Blood donation service OneBlood has confirmed that the July 2024 ransomware attack claimed by the Russian RansomHub cybercrime group resulted in personal data breach.
Cyber Security
Cyber criminals, state-sponsored hackers and even the occasional disgruntled employee are constantly looking to gain unauthorized access for a variety of purposes: theft of money, cyber espionage, personal information for sale or for use in scams, and damage to critical infrastructure for just a few of the most common.
So how does an organization mitigate an entire world full of continual cyber attacks? Just as buildings have a number of necessary elements of physical security: access control, cameras, alarms and so on; there are similar key elements of cyber security that are absolutely vital for just about any modern business.
It starts with identifying and closing the most common doors that attackers use. For example, phishing attacks on employees are far and away the most common initial point of entry. The breach of even a low-level employee account can quickly turn into an escalation in access privileges and the ability to reach sensitive information. This is also true of smart devices, which are generally more poorly secured than computers and phones.
A recent breach of the US Treasury yielded access to Secretary Janet Yellen's computer along with those of two of her lieutenants, according to inside sources speaking to Bloomberg News reporters.
Just days before the inauguration ceremony, the outgoing Biden administration issued a sweeping cybersecurity executive order aimed primarily at improving the defenses of federal agencies and their contractors.
The UN’s aviation agency, the International Civil Aviation Organization (ICAO), suffered a data breach that leaked the personal information of nearly 12,000 job applicants.
EdTech firm PowerSchool suffered a significant data breach that leaked the sensitive personal information of students, teachers, and guardians, resulting in ransom payment.
A new proposal from the Home Office would prevent the NHS as well as schools and local councils from making ransomware payments, and certain limitations would also be put on private companies along with the public sector.
As cyber threats grow more sophisticated and regulatory fines for non-compliance hit record levels, the stakes for secure data management have never been higher. Yet, many organizations overlook one critical element: proper data destruction.
It’s not enough to understand how to leverage AI to improve productivity—it’s also important to understand the dangers that come along with it. Cybercriminals are already finding ways to use the technology to their own advantage, while lax AI policies are allowing data leakage to occur with worrying regulations.
The White House has launched the Cyber Trust Mark labeling program for connected devices to assist consumers in determining whether IoT products are cyber secure.
Zagg has disclosed a credit card data breach after an unauthorized third party injected malicious code into their BigCommerce platform via a third-party add-on, FreshClick.