vulnerability Blog Terms - Page 2 of 2 - Attivo Networks

vulnerability

Ransomware Attack on Texas Clinic Affects 33k, Some Patient Records Lost

A ransomware attack on Grand Prairie, Texas-based Rainbow Children’s Clinic in early August reportedly affected 33,638 patients, according to Information Management.

On Aug. 3, a hacker launched a ransomware attack on the clinic’s computer system, encrypting data on the clinic’s servers. Rainbow Children’s Clinic attempted to quickly shut down its system, but an investigation conducted by a forensic expert proved a number of patient records had been deleted, reports Healthcare Finance News.

The potentially “irretrievably deleted” records may include patients’ names, addresses, dates of birth, Social Security numbers, medical information and payment guarantors.

Read More>>

LizardStresser IoT botnet launches 400Gbps DDoS attack

By targeting internet of things (IoT) devices using default passwords, the botnet has grown large enough to launch a 400 gigabits per second (Gbps) attack without any form of amplification.

The attackers simply used the cumulative bandwidth available to the IoT devices they have infected with the LizardStresser malware.

The malware was created by the Lizard Squad DDoS group, which published its source code in early 2015, enabling other aspiring DDoS attackers to build their own botnets.

FDA Issues More Medical Device Security Guidance

New proposed cybersecurity guidance from the Food and Drug Administration is an important step in getting medical device manufacturers more focused on the risks posed by their products as they’re used in healthcare settings, security experts say.

The draft guidance on postmarket cybersecurity, issued on Jan. 15, follows the FDA’s release in October 2014 of a similar document urging medical device makers to address cybersecurity risks in the pre-market design of their products (see FDA Issues Medical Device Security Guide).

Companies look beyond firewalls in cyber battle with hackers

With firewalls no longer seen as enough of a defense against security breaches, companies are looking at new tools to foil hackers trying to enter a computer network.

U.S. and Israeli startups are leading the way, with new approaches such as “honeytraps” that lure a hacker to fake data or “polymorphic” technology that constantly changes the structure of applications running on a computer.

Some of the technology is still in the early stages and it remains to be seen whether it will be good enough to outfox the hackers.

Data Breaches Now In-Line With 2014 Record Pace

The latest account from the Identity Theft Resource Center (ITRC) reports that there has been a total of 717 data breaches recorded through December 1, 2015, and that more than 176 million records have been exposed. The annual total includes 21.5 million records exposed in the attack on the U.S. Office of Personnel Management (OPM) in June and 78.8 million health care customer records exposed at Anthem in February.

The total number of breaches jumped by 27 incidents from the prior report on November 24, bringing the total number of incidents to date this year to within two of the 719 incidents as of the same period in 2014. The ITRC recorded 783 breaches last year, and that total could easily be topped in the last month of this year.

Adobe to Patch Hacking Team’s Flash Zero-Day

Adobe Systems Inc. says its plans to issue a patch on Wednesday to fix a zero-day vulnerability in its Flash Player software that is reportedly being exploited in active attacks. The flaw was disclosed publicly over the weekend after hackers broke into and posted online hundreds of gigabytes of data from Hacking Team, a controversial …

Adobe to Patch Hacking Team’s Flash Zero-Day Read More »

The Anatomy of a Cyber Attack on Government Systems

With fewer resources than the private sector, yet faced with the same threats, the U.S. government is dealing with a complex dilemma. Both the public and government employees demand accountability for data breaches, but few understand the challenges that federal CIOs face – hiring and keeping specialized talent, paying for the hardware and software, and …

The Anatomy of a Cyber Attack on Government Systems Read More »

Scroll to Top