article thumbnail

Pharmaceutical companies exploited by phishing scam targeting job seekers

IT Governance

Earlier this month, two major pharmaceutical giants issued warnings about phishing emails targeting job hunters. Unfortunately, red flags like that are ignored in all kinds of phishing scams, and this scheme is a perfect example of why that happens. For example, most ransomware attacks are spread via phishing emails.

article thumbnail

Resecurity Released a Status Report on Drug Trafficking in the Dark Web (2022-2023)

Security Affairs

Resecurity has identified multiple drug shops on the Dark Web providing customers with customized Android-based mobiles with pre-installed apps used for purchases and secure communications, as well as sending instructions to couriers. Resecurity noticed a sharp increase in demand for prescription pharmaceuticals.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Why You Need to Tune EDR to Secure Your Environment

eSecurity Planet

This allows EDR to deploy very quickly, but it also allows for a number of security vulnerabilities. Here we’ll discuss why EDR vendors choose these configurations, and how organizations can tune their EDR systems to fit their organization and improve security. Also read: 10 Top Active Directory Security Tools.

article thumbnail

How to protect healthcare and life-sciences data from a cyber attack pandemic

Thales Cloud Protection & Licensing

For example, the consulting company Mckinsey found that the usage of telehealth has grown 38 times if compared to the usage before the pandemic. A survey of 230 healthcare security leaders in China, Germany, Japan, the UK, and the US found that a whopping 82% of their healthcare organizations had experienced an IoT-focused cyberattack.

article thumbnail

Q&A: The drivers behind the stark rise — and security implications — of ‘memory attacks’

The Last Watchdog

Related: Memory hacking becomes a go-to tactic These attacks are referred to in the security community as “fileless attacks” or “memory attacks.” Merck had one of its pharmaceuticals delayed, which led to a global shortage. And there have been many examples where people have shorted companies that they knew were about to be attacked.

Security 118
article thumbnail

New Cybersecurity Directives (NIS2 and CER) Enter into Force

Hunton Privacy

For example, the concept of “essential entities” replaces “operators of essential services”; it is likely that most organizations classified as “operators of essential services” under the original NIS Directive will be classified as “essential entities” under the NIS2 Directive. Reporting of incidents. Enforcement.

article thumbnail

Intelligent Search – Strategies to Find What You Need

AIIM

Storing important information in a secure and compliant way. For many organizations, especially those in jargon-intense fields like the Oil and Gas, Pharmaceutical, or Healthcare industries, “speaking the right language” goes well beyond standard search terms. It all boils down to: Finding the right information when you need it.