article thumbnail

Giant health insurer struck by ransomware didn't have antivirus protection

Malwarebytes

The Philippine Health Insurance Corporation (PhilHealth), has confirmed that it was unprotected by antivirus software when it was attacked by the Medusa ransomware group in September. The organisation deserves praise for recovering its systems swiftly and for refusing to pay the ransom demand, which is reported to be around $300,000.

Antivirus 105
article thumbnail

Foreign hackers breached Russian federal agencies, said FSB

Security Affairs

FSB National Coordination Center for Computer Incidents (NKTsKI) revealed that foreign hackers have breached networks of Russian federal agencies. Attackers gained access to mail servers, electronic document management servers, file servers, and workstations of various levels to steal data of interest.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Mysterious custom malware used to steal 1.2TB of data from million PCs

Security Affairs

million computers. These included logins for social media, online games, online marketplaces, job-search sites, consumer electronics, financial services, email services, and more. The software includes illegal Adobe Photoshop 2018, a Windows cracking tool, and several cracked games.” “The data was collected from 3.25

Malware 112
article thumbnail

Wannacry, the hybrid malware that brought the world to its knees

Security Affairs

In the early afternoon of Friday 12 May 2017, the media broke the news of a global computer security attack carried out through a malicious code capable of encrypting data residing in information systems and demanding a ransom in cryptocurrency to restore them, the Wannacry ransomware. About the author: Salvatore Lombardo.

Malware 97
article thumbnail

How to Protect New Remote Workers Against Cybercrime

SecureWorld News

It is important that your VPN should use multi-factor authentication (MFA) rather than just usernames and passwords. This should begin with penetration testing, which is the assessment of computer networks, systems, and applications to identify and address security weaknesses. Advanced cybersecurity software. Final thoughts.

article thumbnail

Tax Identity Theft: A Comprehensive Guide

Identity IQ

Use Strong Passwords and Consider Multi-Factor Authentication Utilize a strong password that includes various numbers, symbols, and upper- and lower-case letters, especially using tax preparation software. Also, consider multi-factor authentication to provide extra protection.

article thumbnail

Happy 13th Birthday, KrebsOnSecurity!

Krebs on Security

You just knew 2022 was going to be The Year of Crypto Grift when two of the world’s most popular antivirus makers — Norton and Avira — kicked things off by installing cryptocurrency mining programs on customer computers. ” The employees who kept things running for RSOCKS, circa 2016. Elizabeth Warren (D-Mass.)