The Office for Civil Rights is warning covered entities that they might be sharing protected health information with third-party tracking vendors like Facebook and Google through their use of pixel tech, in a manner that violates the Health Insurance Portability and Accountability Act.
Swiss seek mandatory reporting of cyberattacks on key infrastructure
ZURICH, Dec 2 (Reuters) - The Swiss government proposed on Friday making it mandatory to report cyberattacks on critical infrastructure as a way to help shed light on hackers and sound the alarm more widely.
Trigona ransomware spotted in increasing attacks worldwide
A previously unnamed ransomware has rebranded under the name 'Trigona,' launching a new Tor negotiation site where they accept Monero as ransom payments.
DOD Releases Path to Cyber Security Through Zero Trust Architecture
Nov. 28, 2022 - The Defense Department on Tuesday released its Zero Trust Strategy and Roadmap, which spells out how it plans to move beyond traditional network security methods to achieve reduced network attack surfaces, enable risk management and effective data-sharing in partnership environments, and contain and remediate adversary activities over the next five years.
Wave of cyber-enabled scams target FIFA World Cup fans
As the global tournament enters its second full week in Qatar, FIFA World Cup scams are proliferating as cybercriminals aim to score big from unsuspecting fans, according to data collected by cybersecurity firm Group-IB.
Cybercriminals look to exploit sports fans with World Cup-themed attacks
As the sports world’s attention turns its eyes to Qatar for the 2022 FIFA World Cup, threat actors are looking to cash-in or draw attention to their cause with attacks aimed at drawing unsuspecting fans who may be more distracted with rooting for their favored teams than cybersecurity.
New Business Email Compromise scam targets clients of victim companies
- BEC scammers impersonate CEOs of targeted companies and request an aging report and clients’ email addresses from employees.
- In this way, the scammers will obtain a company’s customer names, outstanding balances, and contact information.