Despite being only moderately skilled, CopyKittens has exfiltrated large volumes of data since at least 2013. It doesn’t always take a highly skilled adversary to create major problems for organizations. Sometimes, unsophisticated but persistent threat actors can be just as effective at it. One example is CopyKittens, a cyber espionage group with links to Iran […]

The WannaCry, Petya and NotPetya attacks show that cybercriminals can do a lot of damage in healthcare. Then there are the countless hacks and attempted hacks that healthcare CIOs and CISOs must deal with on a daily basis that don’t get all the attention of the high-profile assaults. Cybersecurity is a deadly important business in […]

Patient information can be vulnerable when health care facilities are the focus of cyberattacks. Eric Audras/Onoky/Getty Images hide caption toggle caption … read more at:

SINGAPORE — One of Ms Ong Ray Yi’s most distinct childhood memories was when her father took her to his workplace at the research and development unit at tech giant Apple, and showed her a circuit board. That was probably where the first seeds were sown in developing her interest in engineering, for she was […]

Security company McAfee is using this week’s Black Hat conference to release a new report examining the role of cyber threat hunting and the evolution of the security operations center (SOC). Among its findings are that on average, 71 percent of the most advanced SOCs closed incident investigations in less than a week and 37 […]

With recent large-scale cyber attacks signaling a growing front in destructive threats and business impact, a new midyear report from iDefense, part of Accenture Security, reveals how threat actors are continuing to evolve their ability to avoid detection. The 2017 Cyber Threatscape Report examines key trends during the first half of 2017 and explores how […]