The closure affects all 35 of the University of Mississippi Medical Center’s health clinics, which provide a range of care to patients from cancer treatment to chronic-pain management. The attack also caused the cancelation of elective procedures in what health officials said would be a “multi-day event.”
Tag: #cyberattacks
US emergency alert systems down after cyberattack • The Register
Various municipalities have issued near-identical advisories about the attack on the OnSolve CodeRED platform, now owned by Crisis24, which enables residents to receive real-time alerts for emergencies such as weather warnings, missing children, terror threats, and more.
Pentests once a year? Nope. It’s time to build an offensive SOC
In the real world, adversaries don’t operate in bursts. Their recon is continuous, their tools and tactics are always evolving, and new vulnerabilities are often reverse-engineered into working exploits within hours of a patch release.
So, if your offensive validation isn’t just as dynamic, you’re not just lagging, you’re exposed.
Online scams easy as ever, as cybercrime markets flourish
Cybercriminals are often portrayed in popular media as rogue and highly skilled individuals, wielding coding and hacking abilities from a dimly lit room. But such stereotypes are becoming outdated.
US Coast Guard paychecks delayed by cyberattack | TechRadar
A data breach has affected the personnel and payroll systems of the US Coast Guard, and has impacted member pay, and forced the agency to to take systems offline to prevent further intrusion until “at least February 19th, 2025”.
JPCERT shares Windows Event Log tips to detect ransomware attacks
The investigation strategy proposed by JPCERT/CC covers four types of Windows Event Logs: Application, Security, System, and Setup logs.
How to manage shadow IT and reduce your attack surface
There is a reason why a lot of organizations shy away from people bringing their own devices to work. https://www.bleepingcomputer.com/news/security/how-to-manage-shadow-it-and-reduce-your-attack-surface/
Microsoft warns of ransomware attacks on US healthcare | CSO Online
The threat actor borrowed initial access from a third-party infection to effect lateral movement within the victim system and place INC encryption on their network.
The cyberattack cycle: First comes outage, next comes phishing
Threat Actors are quick to try to take advantage of tech issues, much in the same way “repair scammers” jump in after storms cause damage at homes. https://www.securityintelligence.com/news/cyberattack-cycle-first-outage-then-phishing/
Revolver Rabbit gang registers 500,000 domains for malware campaigns
A cybercriminal gang that researchers track as Revolver Rabbit has registered more than 500,000 domain names for infostealer campaigns that target Windows and macOS systems.