Tag ransomware

Streamlining Zero Trust in Healthcare: Implementing Dynamic Policy Enforcement Through Risk Assessment Without Redesigning Networks

April 24, 2025
IoT Security / Zero Trust

The Shifting Landscape of Cybersecurity in Healthcare

In 2025, healthcare organizations are grappling with unparalleled cybersecurity threats. As operational technology (OT) environments come under increasing attack and the integration of IT and medical systems expands the potential for breaches, traditional security measures are falling short. Recent data reveals that the healthcare sector faced a record number of data breaches in 2024, compromising over 133 million patient records. The financial implications are severe, with the average cost of a healthcare data breach soaring to $11 million, making it the industry with the highest breach costs.

The tactics of cybercriminals have evolved significantly; they are now focused on compromising the very devices that provide patient care, rather than just stealing patient records. The risk has intensified, with ransomware accounting for 71% of attacks on healthcare organizations, resulting in an average operational downtime of 11 days per incident.

Automating Zero Trust in Healthcare: Enhancing Security Through Dynamic Policy Enforcement Without Overhauling Networks As of April 24, 2025, the cybersecurity landscape within the healthcare sector is facing increasingly complex challenges. Healthcare organizations are grappling with significant threats exacerbated by the targeting of operational technology (OT) environments and the merging…

Read More

Streamlining Zero Trust in Healthcare: Implementing Dynamic Policy Enforcement Through Risk Assessment Without Redesigning Networks

April 24, 2025
IoT Security / Zero Trust

The Shifting Landscape of Cybersecurity in Healthcare

In 2025, healthcare organizations are grappling with unparalleled cybersecurity threats. As operational technology (OT) environments come under increasing attack and the integration of IT and medical systems expands the potential for breaches, traditional security measures are falling short. Recent data reveals that the healthcare sector faced a record number of data breaches in 2024, compromising over 133 million patient records. The financial implications are severe, with the average cost of a healthcare data breach soaring to $11 million, making it the industry with the highest breach costs.

The tactics of cybercriminals have evolved significantly; they are now focused on compromising the very devices that provide patient care, rather than just stealing patient records. The risk has intensified, with ransomware accounting for 71% of attacks on healthcare organizations, resulting in an average operational downtime of 11 days per incident.

Dialysis Provider Informs Federal Authorities of Cyberattack Impacting Nearly 2.7 Million Patients

Data Breach Notification, Data Security, Fraud Management & Cybercrime DaVita’s Stolen Data Surfaced on Dark Web Following Ransomware Attack by Interlock Marianne Kolbasuk McGee ( HealthInfoSec) • August 22, 2025 Image: DaVita In a troubling development for patient data security, DaVita disclosed to federal authorities that a cyberattack attributed to…

Read MoreDialysis Provider Informs Federal Authorities of Cyberattack Impacting Nearly 2.7 Million Patients

African Authorities Break Up Major Cybercrime and Fraud Rings, Seize Millions – DataBreaches.Net

INTERPOL’s Operation Results in 1,209 Arrests in Cybercrime Crackdown LYON, France – A coordinated effort by INTERPOL, dubbed Operation Serengeti 2.0, has led to the arrest of 1,209 cybercriminals across Africa, targeting nearly 88,000 victims. This extensive operation highlights the pervasive nature of cybercrime and emphasizes the necessity for international…

Read MoreAfrican Authorities Break Up Major Cybercrime and Fraud Rings, Seize Millions – DataBreaches.Net

Moldovan Police Detain Suspect Linked to €4.5 Million Ransomware Attack on Dutch Research Institution

May 13, 2025
Cybercrime / Ransomware

Authorities in Moldova have arrested a 45-year-old foreign national suspected of orchestrating multiple ransomware attacks against Dutch businesses in 2021. “He is wanted internationally for various cybercrimes, including ransomware attacks, blackmail, and money laundering targeting firms in the Netherlands,” officials stated on Monday. As part of the operation, police confiscated over €84,000 ($93,000) in cash, an electronic wallet, two laptops, a mobile phone, a tablet, six bank cards, two data storage devices, and six memory cards. While the suspect’s identity remains undisclosed, he was apprehended during a search of his residence in Moldova. Notably, he is accused of launching a ransomware attack on the Netherlands Organization for Scientific Research (NWO) in February 2021, resulting in damages estimated at €4.5 million. This incident also led to the leak of internal documents.

