and Ryan Campbell write: Last week, the National Institute of Standards and Technology (NIST) released a “quick-start guide” to facilitate due diligence assessments from a cyber supply chain risk management perspective. The guide helps companies navigate due diligence under the agency’s Special…
Remarks at a UN Security Council Briefing on Ransomware Attacks against Hospitals and Other Healthcare Facilities and Services
Anne Neuberger Deputy National Security Advisor of the United States New York, New York November 8, 2024 AS DELIVERED Thank you, Mr. President. Good morning. My name is Anne Neuberger and since 2021, I have had the privilege of coordinating the United States’ national security policy on cyber and emerging technologies. I am honored to…
Still in the dark: A “500 marker” is updated, but too many still aren’t. Is HHS doing anything about this??
In March 2024, LockBit3.0 added Redwood Coast Regional Center (RCRC) to its leak site. On May 3, RCRC notified HHS of the March 6 incident, reporting that 500 patients had been affected. RCRC only recently updated that report to indicate that 24,937 patients were affected. On or about November 5, they began mailing out letters…
In the midst of restructuring, Guardian Healthcare hit by ransomware attack
A recent article on the cybersecurity risks posed by mergers and acquisitions begins: When companies merge, it creates significant cybersecurity challenges in two main ways: firstly, challenges arise in integrating disparate security infrastructures, and secondly, an M&A transaction brings together diverse organizational cultures which presents its own challenges from a cyber perspective. Yet the limited…
Germany drafts law to protect researchers who find security flaws
Bill Toulas reports: The Federal Ministry of Justice in Germany has drafted a law to provide legal protection to security researchers who discover and responsibly report security vulnerabilities to vendors. When security research is conducted within the specified boundaries, those responsible will be excluded from criminal liability and the risk of prosecution. “Those who want…
Throwing caution to the winds, “kiberphant0m” tries to extort AT&T with Trump and Harris call llogs
While many of us were waking up to the election results yesterday, at least one person was busy trying to extort AT&T using the president-elect and current vice president’s call logs. In their post, “kiberphant0m” posted this demand concerning AT&T call logs: TRUMP & Vice President of the United States CALL LOGS — OFFICIAL WARNING…