Infosecurity News

Healthcare Orgs under Escalating Attack and Losing Patient Data
A full 62% admitted to experiencing an attack in the past 12 months.

CyberArk Acquires Cloud Security Provider Vaultive
Deal will see CyberArk advance privileged account security for the cloud

Two-Fifths of NHS Staff Break Policy Via WhatsApp Use: Report
Shadow IT challenge exposes patient data to risk, says CommonTime

Fileless Malware Soars as Healthcare Suffers in Q4
McAfee spots eight new threats every second

Crypto-Exchange Offers $250K Reward for Info on Attackers
Firm gets proactive with $10m in reserves to help spur arrests

RedisWannaMine Uses NSA Exploit to Up the Crypto-Jacking Game
A new generation of crypto-jacking significantly improves on the unsophisticated mining campaigns seen so far.

SIA Launches Women in Security Forum
The forum will focus on programs, professional development and networking to expand female representation.

Slingshot APT Actor Shoots onto the Scene
The likely state-sponsored group is taking aim at the Middle East and Africa.

Universities Lag in DMARC Adoption
Only 11.2% have adopted the DMARC email security framework.

China Backdated Bug Disclosures to Hide State Hacking: Report
Don’t trust Beijing’s national vulnerability database, says Recorded Future

ICO Raids Addresses in Nuisance Text Investigation
Consumers bombarded with 11 million unsolicited SMS messages

Massive Coin-Mining Attempt Targets Nearly Half a Million PCs
Dofoil uses a customized mining application that supports NiceHash, so it can mine different cryptocurrencies.

Hidden Cobra Coils and Strikes at Turkish Banks
The campaign is using the Bankshot malware implant.

Memcached Flaw Kill Switch Could Foil DDoS-ers
Countermeasure said to be 100% effective on attacking servers

US DHS Slammed for Infosecurity Deficiencies
OIG report highlights systemic weaknesses

EFF: FBI Paid Geek Squad Employees as Informants
Rights group has concerns over possible Fourth Amendment violations

Half of All Orgs Hit with Ransomware in 2017
Of the companies that refused to pay the ransom, a full 87% recovered their data.

FlawedAmmyy RAT Takes Over Desktops
The RAT creates opportunities for actors to steal customer data, proprietary information and more.

Mobile Ad Trojans Evolve to Maximize Profits
With root privileges, they can secretly install various applications or bombard an infected device with ads to make use of the smartphone impossible.

Experts: UK Gov’s IoT Security Guidelines Must Go Further
Security industry wants more than voluntary guidelines



