Compliance July 10, 2020 96% of Companies are Concerned About Public Cloud Security While most companies have adopted the public cloud and have moved at least some of their workloads or infrastructure to the cloud, confidence in cloud ... Read more
Cyber Threats July 10, 2020 95% of Brits Unable to Correctly Distinguish Phishing and Genuine Messages A recent phishing study conducted by the UK firm, Computer Disposals Limited, has revealed British workers struggle to identify phishing attacks, with only 5% of ... Read more
Cyber Threats July 9, 2020 Microsoft Research Develops Undetectable Malware Scanner for Virtual Machines Many businesses have replaced traditional desktops with virtual machines located in the cloud. Each virtual machine is an exact replica of a standard desktop complete ... Read more
Security Breaches July 8, 2020 More Than 15 Billion Credentials are up for Sale on Hacking Forums New research conducted by Digital Shadows has provided insight into the scale of credential theft and the extent to which stolen credentials are being sold ... Read more
Cyber Threats July 7, 2020 Purple Fox Trojan Developers Create Their Own Exploit Kit and Add Two New Microsoft Exploits The developers of the Purple Fox Trojan/rootkit have created their own exploit kit to distribute their malware and have recently added exploits for two recently ... Read more
Insights July 6, 2020 Public Cloud Security Myths Debunked Public cloud security myths are most often attributable to a lack of understanding about how the cloud works and confusion about Cloud Service Providers´ Shared ... Read more
Compliance July 3, 2020 Critical Vulnerabilities Identified in Apache Guacamole Remote Access System Security researchers have discovered multiple vulnerabilities in the Apache Guacamole remote access system used by thousands of companies to support home workers. Apache Guacamole is ... Read more
Insights July 2, 2020 Cloud Security Governance Cloud governance consists of three pillars – cloud security governance, cloud financial governance, and cloud operations governance. In the perfect scenario, all three pillars contribute ... Read more
Insights July 2, 2020 Cloud Data Security When businesses first transfer workloads to the cloud, a misconception sometimes exists that responsibility for cloud data security also transfers to the Cloud Service Provider. ... Read more
Insights July 2, 2020 Cloud Security Best Practices The Internet is full of cloud security best practices. Many are appropriate for most organizations to reduce their exposure to cloud security risks in a number of ... Read more
Insights July 2, 2020 How to Mitigate Cloud Security Risks While some cloud users may be under the impression that most cloud security risks are due to the actions of external bad actors, that´s not ... Read more
Insights July 2, 2020 3 Tips for Improving Hospital Workflow Processes One of the best ways to improve patient outcomes, patient satisfaction scores, and to reduce readmissions is to improve the efficiency of hospital workflow processes. ... Read more
Insights July 2, 2020 Easy Steps to Take to Streamline Clinical Staff Workflow There are many measurable benefits that come from streamlining clinical staff workflow in hospitals. Despite advances in technology, there are still many processes in healthcare ... Read more
Insights July 2, 2020 Improvements Achievable Through Workflow Automation in Healthcare There have been many technological innovations in healthcare that have improved patient safety, streamlined information flow, and have helped to reduce inefficiencies, but workflow automation ... Read more
Insights July 2, 2020 Optimizing Patient Workflow in Hospitals with Technology Patient workflow is the term given to the sequence of admin, mental, and physical tasks that take place during a patient’s journey through a hospital ... Read more
Insights July 2, 2020 Clinical Workflows in Healthcare Clinical workflows in healthcare are defined as a set of repeatable tasks that must be performed in order by clinicians to allow the delivery of ... Read more
Compliance July 2, 2020 Microsoft Releases Out of Band Fixes for Two Serious Flaw in the Windows Codecs Library Microsoft has released an out of band update to correct two serious vulnerabilities in the Windows Codecs library, which, if exploited, could allow remote code ... Read more
Cyber Threats July 1, 2020 Warning Issued Over Maximum Severity Vulnerability in Palo Alto Networks Products U.S. Cyber Command has issued a warning about a maximum severity vulnerability in the Palo Alto Networks’ operating system. While the flaw is not currently ... Read more
Security Breaches June 30, 2020 ESET Reports Doubling of Brute Force Attacks on Remote Desktop Services During the COVID-19 Pandemic Cybersecurity firm ESET has analyzed its telemetry data and found there has been a major increase in brute force attacks on remote desktop services during ... Read more
Security Breaches June 26, 2020 REvil Threat Group Starts Using New WastedLocker Ransomware The Evil Corp Threat Group that was behind the Dridex banking Trojan and BitPaymer ransomware has started using a new ransomware variant in targeted attacks ... Read more
Security Breaches June 25, 2020 Newly Discovered Self-Propagating Lucifer Malware Capable of Cryptojacking and DDoS Attacks Palo Alto Networks’ Unit 42 researchers have identified a new Windows malware dubbed ‘Lucifer’ that drops the XMRig cryptocurrency miner, has Distributed Denial of Service ... Read more
Security Breaches June 24, 2020 REvil Ransomware Gang Observed Scanning Compromised Networks for PoS Software The REvil gang behind Sodinokibi ransomware are using a new tactic in their attacks. The gang is already known for compromising systems and stealing data ... Read more
Security Breaches June 23, 2020 BEC Gangs Abandon C-Suite Executives in Favor of Attacks on Finance Employees A recent report from Abnormal Security suggests business email compromise gangs have changed tactics and have new targets in their sights. BEC gangs have historically ... Read more
Security Breaches June 22, 2020 Massive Global Surveillance Campaign Used Rogue Chrome Extensions to Steal Data Researchers at Awake Security have uncovered a massive global surveillance campaign that used malicious Google Chrome extensions to steal sensitive data. The extensions had been ... Read more
Trends & Reports June 19, 2020 Gartner Predicts 33% Increase in Cloud Security Spending in 2020 Gartner has published a revised forecast for information security spending in 2020, predicting a much lower increase due to COVID19. A previous analysis of the ... Read more
Security Breaches June 18, 2020 Microsoft’s COVID-19 Threat Analysis Reveals Attackers Adapt Campaigns to Local Events Many threat actors have adopted COVID-19 themed lures in phishing campaigns and for distributing malware, but the proportion of COVID-19 related threats is much lower ... Read more
Compliance June 18, 2020 Guidance Issued on Addressing Privacy and Security Risks for Telehealth Data in the Cloud The Cloud Security Alliance has published a new resource to help healthcare organizations address the privacy and security risks associated with the processing, storage, and ... Read more
Compliance June 17, 2020 Ripple20: Critical Vulnerabilities in Treck TCP/IP Stack Affect Hundreds of Millions of Devices A set of 19 vulnerabilities have been identified in the TCP/IP software library developed by Cincinnati-based Treck Inc., a developer of real-time embedded internet protocols ... Read more
Tools & Practices June 17, 2020 Adobe Out-of-Band Update Fixes 18 Critical Vulnerabilities Adobe has issued an out-of-band update correcting 18 critical flaws in Adobe After Effects, Illustrator, Premiere Pro, Premiere Rush, Campaign, and Audition. All 18 flaws ... Read more
Tools & Practices June 16, 2020 6 Vulnerabilities Identified in D-Link DIR-865L Cloud Wireless Routers Security researchers at Palo Alto Network’s Unit 42 team have identified 6 vulnerabilities in the D-Link DIR-865L series of cloud wireless routers, one of which ... Read more