Report: Russian Hackers Targeting Ukrainian Soldiers on Apps
Gov Info Security
by
7h ago
Russian Hackers Using Open-Source Malware on Popular Messaging Apps, Report Says Ukraine's Computer Emergency Response Team is warning in an April report that a Russian hacking group known as UAC-0184 is using open-source malware to target Ukrainian soldiers on popular messaging apps such as Signal, as concerns grow over the Kremlin’s advanced hacking capabilities ..read more
Visit website
HHS Beefs Up Privacy Protection for Reproductive Health Info
Gov Info Security
by
7h ago
Finalizes HIPAA Privacy Rule Changes Involving PHI Related to Reproductive Care Healthcare providers are prohibited from disclosing protected health information related to lawful reproductive healthcare, according to a final rule released Monday by federal regulators. The new HIPAA rule is designed to protect women who cross state lines seeking an abortion, and their providers ..read more
Visit website
Feds Issue Guide for Change Health Breach Reporting Duties
Gov Info Security
by
7h ago
HHS OCR Says the Company Has Not Yet Filed HIPAA Breach Reports to the Agency The Department of Health and Human Services has not yet received HIPAA breach reports from Change Healthcare or parent company UnitedHealth Group about their massive cyberattack. HHS is telling HIPAA-covered firms and their vendors to do their duty if a breach affects protected health information ..read more
Visit website
Study: GPT-4 Agent Can Exploit Unpatched Vulnerabilities
Gov Info Security
by
7h ago
Researchers Keep Prompts Under Wraps Academics at a U.S. university found that if you feed a GPT-4 artificial intelligence agent public security advisories, it can exploit unpatched "real-world" vulnerabilities without precise technical information. Researchers said OpenAI asked them not to publish their prompts ..read more
Visit website
UK ICO Weighs Role of 'Accuracy' in Generative AI
Gov Info Security
by
3d ago
But Accurate Data Doesn't Always Result In Accurate Outcomes The U.K. data protection agency says generative artificial intelligence developers should take steps to filter out inaccurate training data so long as their models disseminate information about people. How accurate a model must be depends on its use, the Information Commissioner's Office said ..read more
Visit website
Ransomware Victims Who Pay a Ransom Drops to Record Low
Gov Info Security
by
3d ago
Experts See Groups Shoot Themselves in the Foot by Yet Again Swindling Affiliates Here's ransomware news to celebrate: The number of victims who opt to pay a ransom has dropped to a record low. Also, the operators of two major groups hit by law enforcement disruptions have each chosen to swindle their affiliates, sowing disaffection and driving away burned business partners ..read more
Visit website
Lowest-Rung Attackers Challenging Ransomware-as-a-Service
Gov Info Security
by
3d ago
Christopher Budd on the Rise of Junk Gun Ransomware Variants Since June 2023, 19 junk gun ransomware variants have been discovered on the dark web. These cheap, independently produced and crudely constructed variants offer an attractive way for newer cybercriminals to get started in the ransomware world and are mostly effective against SMBs ..read more
Visit website
From $8.3B to $200M: Why Lacework Is Examining a Sale to Wiz
Gov Info Security
by
3d ago
Lacework Got the Largest Funding Round in Cyber History. Now, It's Eyeing the Exits Wiz is in advanced negotiations to buy Lacework for between $150 million and $200 million. The companies recently signed a letter of intent and are now in the midst of a comprehensive due diligence process, after which a decision will be made on whether the acquisition will go through ..read more
Visit website
Why Health Firms Struggle with Cybersecurity Frameworks
Gov Info Security
by
3d ago
Healthcare sector organizations often still struggle to implement security frameworks effectively, often not fully understanding the requirements or failing to integrate them into their overall cybersecurity strategy, said Keith Forrester of security firm Optiv, who offers tips to help ..read more
Visit website
Live Webinar | Modernizing Identity Management: From Legacy Systems to Cutting-Edge Security
Gov Info Security
by
3d ago
..read more
Visit website

Follow Gov Info Security on FeedSpot

Continue with Google
Continue with Apple
OR