Lawsuit Claims Insurer Owes Retailer for Coverage of Card Replacement CostsTarget has filed a lawsuit against its long-time insurer, ACE American Insurance Co., in an attempt to recoup money it spent to replace payment cards as part of settlements over the retailer’s massive 2013 data breach. Find out how much money the company is seeking.
Two rules proposed by federal regulators could provide significant help to strengthen cybersecurity in the healthcare ecosystem, says regulatory attorney Julie Kass of the law firm Baker Donelson.
Fed Warns These Cryptocurrencies Could Be Used for Money Laundering, Terrorism FinancingThe U.S. Federal Reserve is warning that the increasing use of cryptocurrencies known as “stablecoins,” without proper safeguards and regulations, could pave the way for crime, including money laundering and terrorism financing.
The Internet Systems Consortium (ISC) has released a security advisory that addresses a vulnerability affecting multiple versions of ISC Berkeley Internet Name Domain (BIND). A remote attacker could exploit this vulnerability to cause a denial-of-service condition. The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the ISC advisory for more information… Continue Reading ISC Releases Security Advisory for BIND
Microsoft has released an update to address a vulnerability in Outlook for Android. An attacker could exploit this vulnerability to take control of an affected system. The Cybersecurity and Infrastructure Security Agency (CISA) encourages users and administrators to review the Microsoft Security Advisory and apply the necessary update.
Infections Spread Not Via Microsoft Teams, But By Stolen Active Domain CredentialsDopplepaymer ransomware, despite ongoing rumors, is not being spread via the Teams collaboration platform or BlueKeep remote desktop protocol flaws, Microsoft says. But it warns that the damaging crypto-locking code is being spread via stolen Active Directory administrator credentials.
A common misconception most people have about cyber attackers is that they use only highly advanced tools and techniques to hack into people’s computers or accounts. This is simply not true. Cyber attackers have learned that often the easiest way to steal your information, hack your accounts, or infect your systems is by simply tricking… Continue Reading Trust Your Instincts
What Do They Have in Common? Difficult RecoveryA ransomware attack against a chain of veterinary medicine clinics plus an attack against a New York hospital show this threat remains pervasive, victims are diverse and recovery is difficult.
This Is What You Can Do Today to Create Immediate, Measurable Security BenefitsDeveloping a mature security program takes time, but I’ve met many forward-thinking security leaders who’ve made swift and lengthy strides in protecting their clients’ data. With those lessons in mind, here are five things any organization can do today to create immediate, measurable… Continue Reading 5 Things All Smart Security Leaders Need to Do Right Now