This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
Pharmaceutical giant Cencora suffered a cyber attack and threat actors stole data from its infrastructure. Pharmaceutical giant Cencora disclosed a data breach after it was the victim of a cyberattack. The company discovered the security breach on February 21 and immediately launched an investigation into the incident.
The CyberNews investigation team discovered French pharmaceuticals distribution platform Apodis Pharma leaking 1.7+ Apodis Pharma is a company that offers a digital supply chain management platform and other software solutions created for pharmacies, healthcare institutions, pharmaceutical laboratories, and health insurance companies.
Biopharmaceutical company Supernus Pharmaceuticals discloses a ransomware attack, the Hive ransomware claims to have stolen company data. Biopharmaceutical company Supernus Pharmaceuticals confirmed it was the victim of a data breach after a ransomware attack that hit the firm last in Mid-November. “Supernus Pharmaceuticals, Inc.
Reddy's Laboratories Says Plants in Four Countries Affected Dr. Reddy's Laboratories, a multinational pharmaceutical company based in India that's testing a COVID-19 vaccine, says it isolated its data center services Thursday following what it calls a "detected cyberattack."
This week, the Japanese pharmaceutical giant Eisai has taken its systems offline in response to a ransomware attack. Eisai is a Japanese pharmaceutical company with about 10,000 employees and more than $5 billion in revenue. Eisai announced it is working to recover the impacted systems and determine the scope of the security breach.
Since August, FIN11 started targeting organizations in many industries, including defense, energy, finance, healthcare, legal, pharmaceutical, telecommunications, technology, and transportation. The post FIN11 gang started deploying ransomware to monetize its operations appeared first on Security Affairs. Pierluigi Paganini.
The attacks aimed at a Ministry of Health and a pharmaceutical company involved in the development of the COVID-19 vaccine. The systems at the pharmaceutical company were targeted with the BookCode malware, while in the attack against a Ministry of Health the APT group used the wAgent malware. . ” concludes Kaspersky.
million by a European pharmaceutical company, a European State reported. “A European Member State reported to Europol that one of their pharmaceutical companies had been defrauded of €6.64 The post Coronavirus: Europol arrests man behind €6M face masks and hand sanitisers scam appeared first on Security Affairs.
The company’s alert advises Gmail users to take several measures to secure their accounts, such as enrolling in the Advanced Protection Program, keeping software up to date, enabling Gmail 2-step verification , as well as using Google Authenticator and/or a physical security key for 2-step verification. Pierluigi Paganini.
Every week the best security articles from Security Affairs free for you in your email box. The post Security Affairs newsletter Round 292 appeared first on Security Affairs. A new round of the weekly SecurityAffairs newsletter arrived! Pierluigi Paganini. SecurityAffairs – hacking, newsletter).
While pharmaceutical companies worldwide are working on the research of a vaccine for the ongoing COVID19 pandemic, threat actors are conducting cyber espionage campaigns in the attempt of stealing information on the work. . “A CSIC spokesperson said that no theft has occurred at its Madrid research centers. Pierluigi Paganini.
Every week the best security articles from Security Affairs are free for you in your email box. A new round of the weekly SecurityAffairs newsletter arrived! Enjoy a new round of the weekly SecurityAffairs newsletter, including the international press.
“North Korean hackers have targeted at least six pharmaceutical companies in the U.S., “ Nation-state actors are targeting healthcare organizations “every single minute of every single day,” Marene Allison, the Chief Information Security Officer at Johnson & Johnson, said Thursday at the online Aspen Cyber Summit.
“Compromise of the pharmaceutical supply chain provides malicious actors opportunities for theft of US intellectual property, while public disclosure can cause cascading effects including loss of public trust in both chemical and healthcare institutions.” ” reads the alert. ” the alert continues.”The
The business of Omiya Kasei is divided into four major areas, manufacturing and designing chemical and industrial products, designing electronic materials, pharmaceutical development, and factory manufacturing. Multiple supply chains potentially impacted appeared first on Security Affairs. ransomware. Pierluigi Paganini.
