BCHP cyberattack
18
Oct
2024

BCHP Cyberattack Compromises Sensitive Patient Data

Boston Children’s Health Physicians (BCHP), a multi-specialty healthcare group providing pediatric care across Connecticut and New York, recently notified patients…

New infosec products of the week: October 18, 2024
18
Oct
2024

New infosec products of the week: October 18, 2024

Here’s a look at the most interesting products from the past week, featuring releases from ExtraHop, GitGuardian, Nametag, Okta, Rubrik,…

PoC Exploit BIG-IP Privilege Escalation
18
Oct
2024

PoC Exploit Released for BIG-IP Privilege Escalation Vulnerability

A critical vulnerability in F5 BIG-IP, a popular network traffic management and security solution tracked as CVE-2024-45844, allows authenticated attackers…

Despite massive security spending, 44% of CISOs fail to detect breaches
18
Oct
2024

Despite massive security spending, 44% of CISOs fail to detect breaches

Despite global information security spending projected to reach $215 billion in 2024, 44% of CISOs surveyed reported they were unable…

Jane Devry
18
Oct
2024

As Attackers Embrace AI, Every Organization Should Do These 5 Things

AI benefits our society at large in numerous ways, but cybercriminals are using this new technology for nefarious purposes. From…

What to do if your iPhone or Android smartphone gets stolen?
18
Oct
2024

What to do if your iPhone or Android smartphone gets stolen?

A lost, stolen, or compromised smartphone today means we are in serious trouble. Most people have everything related to their…

Jane Devry
18
Oct
2024

DDoS Attacks and the Upcoming US Presidential Election

A few weeks ago, Tesla CEO and X (formerly Twitter) owner Elon Musk hosted a friendly conversation on X with…

Cybercrime's constant rise is becoming everyone's problem
18
Oct
2024

Cybercrime’s constant rise is becoming everyone’s problem

Cybercrime in recent years shows no signs of slowing down, with phishing attacks surging and ransomware tactics becoming more advanced,…

Jane Devry
18
Oct
2024

Addressing Critical Gaps in Threat Intelligence Sharing

Almost all organisations agree information sharing and collaboration are crucial elements in the fight against cybercriminals. That’s a majority as…

New macOS Vulnerability Allows Attackers to Bypass Security Controls
18
Oct
2024

New macOS Vulnerability Allows Attackers to Bypass Security Controls

A recently discovered vulnerability in macOS, dubbed “HM Surf,” allows attackers to bypass the operating system’s Transparency, Consent, and Control (TCC) technology, gaining unauthorized access to a user’s protected…

Two Sudanese nationals indicted for operating the Anonymous Sudan group
18
Oct
2024

Two Sudanese nationals indicted for operating the Anonymous Sudan group

Two Sudanese nationals indicted for operating the Anonymous Sudan group Pierluigi Paganini October 18, 2024 The DoJ charged Anonymous Sudan…

Russia-linked RomCom group targeted Ukrainian government agencies since late 2023
18
Oct
2024

Russia-linked RomCom group targeted Ukrainian government agencies since late 2023

Russia-linked RomCom group targeted Ukrainian government agencies since late 2023 Pierluigi Paganini October 17, 2024 Russia-linked threat actor RomCom targeted…