The Centers for Medicare and Medicaid Services has issued proposed "guardrails" to help ensure that the use of artificial intelligence for Medicare Advantage insurance plans does not result in inequitable access to healthcare-related services. The proposed rule will go into effect in 2026.
A threat actor is targeting Taiwanese companies using phishing emails and long-standing vulnerabilities to deliver SmokeLoader malware. The threat actor uses plugins for the infamous malware to directly attack systems rather than using SmokeLoader, as its name suggests, as a loader for other malware.
At least three National Health Service hospitals in U.K. are responding to recent cyber incidents, including a children's hospital and a heart and chest specialty hospital - both located in Liverpool - that share IT systems. INC Ransom claims to have stolen data from the two hospitals.
A suspected, prolific ransomware affiliate hacker and developer has been arrested on criminal charges in Russia, reported Kremlin media. Mikhail Pavlovich Matveev has been wanted by U.S. authorities since 2023 for his alleged participation in the LockBit, Hive and Babuk ransomware groups.
In the third episode of ISMG's "APAC Insights" series, Equicom Savings Bank's Rei Nikolai Magnaye and former Indian Navy cybersecurity expert Rishi Das explain why cyberpsychology matters and how quantum computing advances could threaten enterprise networks.
The European Commission on Thursday opened infringement procedures against 23 EU member states that missed a mid-October deadline for implementing the NIS2 Directive, as well 24 EU members that missed a Critical Entities Resilience Directive deadline.
Sonatype, Snyk and Black Duck remained atop Forrester's software composition analysis rankings as commoditization of core features has led to increased competition. Pressure in the market has increased due to both a saturation of core functionalities and license identification.
The privacy vendor market in India is evolving rapidly, as many vendors move from offering point solutions to embracing more integrated, platform solutions that can handle a broader range of privacy requirements, said Anirban Sengupta, partner, risk consulting practice with PwC.
Patrick Benoit, a seasoned security leader and CyberEdBoard member, advises security leaders to lead by example and not worry about showing any of their own vulnerabilities, not least when they make a mistake. "It's OK to fail or misstep … That's what makes you a stronger leader," he said.
In the latest weekly update, ISMG editors discussed Tornado Cash's landmark legal victory and what it means for crypto mixers, the impact of artificial intelligence on data privacy, and advancements in cybersecurity for which the industry can be thankful as it heads into 2025.
Researchers identified 20 critical vulnerabilities in a type of Advantech industrial-grade wireless access points that is widely deployed across critical infrastructure environments. Attackers could exploit the flaws to remotely executive code and create denials of service.
As quantum computing continues to evolve, cybersecurity professionals and enterprise leaders must grapple with a future where current encryption technologies - on which our entire digital infrastructure is built - may no longer be secure. What next steps must they take now?
Third-party access management poses significant cybersecurity risks in healthcare, but continuous identity management and monitoring can help mitigate those risks, said Jim Routh, chief trust officer at Saviynt.
Cybersecurity researchers have discovered the first-ever UEFI bootkit designed to target Linux systems and subvert their boot process for malicious purposes. The "Bootkitty" malware, first uploaded to VirusTotal this month, appears to be more "proof of concept" than full-fledged threat, they said.
President-elect Donald Trump's strong cryptocurrency support amid market volatility is raising concerns over potential conflicts of interest, with experts warning his agenda - including potential plans to appoint a White House crypto czar - could destabilize the economy and undermine public trust.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing bankinfosecurity.asia, you agree to our use of cookies.