Below the operation in numbers reported by the Europol: 121 arrests; €13 million in potentially dangerous pharmaceuticals seized; 326 00 packages inspected; 48 000 packages seized; 4.4 The post Operation Pangea: Europol dismantles criminal gangs selling coronavirus medicine, surgical masks appeared first on Security Affairs.
This week WebsitePlanet along with the researcher Jeremiah Fowler discovered an unsecured database, belonging to the US healthcare and pharmaceutical giant CVS Health, that was exposed online. The researchers responsible disclosed to CVS Health which promptly secured the archive the same day. reads a statement published by CVS Health.
In January, the Federal Bureau of Investigation (FBI), National Security Agency (NSA), US Cyber Command, and international partners released a joint Cybersecurity Advisory (CSA) to warn that Russia-linked threat actors are using compromised Ubiquiti EdgeRouters to evade detection in cyber operations worldwide. ” reported Trend Micro.
The cyber espionage activity attacks are aimed at organizations in the satellite, defense, and pharmaceutical sectors. Peach Sandstorm is an Iranian nation-state threat actor who has recently pursued organizations in the satellite, defense, and pharmaceutical sectors around the globe.” ” Microsoft concludes.
The cyber espionage activity attacks are aimed at organizations in the satellite, defense, and pharmaceutical sectors. Peach Sandstorm is an Iranian nation-state threat actor who has recently pursued organizations in the satellite, defense, and pharmaceutical sectors around the globe.” reads the report published by Microsoft.
Resecurity has identified multiple drug shops on the Dark Web providing customers with customized Android-based mobiles with pre-installed apps used for purchases and secure communications, as well as sending instructions to couriers. Resecurity noticed a sharp increase in demand for prescription pharmaceuticals.
At least two companies operating in pharmaceutical and manufacturing sectors have been affected. If the latter are the ones to blame, this marks the first time the gang has launched the attacks against pharmaceutical and manufacturing companies and may indicate a significant shift in their modus operandi. . ProxyBot and Silence.
Malicious Chrome browser extensions were used in a massive surveillance campaign aimed at users working in the financial services, oil and gas, media and entertainment, healthcare, government organizations, and pharmaceuticals. ” reads the analysis published by Awake Security. appeared first on Security Affairs.
Cybercrime organizations continue to be very active while pharmaceutical organizations are involved in the development of a COVID-19 vaccine and medicines to cure the infections. “Our research indicates a malicious ActiveX component that automatically runs in the background as soon as the user enables the document security control.”
According to the security firm, the group is financially motivated, its cyberespionage campaign hit high value targets such as government and educational institutions, religious movements, pro-democracy and human rights organisations in Hong Kong, Covid-19 research organisations, gambling and cryptocurrency companies, and the media.
Security experts from QuoIntelligence (QuoINT) firm reported that China-linked Winnti cyberespionage group targets South Korean video gaming company Gravity. The APT group targeted organizations in various industries, including the aviation, gaming, pharmaceuticals, technology, telecoms, and software development industries.
The ransomware targets South Korean healthcare, industrial, and pharmaceutical companies, its name comes from the name of the author ‘Gwisin’ (ghost in Korean). ” reads the report published by security firm Ahnlab. ” reads the report published by security firm Ahnlab. Source Ahnlab. Pierluigi Paganini.
Targeted sectors include: Automotive Clothing Conglomerates Electronics Engineering General Trading Company Government Industrial Products Managed Service Providers Manufacturing Pharmaceutical Professional Services. The post China-linked APT10 leverages ZeroLogon exploits in recent attacks appeared first on Security Affairs.
Pharmaceutical giant Cencora confirmed that the threat actors had access to personally identifiable information (PII) and protected health information (PHI) following the February 2024 cyberattack. On February 21, Cencora announced a data breach in a filing with the Securities and Exchange Commission (SEC).
