Remote access tool leveraged to compromise US healthcare organizations
BleepingComputer reports that numerous healthcare organizations across the U.S. have been targeted in a potentially ongoing attack campaign leveraging pharmacy supply chain and management systems provider Transaction Data Systems' ScreenConnect...
BleepingComputer reports that self-proclaimed hacktivist operation Anonymous Sudan, also known as Storm-1359, has admitted to deploying a distributed denial-of-service attack that disrupted the website of Cloudflare.
How to combat ransomware in the face of tight security staffing
The technical controls that provide the most anti-ransomware capabilities for the dollar are not necessarily expensive or require much in the way of staff to manage, such as multi-factor authentication, regular data backups, and enforcing good access...
A federal push to enforce cybersecurity requirements is holding public companies and government contractors accountable as a matter of law and for national security.
Tisztelt Ügyfelünk! A Nemzetbiztonsági Szakszolgálat Nemzeti Kibervédelmi Intézet (NBSZ NKI) tájékoztatást ad ki kéretlen, a Magyar Posta Zrt. nevével és arculati elemeivel visszaélő, adathalász URL-t tartalmazó üzenetek kapcsán. Az elmúlt napokban...
Process failures are the root cause of most serious cybersecurity incidents. We need to treat security as a process issue, not try to solve it with a collection of tools.
SaaS applications are the new supply chain and, practically speaking, SaaS is the modern vendor. Here are three straightforward steps to manage this new vendor risk.