A recent Riskemy report confirms the effectiveness of Stealthcare's Zero Day Live by stating that the platform, "Spotted early warning signs of massive cyberattacks, including the WannaCry ransomware of 2017, the 2016 Dyn cyberattack, and attacks on both the Democratic and Republican National Committees that began in 2015."
War always goes for the infrastructure: take out the bridges, cut off the electricity and water supplies. All that used to be done with artillery, tanks and bombs. Going forward, it will be done by computers: Cyberwar.
Additionally, Vermin, an open-source, Remote Access Trojan or RAT has been targeting victims in Ukraine, while DanaBot—a new banking Trojan—targets users in Australia.
Your Android device is now being hit by a new wave of malware attacks — including one you might unsuspectingly download from the Google Play Store, reports Stealthcare in its latest “Cyber Intelligence Alert” delivered weekly to the firm’s cybersecurity and threat assessment clients.
The tense fallout following President Trump’s threats to impose tariffs on Chinese made goods has allegedly led to more than just counter threats by the Chinese leadership.
President Trump's threat last week to place additional tariffs on Chinese made goods have not only led to counter threats being made by China's leadership, but Stealthcare CEO Jeremy Samide believes the trade situation has spurred China to launch cyberattacks against the United States.
Advances in technology can increase convenience and efficiency for businesses and their customers, saving time and money all around. However, these same technologies may open the door to new security threats that compromise confidential information and even business operations. By now, no one is surprised to hear about issues like data breaches, identity theft, and ransomware attacks, which is why it’s shocking that so many companies are woefully under-protected and unprepared to deal with these threats.
As cyber-attack outbreaks go,WannaCry didn’t really last that long from the time the first infection was discovered on the morning of May 12 until the kill switch was released by Microsoft three days later. In that short span, however, the damage reached $5 billion while hundreds of thousands of companies worldwide were compromised.
On March 22, Atlanta was hit by the Samas ransomware, also known as SamSam or MSIL, that quickly locked out users and encrypted city computer hard drives leading to the shutdown of day-to-day functions and civic services. Unlike most ransomware, Samas and its variants self-propagate making them particularly devastating.
“Fortunately, our clients had the intelligence about this ransomware attack well in advance,” said Jeremy Samide, Stealthcare CEO and internationally-renowned cybersecurity expert. “We gave them the solution they needed to circumvent the attack.”
Priscilla Moriuchi, a former US National Security Agency officer, recently accused the North Korean regime of using cryptocurrencies to fund its nuclear program. According to Ms Moriuchi, who now works for cyber threat intelligence firm Recorded Future, an estimated 11,000 Bitcoins are supposed to have been accumulated by the North Korean regime in 2017. The cybersecurity expert further stated that if North Korea sold them when their price peaked in last December, the regime could have netted around $210 million.
The huge haul of an estimated 11,000 Bitcoins was revealed by Priscilla Moriuchi, a former US National Security Agency officer, in an interview with Radio Free Asia.
If the regime had monetised them when their price peaked in mid-December, it would have made $210 million, although that value had fallen to $120m by January.
When it comes to incident response, it isn't all about forensics and technology. Solution providers said the Equifax mega breach this week highlighted that fact, saying public criticisms of the company's failure to have adequate public relations and breach notification procedures in place show the need for the "nontechnical' in an incident response plan. Jeremy Samide, CEO of North Olmsted, Ohio-based Stealthcare, which offers incident response services as part of its security solution provider practice, said thorough incident response needs to include steps beyond forensics, including legal, regulatory and compliance, executive notifications, breach notification to customers, and more.
CEO Jeremy Samide says Symantec selling its certificate business is a “smart move” and that Stealthcare “continues to sell Symantec’s endpoint, cloud, email, enterprise, and DLP products." He continued, "The certificate business has become commoditized, and we are excited to see Symantec focus their R&D on their endpoint products, the cloud, and other enterprise products."