The FBI, the Cybersecurity and Infrastructure Security Agency (CISA), and the Department of Defense (DoD) released information on a RAT variant, dubbed TAIDOOR, used by China-linked hackers in cyber espionage campaigns targeting governments, corporations, and think tanks. ” reads the US CISA alert. v1 , U.S. . Pierluigi Paganini.
“I can confirm that Fresenius’ IT security detected a computer virus on company computers,” Kuhn said in a written statement shared with KrebsOnSecurity. “As a precautionary measure in accordance with our security protocol drawn up for such cases, steps have been taken to prevent further spread. .
The post CERT-FR warns of Lockean ransomware attacks against French companies appeared first on Security Affairs. CERT-FR published a detailed report on the activity of the Lockean ransomware gang that has been active since June 2020. ” reads the report published by CERT-FR. ” reads the report published by CERT-FR.
The APT28 group (aka Fancy Bear , Pawn Storm , Sofacy Group , Sednit , and STRONTIUM ) has been active since at least 2007 and it has targeted governments, militaries, and security organizations worldwide. The post Russia-linked APT28 uses COVID-19 lures to deliver Zebrocy malware appeared first on Security Affairs.
Experts at Defiant, the company that developed the Wordfence security plugin for WordPress, uncovered a malvertising campaign that leverages recently disclosed plugin flaws to inject malicious code into websites. The post Malvertising campaign exploits recently disclosed WordPress Plugin flaws appeared first on Security Affairs.
“The remaining half belong to executives at third-party partners, including European and American companies associated with chemical manufacturing, aviation and transport, medical and pharmaceutical manufacturing, finance, oil and gas, and communications.” ” reads the report published by IBM X-Force IRIS. Pierluigi Paganini.
The industrial and consulting sectors, including pharmaceutical, mechanical, and electronic industries, were among the most targeted in the country. Additionally, during this period, 25 new criminal groups emerged and were added to the monitoring list by Ransomfeed.
The group focuses on Shipping/Logistics, Manufacturing, Business Services, Pharmaceutical, and Energy entities, among others. The post Balikbayan Foxes group spoofs Philippine gov to spread RATs appeared first on Security Affairs. Victims of the group are located in North America, Europe, and Southeast Asia. . Pierluigi Paganini.
The APT group targeted organizations in various industries, including the aviation, gaming, pharmaceuticals, technology, telecoms, and software development industries. The post Winnti uses a new PipeMon backdoor in attacks aimed at the gaming industry appeared first on Security Affairs. Pierluigi Paganini.
Cybersecurity & Infrastructure Security Agency (CISA), Zloader had a special relationship with Ryuk/Conti, acting as a preferred distribution platform for deploying Ryuk/Conti ransomware. National Security Agency (NSA). National Security Agency (NSA). District Court for the Northern District of Georgia.
The attackers primarily ran malicious ad campaigns, often in the form of advertising pharmaceutical pills and spam with fake celebrity endorsements.” Only through user education and strong partnerships across the security industry will we measure the scale of malicious campaigns and effectively respond to them.”.
Zhangjiagang’s main cargoes include steel, timber, coal, cement and chemical fertilizers, while Nanjing typically trades in goods such as metal ore, light industrial goods, petroleum and pharmaceutical products. appeared first on Security Affairs. Source Maritime intelligence. Original Post @CyberNews. About the author Damien Black.
According to experts from Group-IB, Russian-speaking threat actors targeted at least two companies in Western Europe in the pharmaceutical and manufacturing industries. Microsoft urges hospitals and health care organizations to implement security measures to protect public-facing devices to increase their resilience to cyber attacks.
Recently Chronicle researchers while investigating the cyber attack that hit the Bayer pharmaceutical company in April spotted a Linux variant of the Winnti backdoor. The post German firms BASF, Siemens, Henkel hit by cyber attacks appeared first on Security Affairs. ” continues the Reuters. Pierluigi Paganini.
Compromised organizations operate in different business verticals, including manufacturing, wealth management, insurance providers, and pharmaceuticals. Like other ransomware operations, the RA Group also uses a double extortion model and runs a date leak site. “This actor is expanding its operations at a fast pace. We are in the final!
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content