Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

10/24/2017
02:20 PM
50%
50%

New Cybercrime Insurance Policy Protects the 'High Net Worth' Set

Rubica is offering its active subscribers a $1 million cybersecurity insurance policy via its partner PURE Starling.

Private network security company Rubica has partnered with PURE Starling to offer its active individual subscribers a $1 million cybersecurity insurance policy.

The policy, which carries an annual $1,000 premium, has a $100,000 sub-limit for system attacks and purchasers can have no prior fraud or cyber incidents in the past 24 months.

Under the policy, which the organizations say is geared for "responsible high net worth individuals and families," PURE Starling will reimburse Rubica subscribers whether their attack happened online or offline. The attacks include social engineering, ransomware, and unauthorized payment transfers. The policy will cover such expenses as hiring a professional to remove malicious code, to reconfiguring a system that has been lost or compromised.

In addition to teaming with Rubica, PURE Starling is also offering its homeowner policyholders the ability to add an endorsement to cover these losses up to $100,000 with a $500 premium, or a $250,000 policy with a $100,000 systems attack sub-limit, with a $1,000 premium.

Read more about Rubica's cybersecurity insurance partnership here.

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
RyanSepe
50%
50%
RyanSepe,
User Rank: Ninja
10/25/2017 | 6:46:35 AM
Policy Criteria
I'd still be interested to see the policy criteria. Typically as a consumer you would want the verbiage to be generic. Cybersecurity policies are well-known for using distint verbiage to render the policy unclaimable pending a cyber event.
Tor Weaponized to Steal Bitcoin
Dark Reading Staff 10/18/2019
Data Privacy Protections for the Most Vulnerable -- Children
Dimitri Sirota, Founder & CEO of BigID,  10/17/2019
State of SMB Insecurity by the Numbers
Ericka Chickowski, Contributing Writer,  10/17/2019
Register for Dark Reading Newsletters
White Papers
Video
Cartoon
Current Issue
7 Threats & Disruptive Forces Changing the Face of Cybersecurity
This Dark Reading Tech Digest gives an in-depth look at the biggest emerging threats and disruptive forces that are changing the face of cybersecurity today.
Flash Poll
2019 Online Malware and Threats
2019 Online Malware and Threats
As cyberattacks become more frequent and more sophisticated, enterprise security teams are under unprecedented pressure to respond. Is your organization ready?
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2019-18387
PUBLISHED: 2019-10-23
Sourcecodester Hotel and Lodge Management System 1.0 is vulnerable to unauthenticated SQL injection and can allow remote attackers to execute arbitrary SQL commands via the id parameter to the edit page for Customer, Room, Currency, Room Booking Details, or Tax Details.
CVE-2019-18212
PUBLISHED: 2019-10-23
XMLLanguageService.java in XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows a remote attacker to write to arbitrary files via Directory Traversal.
CVE-2019-18213
PUBLISHED: 2019-10-23
XML Language Server (aka lsp4xml) before 0.9.1, as used in Red Hat XML Language Support (aka vscode-xml) before 0.9.1 for Visual Studio and other products, allows XXE via a crafted XML document, with resultant SSRF (as well as SMB connection initiation that can lead to NetNTLM challenge/response cap...
CVE-2019-18384
PUBLISHED: 2019-10-23
An issue was discovered on TerraMaster FS-210 4.0.19 devices. An authenticated remote non-administrative user can read unauthorized shared files, as demonstrated by the filename=*public*%25252Fadmin_OnlyRead.txt substring.
CVE-2019-18385
PUBLISHED: 2019-10-23
An issue was discovered on TerraMaster FS-210 4.0.19 devices. An unauthenticated attacker can download log files via the include/makecvs.php?Event= substring.