Jeremy Samide, CEO of Stealthcare, an Ohio-based Fidelis partner, said he is excited about the appointment, saying McCormack "certainly has the pedigree in leadership, technology, product development and the cybersecurity landscape" for the role.
McAfee is officially back. Intel Security has officially reassumed its heritage brand, with the announcement Tuesday that it has split from parent company Intel and is now a standalone security vendor.
Jeremy Samide in conversation with CFRA's John Budden, on how to prevent theft of, or irreparable damage to, one's data and private information that can result from an internet invasion.
"I am honored to be a part of the Boston Global Forum's Young Leaders Network for Peace and Security," states Jeremy Samide. "This is an illustrious organization comprised of a diverse group of distinguished professionals dedicated to protecting the global community at large".
The NFL’s Super Bowl attracts millions of fans but also is an inviting cybersecurity target against corporate sponsors and the participating teams, cybersecurity professionals told Bloomberg BNA.
Companies looking to benefit from Super Bowl exposure need to be aware of the risks that go along with the heightened visibility, Jeremy Samide, chief executive officer of Ohio-based cybersecurity company Stealthcare LLC, told Bloomberg BNA Feb. 2. Hackers see the Super Bowl “as a treasure trove of information” and may take advantage of the increased exposure and influx of data, he said.
Cybersecurity has been a big concern over the last several years. This year alone we have seen rising trends in the deployment of sophisticated ransomware, banking Trojans, distributed denial-of-service (DDoS) attacks, cybertheft, and even cyberattacks on politicians. So, what can be done to enhance security for all things cyber? There is no panacea as far as cybersecurity goes. There are too many parts and pieces for one thing to fix it all. However, there is a certain technology called blockchain that could in theory be used to secure many aspects of cyber.
Dec. 6 — The unpredictability and assertive tone of the incoming Trump administration may motivate nation-state and black hat hackers to more aggressively attack the U.S., cybersecurity analysts told Bloomberg BNA.
For cybersecurity, instead of draining the swamp President-elect Donald Trump may be creating a cyberattack risk quagmire.
U.S. companies may also be worried by more motivated nation-states, such as Russia, China and North Korea, that may leverage against them any information stolen from the transition team and incoming government.
The current cybersecurity hype is starting to sink in for many companies and consumers who are desperate for real solutions to protect their data. The economics suggest that more organizations are looking at the cloud, but is that a more secure solution, as many currently believe? Says Jeremy: "Cloud companies are providing more economical solutions to the enterprise, however, I think the cloud presents a tremendous amount of risk to any organization that migrates to it."
As legacy cyber security companies continue to wither on the vine, cloud companies will most likely continue to rise, however, this only presents a new focus for hackers, says Jeremy: "We have already seen giant cloud providers get knocked off line from cyber attacks rendering their services to their clients unresponsive. Also, just because a client or customer moves their data to the cloud doesn’t necessarily make it safer. This just creates a new lightning rod or ultimate honeypot for the hackers to include in state sponsored attacks. "
The bottom line, he says is that organizations and how they conduct their business will continue to be the weak link. Staying on the cutting edge of cyber technology is a must, along with a layered approach. Cloud security should not be seen as a cure-all.
Banks are lending more than money these days. As banks and financial institutions all over the world continue to expand their digital footprint by aggressively marketing for new customers, keeping pace with regulatory compliance and implementing new technology services to better serve is current customer base, they are lending more risk to their customers than ever before.
With over 70% of cyber attacks today categorized as financially motivated, hackers have their sites fixed on a relatively easy bank heist worthy of John Dilinger’s approval. With financial institutions trying to compete for business, they are rapidly deploying more cloud-based solutions, mobile banking options and global online services susceptible to cyber attacks. Banks are making some progress but still lack a formidable strategy to combat the evolution of cyber threats.
