logo
#

Latest news with #ransomware

Ransomware in Cars: Why Automotive Cyberattacks Are Spiking in 2025
Ransomware in Cars: Why Automotive Cyberattacks Are Spiking in 2025

Auto Blog

time8 hours ago

  • Automotive
  • Auto Blog

Ransomware in Cars: Why Automotive Cyberattacks Are Spiking in 2025

Why Car Cybersecurity Can't Be Ignored Imagine treating a ticking time bomb as background noise. That's how many in the automotive industry have approached ransomware. Ransomware now accounts for 45% of all automotive cyber incidents so far in 2025, making it the leading threat to the sector. The scale of these attacks is also increasing: large-scale incidents affecting millions of vehicles more than tripled in 2024, and nearly 60% of all reported cyber events in 2023–2024 were large-scale in nature 0:06 / 0:09 2025 Ford Maverick: 4 reasons to love it, 2 reasons to think twice Watch More There is strong evidence that the number of publicly disclosed automotive ransomware attacks is only a fraction of the true total. Many incidents are never disclosed. 148 publicly disclosed automotive cyber incidents were tracked in just the first quarter of 2025, but cybersecurity experts warn it is just getting started: 'The pieces are in place for a transition from today's manual, car-modding hacks to more harmful and larger-scale attacks,' and that criminal activity on the dark web points to a much broader, largely hidden threat landscape. In a world where drivers expect more than just horsepower, digital security has become as essential as the engine itself. The New Threat in the Driver's Seat Today's cars are marvels of connectivity, but this convenience comes with risk. Picture a journalist at a dealership, eyeing rows of sleek sedans. Each keypad and dashboard screen seems harmless—until malware hidden in the firmware threatens to lock down the entire vehicle. That 45% breach statistic isn't just a number; it's a warning. What if, the next time you start your car, you're met with a ransom note instead of the familiar engine hum? When Code Becomes a Weapon Ransomware attacks on car manufacturers often start with a weak link—stolen credentials from suppliers or compromised service portals. Once inside, attackers can encrypt vital systems: infotainment, navigation, even the ignition. An encrypted Electronic Control Unit (ECU) can make starting your car impossible until a ransom is paid. Unlike the data breaches of the past, these attacks don't just steal information—they can bring your car to a standstill. Autoblog Newsletter Autoblog brings you car news; expert reviews and exciting pictures and video. Research and compare vehicles, too. Sign up or sign in with Google Facebook Microsoft Apple By signing up I agree to the Terms of Use and acknowledge that I have read the Privacy Policy . You may unsubscribe from email communication at anytime. Vulnerabilities in the Supply Chain The automotive supply chain is vast and complex, providing more opportunities for cybercriminals. A single phishing email to a small supplier can lead to malicious code being embedded in a firmware update, which then spreads to thousands of vehicles. Compromised update servers can deliver ransomware-laden patches, infecting entire fleets in minutes. Ironically, even the most security-conscious manufacturers can inherit vulnerabilities from distant partners. Everyday Routines, Unusual Risks Consider your morning routine: coffee in hand, you tap 'Start' on your car's smartphone app—only to find your vehicle locked by ransomware. The cost of negotiating with hackers may exceed typical repair bills, and insurers are still figuring out how to handle these new risks. Meanwhile, online forums buzz with debates over which software updates fix vulnerabilities and which might accidentally introduce new ones. Delayed security patches can leave vehicles exposed for weeks, making every drive a potential gamble. Trust on the Open Road Modern vehicles offer dazzling features and seamless connectivity, but these advances come with serious questions. When convenience can so easily turn into coercion, will drivers still trust their cars? On the open highway, does the engine's roar reassure you—or remind you of the silent code that could one day hold you hostage? You're not powerless against this wave of automotive ransomware—there are concrete steps you can take right now to protect yourself and your EV: Start by disabling remote access features when you don't need them. Always use strong, unique passwords for your car's apps and accounts. Keep your vehicle's software and apps updated; patches often fix vulnerabilities before hackers can exploit them. Be cautious with Bluetooth, Wi-Fi, and public charging stations. Secure your key fob in a signal-blocking pouch. Avoid connecting to unfamiliar networks. If you add aftermarket gadgets, choose only trusted brands and check their security track record. Stay alert for official security updates from your automaker and report any unusual vehicle behavior immediately. A little digital vigilance goes a long way—taking these steps can help keep your car, your data, and your daily routine safe from cybercriminals. About the Author Brian Iselin View Profile

