FUJIFILM Corporation confirmed the company suffered a ransomware attack that disrupted its business operations. In the late evening of June 1, 2021, the company shut down all networks and servers to determine the extent and scale of the attack, and suspended all affected systems in coordination with their various global entities.
The White House has issued an open letter to companies, urging them to take immediate steps to prepare for ransomware attacks, following a string of cyberattacks that have halted the operations of many companies.
Threat actors are now not only encrypting critical business systems, but also backups. They’ve brought businesses to a standstill, leaving some non-operational and really, with no good options for recovery. In many cases, it’s been pay the ransom to obtain a decryption key — or go out of business.
Some opportunistic cybercriminals have taken advantage of the pandemic environment to breach both consumer and organizations’ data. These cybercriminals are using COVID-19-themed emails as an opportunity to unleash ransomware attacks on organizations and consumers. Here, we focus on Remote Workforce and Remote Learning as areas that cybercriminals will continue targeting in 2021 and beyond, and explore mitigation strategies that may help reduce cybersecurity risks related to these areas.
JBS USA - a global provider of diversified, food products, and leading processor of beef, pork and prepared foods in the U.S., Canada and Australia - has been the target of a cyberattack, affecting some of its servers supporting its North American and Australian IT systems.
Here are steps you can take to protect your enterprise against ransomware, limit the impact of a breach, understand where an attack can be stopped, and act fast if a hacker succeeds in gaining access.
The pandemic exposed the need for hospitals to shore up security fundamentals and infrastructure, re-think incident response plans, and use tools rationalization to reduce coverage gaps.
For years, healthcare providers lagged their corporate counterparts when it came to cybersecurity. Recently, they made up significant ground, recognizing the need to allocate sufficient funds, focus on fundamentals, and outsource functions they cannot cost-effectively perform in-house. Unfortunately, 2020 threw a huge wrench in the works.
With the Colonial Pipeline ransomware attacks that caused widespread East Coast fuel shortages still fresh in our minds, new WhiteHat Security research has found that application specific attacks are equally, if not more, likely than ransomware attacks.
In a breach notification letter filed with New Hampshire's Office of the Attorney General, Bose said that in early March 2021, the company "experienced a sophisticated cyber-incident that resulted in the deployment of malware/ransomware across" its "environment."
The FBI identified at least 16 Conti ransomware attacks targeting U.S. healthcare and first responder networks, including law enforcement agencies, emergency medical services, 9-1-1 dispatch centers, and municipalities within the last year. These healthcare and first responder networks are among the more than 400 organizations worldwide victimized by Conti, over 290 of which are located in the U.S.