Advanced persistent threat (APT) group UAC-0063 is using legitimate documents obtained from infiltrated victims to target others with malware dubbed HATVIBE. The group, linked to Russian state-sponsored actor APT28, is expanding its operations beyond Central Asia to European embassies in Germany, the UK, Netherlands, Romania, and Georgia. UAC-0063 utilises a range of malwares, including DownEx and DownExPyer, to collect data and carry out intelligence gathering.
Cybersecurity in healthcare demands resiliency, not reactivity
The inevitable cyber threats on patients’ data necessitate a change in healthcare organizations’ approach to cybersecurity. A shift from solely defensive measures to cyber-resilience measures