Category: Uncategorized

The Persisting Risks Posed by Legacy Medical Devices

Legislation requiring vendors to design cybersecurity into their medical devices is a great first step to help healthcare entities, but organizations will still face major risks involving legacy medical gear for many years to come, says Daniel dos Santos, research leader at security firm Forescout.http://dlvr.it/ShK121

Chinese Group Targeting Vulnerable Cloud Providers, Apps

Cryptomining Campaign Targets Public Cloud Environments, Increases Security Risks Cybersecurity researchers say a Chinese for-profit threat group tracked as 8220 Gang is targeting cloud providers and poorly secured applications with a custom-built crypto miner and IRC bot. The malware can slow system performance, drive up costs and expose systems to security risks.http://dlvr.it/ShJy4L

Why Every Small Business Needs a Managed IT Service Provider

ICYMI: As a small business owner, your business may face various challenges regarding IT support, such as limited resources or lack of experience. This is why it’s essential to have reliable IT systems …http://dlvr.it/ShH1Pp

Chinese Group Targeting Vulnerable Cloud Providers, Applications

ICYMI: Crypto Mining Campaign Targets Public Cloud Environments, Increases Security Risks Cybersecurity researchers say a Chinese for-profit threat group tracked as 8220 Gang is targeting cloud providers and poorly secured applications with a custom-built crypto miner and IRC bot. The malware can slow system performance, drive up costs and expose systems to security risks.http://dlvr.it/ShGksq

Hostile Takeover: Kraken Hacks Rival Darknet Market Solaris

ICYMI: Since Hydra Market Got Shuttered by Police, Russian Rivals Battle for Market Share Competition between rival Russian-language darknet markets remains fierce since police shuttered Hydra last year. The latest to fall dark is Solaris, which controlled an estimated 25% of the darknet drug trade. It got hacked by newcomer rival Kraken. But that wasn’t…
Read more

Securing the SaaS Layer

ICYMI: In this episode of “Cybersecurity Unplugged,” Galit Lubetzky Sharon, CTO of Wing Security, discusses the challenge of securing SaaS applications, which are decentralized and ever-expanding. She describes how Wing Security manages app inventories and issues of compliance, remediation and privacy.http://dlvr.it/ShF4tm

Chinese Group Targeting Vulnerable Cloud Providers, Applications

Crypto Mining Campaign Targets Public Cloud Environments, Increases Security Risks Cybersecurity researchers say a Chinese for-profit threat group tracked as 8220 Gang is targeting cloud providers and poorly secured applications with a custom-built crypto miner and IRC bot. The malware can slow system performance, drive up costs and expose systems to security risks.http://dlvr.it/ShDpYD

PayPal Accounts Succumb to Credential Stuffing Attack

ICYMI: About 35,000 Affected by 2-Day Attack in December, Says Online Payments Giant PayPal is notifying 34,942 Americans that a hacker accessed their personal information during a two-day credential stuffing attack in early December. The San Jose, California-based company says it has not detected unauthorized transactions emanating from affected accounts.http://dlvr.it/ShC75q