Moldovan Authorities Apprehend Suspect Linked to €4.5 Million Ransomware Assault on Dutch Research Agency On May 13, 2025, Moldovan law enforcement announced the arrest of a 45-year-old foreign national believed to be intricately involved in a series of ransomware attacks that targeted companies in the Netherlands during 2021. This individual,…

Read More

Moldovan Police Detain Suspect Linked to €4.5 Million Ransomware Attack on Dutch Research Institution

May 13, 2025
Cybercrime / Ransomware

Authorities in Moldova have arrested a 45-year-old foreign national suspected of orchestrating multiple ransomware attacks against Dutch businesses in 2021. “He is wanted internationally for various cybercrimes, including ransomware attacks, blackmail, and money laundering targeting firms in the Netherlands,” officials stated on Monday. As part of the operation, police confiscated over €84,000 ($93,000) in cash, an electronic wallet, two laptops, a mobile phone, a tablet, six bank cards, two data storage devices, and six memory cards. While the suspect’s identity remains undisclosed, he was apprehended during a search of his residence in Moldova. Notably, he is accused of launching a ransomware attack on the Netherlands Organization for Scientific Research (NWO) in February 2021, resulting in damages estimated at €4.5 million. This incident also led to the leak of internal documents.

Ransomware Groups Exploit Unpatched SimpleHelp Vulnerabilities for Double Extortion Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported on Thursday that ransomware criminals are taking advantage of unpatched SimpleHelp Remote Monitoring and Management (RMM) systems to compromise clients of an unnamed utility billing software provider. “This incident highlights a growing trend of ransomware groups exploiting unpatched versions of SimpleHelp RMM since January 2025,” the agency stated in an advisory. Earlier this year, SimpleHelp identified several vulnerabilities (CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726) that could lead to information disclosure, privilege escalation, and remote code execution. These vulnerabilities have been actively exploited, including by ransomware groups like DragonForce, to breach specific targets. In a recent report, Sophos revealed that a Managed Service Provider’s SimpleHelp system was compromised by threat actors using these flaws.

Ransomware Groups Exploit Unpatched SimpleHelp Vulnerabilities, Targeting Utility Billing Software Clients On June 13, 2025, the U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported a growing threat posed by ransomware actors leveraging unpatched vulnerabilities in SimpleHelp Remote Monitoring and Management (RMM) software to compromise victims associated with an unnamed utility…

Read More

Ransomware Groups Exploit Unpatched SimpleHelp Vulnerabilities for Double Extortion Attacks

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) reported on Thursday that ransomware criminals are taking advantage of unpatched SimpleHelp Remote Monitoring and Management (RMM) systems to compromise clients of an unnamed utility billing software provider. “This incident highlights a growing trend of ransomware groups exploiting unpatched versions of SimpleHelp RMM since January 2025,” the agency stated in an advisory. Earlier this year, SimpleHelp identified several vulnerabilities (CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726) that could lead to information disclosure, privilege escalation, and remote code execution. These vulnerabilities have been actively exploited, including by ransomware groups like DragonForce, to breach specific targets. In a recent report, Sophos revealed that a Managed Service Provider’s SimpleHelp system was compromised by threat actors using these flaws.

Accounting Firm Settles for $175K with Federal Authorities Over HIPAA Ransomware Breach

Data Privacy, Data Security, Healthcare <span class=”article-sub-title”>Settlement Includes Corrective Action Plan Aimed at Enhancing Risk Analysis</span> <span class=”article-byline”> <a class=”author-link” href=””>Marianne Kolbasuk McGee</a> (<a href=””><i class=”fa fa-twitter”/>HealthInfoSec</a>) • <span class=”text-nowrap”>August 18, 2025</span> <a href=””/> </span> <figure> <img src=”” alt=”Accounting Firm Pays Feds $175K for HIPAA Ransomware Breach” class=”img-responsive”/> <figcaption>Image: BST</figcaption>…

Read MoreAccounting Firm Settles for $175K with Federal Authorities Over HIPAA Ransomware Breach

NY State Imposes $2M Fine on Dental Plan Company for Phishing Breach

Data Privacy, Data Security, Healthcare Healthplex, a UnitedHealth Group Subsidiary, Fined for Lacking MFA on Compromised Email Account Marianne Kolbasuk McGee (HealthInfoSec) • August 18, 2025 New York State fined a dental plan administrator owned by insurer UnitedHealth Group $2 million for failing to protect data with multifactor authentication. (Image:…

Read MoreNY State Imposes $2M Fine on Dental Plan Company for Phishing Breach