Business ID Theft Soars Amid COVID Closures

Krebs on Security

To prove ownership over the hijacked firms, they hire low-wage image editors online to help fabricate and/or modify a number of official documents tied to the business — including tax records and utility bills.

SilverTerrier gang uses COVID-19 lures in BEC attacks against healthcare, government organizations

Security Affairs

The attacks targeted a major utility provider, a university, and a government agency in the United States, a health agency in Canada, a health insurance provider, an energy company in Australia, and a European medical publishing company to deliver various malware families.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

List of data breaches and cyber attacks in May 2021 – 116 million records breached

IT Governance

Doncaster-based One Call Insurance hit by ransomware (unknown) Ransomware attack on Swiss Cloud Computing AG (6,500) Wolfe Eye Clinic victim of Lorenz threat actors (unknown) One of the US’s largest pipelines shuts down to contain cyber security breach (unknown) J.

Scanning for Flaws, Scoring for Security

Krebs on Security

The stated use cases for the Cyber Risk Score include the potential for cyber insurance pricing and underwriting, and evaluating supply chain risk (i.e., But in a marketing email sent to FICO members on Tuesday advertising its new benchmarking feature, FICO accidentally exposed the FICO Cyber Risk Score of energy giant ExxonMobil.

State Attackers Moving from Stealing Data to Social Meddling

Ascent Innovations

The utilities and energy industries experienced high indicators of attack activity, suggests that attackers have access to critical infrastructure and are waiting to exploit this access. State actors tend to zero in on government agencies or utilities and energy targets. They look to steal credit card numbers from financial services & insurance companies or install malware on the critical systems used by healthcare companies.

How to Gain Valuable Insights from Untapped Data Using AI

Perficient Data & Analytics

There are several industries that have proven use cases for cognitive computing solutions: Insurance. Insurance. Energy & Utilities. You probably know your organization needs to invest in artificial intelligence (AI) solutions to take advantage of the deluge of data that mobile and digital users are creating, but do you know why or how? LEGACY ANALYTICS METHODS AREN’T EQUIPPED TO PROCESS ALL DATA TYPES.

NHTSA Set to Release New Automobile Cybersecurity Best Practices

Hunton Privacy

This letter came in response to an earlier request from the House Committee on Energy and Commerce (“Energy and Commerce Committee”) that NHTSA convene an industry-wide effort to develop a plan to address vulnerabilities posed to vehicles by On-Board Diagnostics (“OBD-II”) ports. OBD-II ports provide valuable vehicle diagnostic information and allow for aftermarket devices providing services such as “good driver” insurance benefits and vehicle tracking.

NHTSA Releases New Automobile Cybersecurity Best Practices

Hunton Privacy

The guidance, entitled Cybersecurity Best Practices for Modern Vehicles (the “Cybersecurity Guidance”), was recently previewed in correspondence with the House of Representatives’ Committee on Energy and Commerce (“Energy and Commerce Committee”). Furthermore, in its response to the Energy and Commerce Committee, NHTSA indicated that at their request, “SAE International has started a working group that is looking to explore ways to harden the OBD-II port.”.

GUEST ESSAY: HIPAA’s new ‘Safe Harbor’ rules promote security at healthcare firms under seige

The Last Watchdog

The Health Insurance Portability and Accountability Act — HIPAA — has undergone some massive changes in the past few years to minimize the burden of healthcare entities. The House Energy and Commerce Committee was a part of passing this bill stating that the OCR has issued severe penalties against organizations victimized by cyberattacks, in spite of how well organizations have employed industry best cybersecurity practices.

Innovative Solutions to Real Business Problems with Big Data from Space

CGI

We are particularly interested in the following markets and potential application areas, although good solutions in any business area are welcome: Energy: Submission to support site surveys, monitor pollution, or inform environmental regulatory requirements. Utilities: Submissions to monitor networks/assets for threats, target maintenance needs, or enable more efficient operations. Innovative Solutions to Real Business Problems with Big Data from Space. p.butler@cgi.com.

China Publishes Draft Regulations on Protecting the Security of Key Information Infrastructure

Hunton Privacy

This post has been updated. . On July 10, 2017, the Cyberspace Administration of China published a new draft of its Regulations on Protecting the Security of Key Information Infrastructure (the “Draft Regulations”), and invited comment from the general public. The Cybersecurity Law of China establishes a new category of information infrastructure, called “key [or critical] information infrastructure,” and imposes certain cybersecurity obligations on enterprises that operate such infrastructure.

The Internet of Things (IoT): Managing the Data Tsunami

Collibra

The Internet-of-Things has the potential to transform a range of industries – from automotive and agriculture through to healthcare, home appliances and insurance services. But exactly how that data is utilized (and potentially monetised) will differ across sectors. For example, data collected by wearable health-tracking devices has become of increasing importance and value to providers of life and medical insurance.