North Korean hackers have been targeting South Korean defense companies for over a year, stealing technical data and compromising their systems. The hacks were carried out by three hacking groups known to be backed by the North Korean state: Lazarus Group, Kimsuky, and Andariel. The stolen data includes sensitive information related to weapons systems and other defense technologies. South Korea’s defense industry has emerged as a major player in the global arms trade, making it a prime target for cyberattacks.
Results for: Cybersecurity
UnitedHealth has disclosed that a cyberattack on its Change Healthcare business earlier this year may have compromised personal information of a significant portion of the US population. The company stated that while medical records or complete medical histories do not appear to have been breached, some screenshots containing protected health information were posted on the dark web. UnitedHealth emphasized that it is still assessing the impact and will provide updates as they become available. Free credit monitoring and identity theft protection are being offered to affected individuals.
UnitedHealth Group Inc. disclosed that personal information of a substantial portion of Americans may have been compromised in a cyberattack that targeted its Change Healthcare business earlier this year. The company emphasized that there are no indications that full medical histories or doctor charts were released, but it could take months to identify and notify those affected. UnitedHealth confirmed that screenshots containing protected health information and personally identifiable information were briefly posted on the dark web, and the company is closely monitoring the situation. Affected individuals will receive free credit monitoring and identity theft protection while UnitedHealth continues to restore services disrupted by the attack. The healthcare giant has also provided billions of dollars in financial assistance to healthcare providers impacted by the incident.
The role of the Chief Information Security Officer (CISO) has evolved beyond ensuring compliance to providing risk-based assessments and mitigation options to the board of directors. To effectively counsel the board, CISOs must translate data into real business risk, assess risk through a board perspective with data-driven evidence, put risk in the context of business objectives, and make actionable recommendations that move the needle. This enhanced CISO-board relationship fosters a comprehensive understanding of risks, enabling organizations to successfully navigate the evolving threat landscape in the context of business objectives.
CompTIA, the world’s leading information technology (IT) certification and training body, announced today that eight of its certifications are included in U.S. Department of Defense efforts to create, qualify and upskill a more diverse workforce to protect the nation’s interests, information and infrastructure. The eight CompTIA certifications approved for DoDM 8140.03 cover 31 different work roles within the DoD cyber workforce. These certifications are vendor-neutral, internationally recognized and accredited by the American National Standards Institute (ANSI) to comply with the ISO 17024 standard.
In this segment, we cover three major news stories: 1) UnitedHealth Group (UNH) has confirmed that personal data was compromised in a recent cyberattack on its Change Healthcare unit. The company is providing support services and advising people to monitor their financial statements for suspicious activity. 2) Chinese research institutes have been able to purchase Nvidia’s (NVDA) high-end artificial intelligence chips through resellers. The chips were embedded in server products made by Super Micro Computer (SMCI) and Dell Technologies (DELL), and the sale and purchase of these chips are not illegal in China. However, the U.S. has banned Nvidia and its partners from selling high-end chips to China, and the U.S. Commerce Department is monitoring diversions of restricted chips. 3) The New York Stock Exchange (NYSE), owned by Intercontinental Exchange (ICE), has started polling market participants on their interest and potential implications for an exchange that trades stocks 24/7. The survey underscores increasing interest in trading stocks in off-hours and comes after 24 Exchange, backed by Steven Cohen’s Point72 hedge fund, applied with the Securities and Exchange Commission to start the first 24-hour exchange. Wall Street’s major market averages were able to rebound on Monday, with the Nasdaq (COMP:IND) being the strongest performer ending higher by 1.1%. All of the 11 S&P sectors ended trading higher on Monday with Tech and Financials on top.
Digital advertising tools and PR platforms enhance brand communication, but it’s crucial to address potential threats like malvertising. Malvertising is a technique that spreads malware through ads on reputable websites, exploiting user trust and causing damage through data theft, financial fraud, or ransomware attacks. Understanding malvertising tactics and implementing prevention strategies is essential for protecting against such threats. Modern PR and ad platforms must prioritize cybersecurity measures, while users should exercise caution and utilize security tools like ad blockers, DNS firewalls, and antivirus software to safeguard their devices and data from malicious content.
North Korean hacking groups have been relentlessly targeting South Korean defense companies for over a year, breaching their networks and stealing technical data. This ongoing cyber offensive has been attributed to Lazarus, Kimsuky, and Andariel, groups linked to North Korea’s intelligence apparatus.
The Russia-Ukraine war has highlighted the intertwined relationship between civil and military technology. SpaceX’s Starlink satellite communication service has played a critical role in supporting Ukrainian operations, while Microsoft has aided in defending against cyberattacks. However, Starlink has faced scrutiny regarding outages, and Russian forces have reportedly misused it. This article analyzes the implications of using civil technology in warfare, the evolving role of the private sector in developing technologies, and the challenges it poses for democracies.
archTIS Ltd. has secured a contract to implement its Kojensi platform for an Australian national security agency in collaboration with cyber technology firm Penten. The deal marks archTIS’ first sale as a subcontractor to Penten and will generate annual recurring revenue of A$264,000 along with implementation services worth A$202,840.