Health care providers dig out from ransomware attack
A Feb. 21 cyberattack against a Nashville, Tennessee-based medical-billing clearinghouse sent shock waves across Indiana’s health care system.
A Feb. 21 cyberattack against a Nashville, Tennessee-based medical-billing clearinghouse sent shock waves across Indiana’s health care system.
The U.S. government said Thursday that Russian government hackers who recently stole Microsoft corporate emails had obtained passwords and other secret material that might allow them to breach multiple U.S. agencies.
The sweeping bipartisan proposal would for the first time give consumers broad rights to control how tech companies like Google, Meta and TikTok use their personal data, a major breakthrough in the decades-long fight to adopt national online privacy protections.
The Cyber Safety Review Board describes shoddy cybersecurity practices, a lax corporate culture and a lack of sincerity about the company’s knowledge of the targeted breach, which affected multiple U.S. agencies that deal with China.
AT&T said that a dataset found on the “dark web” contains information including some Social Security numbers and passcodes for about 7.6 million current account holders and 65.4 million former account holders.
Targets included officials at the White House and multiple government agencies, including the Treasury and Commerce departments, senators from both parties, the spouse of a senior Justice Department official, political strategists, and political figures from around the world who were critical of the Chinese government.
The company said the outage was caused by a third-party technology provider and was not a cybersecurity issue.
The fallout is affecting hospitals, doctor offices, pharmacies and millions of patients across the nation, with government and industry officials calling it one of the most serious attacks on the health-care system in U.S. history.
A ransomware gang once thought to have been crippled by law enforcement has snarled prescription processing for millions of Americans over the past week, forcing some to choose between paying prices hundreds or thousands of dollars above their usual insurance-adjusted rates or going without lifesaving medicine.
Fundraising software company Blackbaud agreed Thursday to pay $49.5 million to settle claims brought by the attorneys general of 49 states and Washington, D.C., related to a 2020 data breach that exposed sensitive information from 13,000 not-for-profits.
While some MGM Resorts computer systems were still down, Caesars told federal regulators on Thursday that its casino and online operations were not disrupted.
The exposed information includes names, addresses, Social Security numbers, dates of birth, gender, medical conditions, diagnoses, medications, allergies, health conditions and more.
Their names, addresses, case numbers and Medicaid numbers were exposed in a contractor’s late May security breach, Indiana’s Family and Social Services Administration announced.
The funding round included participation from Indianapolis-based investors Elevate Ventures and VisionTech Partners.
The new rules also require publicly traded companies to annually disclose information on their cybersecurity risk management and executive expertise in the field. The idea is to protect investors.
Officials likened the new U.S. Cyber Trust Mark initiative to the Energy Star program, which rates appliances’ energy efficiency.
The confidential documents stolen from schools and dumped online by ransomware gangs are raw, intimate and graphic. Unlike for hospitals, no federal law exists to require notification from schools.
According to letters that the airlines were required to file with regulators, hackers gained access to names, birth dates, Social Security and passport numbers, and driver and pilot-license numbers of applicants for pilot and cadet jobs.
Chetrice Mosley-Romero, who was appointed as Indiana’s first cybersecurity director in 2017, will continue helping the state agencies and local government entities strengthen their cybersecurity postures.
Microsoft said the attackers were focused on “disruption and publicity” and likely used rented cloud infrastructure and virtual private networks to bombard Microsoft servers from so-called botnets of zombie computers around the globe.