Australian hospitals should hire the services of cybersecurity companies to ensure adherence to HIPAA security standards, and safeguard patients’ data.
Australian hospitals should hire the services of cybersecurity companies to ensure adherence to HIPAA security standards, and safeguard patients’ data.
Background The Log4Shell critical vulnerability in the widely used logging tool Log4j has caused concern beyond the cyber security community. This is because Log4j - rather than being a single piece of software - is a software component that’s used by millions of computers worldwide running online services....
Background Apache Log4j2 is a ubiquitous library used by millions for Java applications; the library is part of the Apache Software Foundation’s Apache Logging Services project. The vulnerability CVE-2021-44228, disclosed on December 9, 2021, allows for remote code execution against...
Background BlackMatter is a new ransomware threat discovered at the end of July 2021. BlackMatter is ransomware-as-a-service (Raas) tool that allows the ransomware's developers to profit from cybercriminal affiliates (i.e., BlackMatter actors) who deploy it against victims. This malware started...
Background The Microsoft Threat Intelligence Center (MSTIC) has released information on the uncovering of a widespread malicious email campaign undertaken by the activity group that Microsoft tracks as NOBELIUM. Nobelium, which operates from Russia, is the name given to the threat actor behind...
In the previous installation, we delved into the history of the primary victim, Kaseya and the bad actors, REvil. From previous exploits to the final and most devastating one, REvil is and will continue to be a force to reckon...
In 2019, Cybernetic Global Intelligence had warned about REvil. Refer to our previous blog on GandCrab ransomware: Is it back under a new REvil guise? The fourth of July celebrations in America this year were slightly different for around 1500 organizations...
From 22 February 2018, it became a requirement for certain data breaches, known as “eligible data breaches”, to be notified to the Australian Privacy Commissioner and affected individuals. Previously, it was not mandatory to supply notification of data breaches. A...
Hackers declaring culpability for a cyber-attack on care provider UnitingCare Queensland have been confirmed as one of the largest and far-reaching cyber ransom groups in the world. Hospitals in Australia and New Zealand have fallen victim to a huge cyber...
Cloud computing has been adopted by almost every organization due to its various benefits and work flexibility. However, with this adoption of the cloud, certain cybersecurity issues have been observed in cloud computing. Approximately 94% of organizations are moderate to...