Patient Care Delayed After ECHN Ransomware Attack
The parent company of Eastern Connecticut Health Network and Waterbury HEALTH, Prospect Medical Holdings, announced that all its facilities were facing IT complications. The FBI…
The parent company of Eastern Connecticut Health Network and Waterbury HEALTH, Prospect Medical Holdings, announced that all its facilities were facing IT complications. The FBI…
Aug 04, 2023THNSoftware Security / Cyber Theat A four-year-old critical security flaw impacting Fortinet FortiOS SSL has emerged as one of the most routinely and…
A manufacturer streamlines management of customer complaints about shipping delays. An accounting firm automates a business function, then offers the automation solution for sale via…
CISA, the FBI, and NSA, along with Five Eyes cybersecurity agencies published a list of the 12 most exploited vulnerabilities of 2022. CISA, the NSA,…
Cult of the Dead Cow (cDc) is one of the oldest and most highly influential hacking groups that was formed at the end of the…
Cloud computing has revolutionized the way businesses operate by offering scalable, flexible, and cost-effective solutions. However, as data and applications migrate to the cloud, ensuring…
Threat actors are evolving their techniques and tools at a rapid pace that is completely changing the current threat scenario. BlueCharlie is a Russia-linked threat…
The notorious Hacktivists group, Known as Mysterious Team Bangladesh, exploits vulnerable versions of PHPMyAdmin and WordPress. It conducts DDoS and defacement attacks through open-source utilities…
Several cyber criminals recently targeted Citrix NetScaler ADC and Gateway Servers through a vulnerability identified as CVE-2023-3519, which holds a high CVSS score of 9.8.…
As the healthcare industry continues its rapid transformation through the adoption of digital technologies, it is also confronted with an ever-expanding range of cybersecurity threats.…
Cybersecurity risk is distinct from other IT risk in that it has a thinking, adaptive, human opponent. IT generally must deal with first order chaos…
Here’s a look at the most interesting products from the past week, featuring releases from Forescout, Menlo Security, Qualys, Sonar, SpecterOps, Synopsys, Traceable AI, and…