Boards and the C-suite need a new approach and more "out of the box" thinking in order to stay afloat if financial institutions intend to turn the tide in their fight. Everyone is a target, big or small and to think you’re not is career suicide. It’s more than the next generation firewall or latest black box technology, it’s about intelligence – Collection and analytics, and lots of it. Organizations that are focusing on cutting edge, applied concepts like artificial intelligence, contextual analytics, cognitive analysis, natural language processing and quantum technologies will advance and ultimately survive into the next frontier of the cyber war.
Law firms have become prime targets for cyber attacks as they hold many of the secrets to theirbeloved clients to include big organizations, CEO’s, celebrities and the like. In this cyber cold war, the words “privileged and confidential” are taking on new meanings and becoming more difficult to uphold. Access to unfiltered communications, documents, contracts and signatures to inherently sensitive information is up for grabs and eventually in many cases, up for sale. Ransomware has also become a problem within law firms. Many attorneys still today, believe that if something is stamped “privileged and confidential” it is immune to the bad actors who are constantly finding new subterfuges into law firms wreaking havoc and stealing proprietary information to either exploit, destroy, expose or sell on the dark web.
In many cases, law firms that specialize in patent, trademarks and intellectual property are considered an even greater risk as they are top on the list for many state sponsored hacker groups around the world. We have witnessed companies that have invested hundreds of millions of dollars in research and development, win patents and trademarks only to have the fruits of their labor erode over a short period of time as hackers ransacked their corporate servers as well as the servers of their law firm where most of their patents and trademarks were filed backed by thousands of research documents.
There are viable solutions that can help protect and mitigate the risk of the next cyber attack within law firms. Stealthcare’s managed services, education & training, and threat intelligence can help with all of these.
Critical infrastructure may be the next big target for hackers. Evidence has shown hacking attempts and an evolution of sophistication of methods. Energy is critical to our society, and it’s our duty to examine that the subject in detail. We’ll look at the attacks that have already happened, the methods, the motivations of the actors, the trends of we’re seeing, and what’s being done about it.
There are many factors at play interacting with each other: nation-states, hackers looking for profit, our increasingly technology-dependent world, and government efforts at protection. Of all the cyber threats we face, this is likely the biggest.
Jeremy Samide is a cyber expert. He's more aware than most of the risks presented by the Republican National Convention.
"The ability of a hacktivist group to disrupt Trump's campaign is nothing compared to a possible state-sponsored cyber attack against the GOP Convention in July," Jeremy Samide, Stealthcare, CEO.
CLEVELAND, July 7, 2016 /PRNewswire-USNewswire/ -- "The GOP Convention is the next likely target for a major hack, but it probably won't come from hacktivists who are indignant over Donald Trump's confrontational manner and offensive positions," says cybersecurity authority Jeremy Samide, CEO of Stealthcare.
Stealthcare, a global cybersecurity firm headquartered in Cleveland—site of the GOP Convention, July 18-21, is warning businesses to increase their vigilance during this time.
For predictors of a GOP Convention cyber attack, Samide points to, "the recent attack against the Democratic National Committee (DNC) that compromised donor lists and other information. This was not by a hacktivist group but rather all evidence points directly to state-sponsored hackers...
"As hospital ransomware attacks spread to other industries, total corporate solutions are needed," Says Jeremy Samide, CEO of Stealthcare and a global cybersecurity authority.
"Holding hospital data hostage is just the tip of the spear in a new wave of ransomware attacks that are now spreading to law firms and financial institutions," Jeremy Samide, global cybersecurity expert says.
CLEVELAND, June 14, 2016 /PRNewswire/ -- "The recent cyber attacks against hospitals in California and Kentucky, during which hackers encrypted their data with new strains of ransomware, are spreading to other industries," says Jeremy Samide, CEO of Stealthcare, a cybersecurity-consulting firm whose clients receive intelligence on the latest hacker strategies and practical solutions to defeat them.
"Holding medical, billing and insurance records hostage is just the just the tip of the arrow in a new wave of ransomware attacks that are now spreading to law firms and financial...