Understanding the chief information security officer's role is critical to understanding what's going on in the world of cybersecurity, says cybersecurity consultant Steve Katz. Katz outlines the key roles of the CISO, including overseeing security operations and building the security backbone of an organization.
A malware that has so far mined over $100,000 in monero cryptocurrency is being hosted through Amazon Web Services, a Netskope researcher reports. The "Xbooster" malware threat is ongoing, and the malware is hard to detect, the researcher warns.
Ransomware called GandCrab is making the rounds through two exploit kits, MalwareBytes researchers report. Using two exploit kits is unusual, as is the demand for ransom to be paid using Dash cryptocurrency instead of Bitcoin, the researchers note.
Version 4.1.5 of the Cerber ransomware encrypts database files and in some cases "will terminate the database processes to ensure it can encrypt the files that were in use," said Trend Micro's Jon Clay. The new version attacks files related to health care, payroll and accounting database software, as well as database files from Oracle, MySQL and Microsoft Access, Trend Micro research states.
Proposed rules implementing the Medicare Access and CHIP Reauthorization Act contain no cybersecurity provisions or policies to help hospitals or health care providers prevent hacking or ransomware, says CynergisTek privacy attorney David Holtzman. The new rules simply carry over current privacy and security rules, Holtzman says.