Hospitals cleared after cyberattack review: IPC
Hospitals cleared after cyberattack review: IPC

CTV News

time2 days ago

  • Health
  • CTV News

Hospitals cleared after cyberattack review: IPC

The Information and Privacy Commissioner (IPC) has completed its decision regarding the 2023 criminal ransomware cyberattack which impacted health records and information systems at five hospitals in southwestern Ontario. Bluewater Health, Chatham-Kent Health Alliance, Erie Shores HealthCare, Hôtel-Dieu Grace Healthcare and Windsor Regional Hospital were all impacted by the cyberattack. The IPC's decision concludes the IPC's investigation – determining no formal review or orders are required. 'We appreciate the IPC's thorough investigation into this matter. We are specifically pleased that the IPC has acknowledged the efforts by the hospitals and TransForm Shared Service Organization to contain the breach after it occurred, as well as improvements made in our data and information protections since the time of the ransomware cyberattack,' said a joint news release from the hospitals. 'We acknowledge that the IPC has noted concern surrounding the notification of individuals whose data was encrypted by the threat actors.' In response to this incident, hospital officials said they issued regular news releases describing the impact on data and operations, participated in multiple press conferences, and directly notified more than 300,000 individuals of the incident. Hospital officials said they appreciate the IPC's finding that the hospitals appropriately notified those whose personal health information was stolen during this ransomware attack. 'In an information age where cybersecurity is top of mind across multiple sectors, including public and private sector entities, the hospitals are dedicated to ensuring continued adoption of best practices in an ever-changing global cybersecurity environment,' said the news release. Due to ongoing litigation, the hospitals are unable to comment further.

170 patients harmed as a result of cyber attack
170 patients harmed as a result of cyber attack

The Independent

time2 days ago

  • Health
  • The Independent

170 patients harmed as a result of cyber attack

Around 170 patients have suffered harm as a result of a cyber attack on blood services at London hospitals and GP surgeries, reports suggest. Pathology services provider Synnovis was the victim of a ransomware attack by a Russian cyber gang in June last year. As a result more than 10,000 appointments were cancelled at the two London NHS trusts that were worst affected. And a significant number of GP practices in London were unable to order blood tests for their patients. Now the Health Service Journal (HSJ) has reported that there were nearly 600 'incidents' linked to the attack, with patient care suffering in 170 of these. This includes one cases of 'severe' harm, 14 which led to 'moderate' harm with the rest identified as 'low harm'. According to NHS guidance severe harm occurs when patients either suffers permanent harm; needs life saving care or could have reduced their life expectancy, among a number of other factors.

Bitdefender to Acquire Mesh Security, Expanding its Email Security Capabilities
Bitdefender to Acquire Mesh Security, Expanding its Email Security Capabilities

