Experts Aim To Combat COVID-19 Cyber Attacks

Threat researchers at Microsoft, ClearSky Cyber Security, and Okta are among the hundreds of security experts helping the medical community fight COVID-19 cyberattacks under the collective name of the COVID-19 CTI League

The the community of experts aims to protect the technological infrastructure of front-line medical resources from cyber-attacks and consists of cyber-threat intelligence experts, incident responders, and other security experts experienced at detecting, responding, and neutralising threats.

League members will prioritise efforts on helping hospitals and healthcare facilities fend off ransomware and other threats from attackers seeing to exploit the general mayhem triggered by the COVID-19 health crisis.The Objective of the Covid-19 CTI League will be to boost the cyber defense capabilities of various companies and train the employees on how to identify and thwart such attacks in an effective way- especially in scenarios where work from home has become a necessity than just  merely an option. 

In its mission statement the CTI League says ‘We are a community of CTI experts, Incident responders and Industry experts working to neutralise all cyber threats looking to exploit the current pandemic... we identify, analyse and neutralise all threats but at this most sensitive time are prioritising front-line medical resources and critical infrastructure’. 

Hospitals around the world have seen a big increase in cyberattacks over the past year, in which critical IT systems are encrypted with malware. Gangs demand a Bitcoin ransom in return for the decryption key.

Healthcare organisations are often found to be to soft target for ransomware due to ageing IT infrastructure and a willingness to pay due to the critical nature of their work.

Fighting against cyber attacks during the pandemic
The founder of the project, Ohad Zaidenberg, is based in Israel, while other members of the management team include Nate Warfield, Chris Mills, and Marc Rogers, who are based in the United States.

Earlier this month cyber security firm Emsisoft and incident response company Coveware also announced an initiative offering free ransomware decryption tools and assistance to health care providers in the event of an attack. The Emsisoft company blog implored ransomware crews to think twice before attacking healthcare organisations saying that an attack on healthcare operations will have bad consequences and may result in loss of life especially with the current global virus. 

CTI-League:       SDX Central:      Cybersecurity-Insiders:      CoinTelegarph:        Dark Reading:   

You Might Also Read: 

Supporting British Healthcare Cybersecurity During COVID-19:

 

« Marriott Hotels - Millions Hacked Again
Cyber Resilience Benchmarks - Missed »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

XYPRO Technology

XYPRO Technology

XYPRO is the market leader in HPE Non-Stop Security, Risk Management and Compliance.

CYRIN

CYRIN

CYRIN® Cyber Range. Real Tools, Real Attacks, Real Scenarios. See why leading educational institutions and companies in the U.S. have begun to adopt the CYRIN® system.

MIRACL

MIRACL

MIRACL provides the world’s only single step Multi-Factor Authentication (MFA) which can replace passwords on 100% of mobiles, desktops or even Smart TVs.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

BackupVault

BackupVault

BackupVault is a leading provider of automatic cloud backup and critical data protection against ransomware, insider attacks and hackers for businesses and organisations worldwide.

Guardian360

Guardian360

The Guardian360 platform offers unrivalled insight into the security of your applications and IT infrastructure.

Ezenta

Ezenta

Ezenta is a Danish IT security consulting firm.

AGAT Software

AGAT Software

AGAT Software is an innovative security provider specializing in external access authentication and data protection solutions.

SEWORKS

SEWORKS

SEWORKS provides offensive and defensive app security that ensures mobile and web apps are safe from dangerous hacking threats.

Neurosoft

Neurosoft

Neursoft is a fully integrated ICT company with Software Development, System Integration and Information Technology Security capabilities.

Greenetics Solutions

Greenetics Solutions

Greenetics Solutions is a company focused on providing solutions for information security.

Ataya & Partners

Ataya & Partners

Ataya & Partners is a consulting company that delivers data protection, cybersecurity and IT & Digital governance services.

ConvergeOne

ConvergeOne

ConvergeOne is a leading global IT services provider of collaboration and technology solutions including cybersecurity.

Hacken

Hacken

Hacken provide a range of cybersecurity services including security assessments, blockchain security audits, and secure software development.

SecureLayer7

SecureLayer7

SecureLayer7 is an international provider of integrated business information security solutions with an innovative approach to IT security.

Path Forward IT

Path Forward IT

Path Forward IT has been troubleshooting, architecting, migrating, protecting, and securing IT environments for businesses across the USA since 2002.

Armo

Armo

Armo technology enhances any Kubernetes deployment with security, visibility, and control from the CI/CD pipeline through production.

Trisul Network Analytics

Trisul Network Analytics

Trisul helps organizations deploy full spectrum deep network monitoring which can serve as a single source of truth for performance monitoring, security analytics, threat detection and compliance.

Clarabot Nano

Clarabot Nano

Nano is the secure file sharing tool to improve content search, data access and collaboration between multiple parties.

Halcyon

Halcyon

Halcyon is the industry’s first dedicated, adaptive security platform focused specifically on stopping ransomware attacks.

Rootly

Rootly

Rootly is an incident management platform on Slack that helps automate manual admin work during incidents.