Yahoo

time2 days ago

  • Business
  • Yahoo

Bitdefender to Acquire Mesh Security, Expanding its Email Security Capabilities

Acquisition Extends Bitdefender Product and Services Portfolio with Powerful Email Protection for Businesses and MSPs BUCHAREST, Romania & SAN ANTONIO, June 18, 2025--(BUSINESS WIRE)--Bitdefender, a global cybersecurity leader, today announced it has agreed to acquire Mesh Security Limited (Mesh), a provider of advanced email security solutions. Through the acquisition, Mesh's email security technology and capabilities will be integrated into Bitdefender's extended detection and response (XDR) platform and managed detection and response (MDR) services. The transaction is subject to customary closing conditions, including regulatory approvals. Email remains the most exploited attack vector and serves as an entry point for ransomware, phishing, and business email compromise (BEC). According to the FBI Internet Crime Report 2024, businesses reported nearly $2.8 billion in losses due to BEC scams in 2024. Additionally, the 2024 Bitdefender Cybersecurity Assessment Report (based on a global survey of 1,200 cybersecurity professionals) identified phishing and social engineering as the top threats impacting their organization. The acquisition will incorporate Mesh's email security capabilities into Bitdefender GravityZone, the company's flagship unified security, compliance, and risk analytics platform. Mesh employs a dual-layered approach to email security, combining perimeter-based protection via a secure email gateway (SEG) with mailbox-level defense through API-based deployment. This model expands visibility into threat activity across all vectors and contributes high-quality telemetry to Bitdefender's global threat intelligence network. A cornerstone of Bitdefender's continued growth is through its global network of over 41,000 channel and MSP partners. Mesh enhances this value by offering a centralized platform optimized for MSPs, enabling efficient multi-tenant email security management. Its solution provides 24x7 protection while reducing operational overhead. With automated policy enforcement, real-time threat insights, and seamless integration into existing workflows, Mesh empowers MSPs to deliver effective, scalable protection to customers. "We are pleased to announce our intent to acquire Mesh, a strategic move that will complement our GravityZone XDR platform and power our MDR service to help businesses combat email-borne threats as they continue to evolve," said Andrei Florescu, president and general manager of Bitdefender Business Solutions Group. "Mesh brings leading-edge innovation from a deeply experienced team that shares our commitment to effective, real-world security. Together, we will further strengthen our ability to provide proven and trusted email protection to our global customer base." Founded in 2020 and backed by investors Elkstone and Enterprise Ireland, Mesh has established itself as a trusted email security provider for hundreds of MSP partners and thousands of end customers globally. Known for its detection efficacy, MSP-centric architecture, and operational simplicity, Mesh has earned recognition for addressing the unique challenges of email-based threats with precision and ease of use. "This is the beginning of something even bigger," said Brian Byrne, chief executive officer and co-founder of Mesh. "We've always focused on building practical, powerful email security that just works—and Bitdefender shares that same mindset. We're excited to join forces and bring stronger protection to even more organizations." The terms of the transaction were not disclosed. About Bitdefender Bitdefender is a cybersecurity leader delivering best-in-class threat prevention, detection, and response solutions worldwide. Guardian over millions of consumer, enterprise, and government environments, Bitdefender is one of the industry's most trusted experts for eliminating threats, protecting privacy, digital identity and data, and enabling cyber resilience. With deep investments in research and development, Bitdefender Labs discovers hundreds of new threats each minute and validates billions of threat queries daily. The company has pioneered breakthrough innovations in antimalware, IoT security, behavioral analytics, and artificial intelligence and its technology is licensed by more than 180 of the world's most recognized technology brands. Founded in 2001, Bitdefender has customers in 170+ countries with offices around the world. For more information, visit Trusted. Always. View source version on Contacts Steve FioreBitdefender1-954-776-6262sfiore@ Error while retrieving data Sign in to access your portfolio Error while retrieving data Error while retrieving data Error while retrieving data Error while retrieving data

New CSC Survey Finds Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years
New CSC Survey Finds Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

Yahoo

time4 days ago

  • Business
  • Yahoo

New CSC Survey Finds Overwhelming Majority of CISOs Anticipate Surge in Cyber Attacks Over the Next Three Years

CISOs identify cybersquatting, domain-based attacks, and ransomware as top cybersecurity concerns 87% cite AI-powered domain generated algorithms as a direct threat Only 7% expressed clear confidence in their ability to combat domain attacks WILMINGTON, Del., June 16, 2025--(BUSINESS WIRE)--An overwhelming 98% of chief information security officers (CISOs) expect a surge in cyber attacks over the next three years as organizations face an increasingly complex and artificial intelligence (AI)-driven digital threat landscape. This is according to new research conducted among 300 CISOs, chief information officers (CIOs), and senior IT professionals by CSC1, the leading provider of enterprise-class domain and domain name system (DNS) security. The report, "CISO Outlook 2025: Navigating Evolving Domain-Based Threats in an Era of AI and Tightening Regulation," names cybersquatting, domain and DNS hijacking, and distributed denial-of-service (DDoS) attacks as the top three global cyber threats in 2024. These risks are only projected to escalate, as cybercriminals leverage new techniques and capabilities from AI and other modern technologies to launch more sophisticated attacks. Looking ahead, cybersquatting, domain-based attacks, and ransomware top the list of cybersecurity concerns for CISOs over the next three years. "DNS and domain-related infrastructure are prime targets for cybercriminals," says Ihab Shraim, chief technology officer for CSC's Digital Brand Services division. "These attackers conduct extensive reconnaissance to identify vulnerabilities, hijack subdomains, and impersonate brands at a massive scale. With the growing availability of AI-driven tools and off-the-shelf attack kits, these threats are only going to accelerate. A single DNS compromise can take down email, websites, customer portals, and even phone networks. Companies that don't act quickly may find themselves navigating not just technical fallout, but reputation and regulatory consequences as well." AI-powered domain generation algorithms (DGAs) are increasingly worrisome, with 87% of CISOs identifying them as a direct threat. Additionally, 97% of respondents voiced concerns about the potential risks associated with granting third-party AI systems access to company data, underscoring the critical need for robust AI governance frameworks. Despite these escalating concerns, only 7% of CISOs expressed being "very confident" in their ability to mitigate domain-based attacks, and just 22% believe they have the right tools in place. This lack of confidence may reflect deeper gaps in preparedness, and it's possible that many organizations still underestimate the complexity of domain security and the speed at which threats are evolving. "The human element continues to be the biggest security vulnerability," adds Nina Hrichak, vice president of CSC's Digital Brand Services. "As cybercriminals grow more sophisticated, internal education and awareness are falling behind. DNS hijacking and subdomain takeovers have become mainstream concerns, but not every organization possesses the internal expertise to monitor domain activity in real time. That's where experienced partners can offer vital insights and agility to help organizations stay ahead of the curve." To receive a copy of CSC's "CISO Outlook 2025: Navigating Evolving Domain-Based Threats in an Era of AI and Tightening Regulation," contact us at CSC@ or visit the website. 1CSC, in partnership with Pure Profile, surveyed 300 CISOs, CIOs, and senior IT professionals operating in Europe, the U.K., North America, and Asia Pacific to understand their current concerns and how they are navigating the evolving cybersecurity landscape, regulatory demands, and the rise of AI in cybercrime. About CSC CSC is the trusted security and threat intelligence provider of choice for the Forbes Global 2000 and the 100 Best Global Brands (Interbrand®) with focus areas in domain security and management, along with digital brand and fraud protection. As global companies make significant investments in their security posture, our DomainSec℠ platform can help them understand cybersecurity oversights that exist and help them secure their online digital assets and brands. By leveraging CSC's proprietary technology, companies can solidify their security posture to protect against cyber threat vectors targeting their online assets and brand reputation, helping them avoid devastating revenue loss. CSC also provides online brand protection—the combination of online brand monitoring and enforcement activities—with a multidimensional view of various threats outside the firewall targeting specific domains. Fraud protection services that combat phishing in the early stages of attack round out our solutions. Headquartered in Wilmington, Delaware, USA, since 1899, CSC has offices throughout the United States, Canada, Europe, and the Asia-Pacific region. CSC is a global company capable of doing business wherever our clients are—and we accomplish that by employing experts in every business we serve. Visit View source version on Contacts For more information: W2 Communications Joyson CherianSenior Vice PresidentJoyson@ CSC Laura CrozierPR CSC News Room Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store