Ransomware’s Grip on Healthcare

Until C-level executives fully understand potential threats and implement effective mitigation strategies, healthcare organizations will remain vulnerable and at risk of disruption.

darkreading – ​Read More

Note From the Editor-in-Chief

A change in ownership and what it means for our readers.

darkreading – ​Read More

Vendors Unveil New Cloud Security Products, Features at AWS re:Invent 2024

AWS and other vendors have announced new cloud security products and features at the cloud giant’s re:Invent 2024 conference.

The post Vendors Unveil New Cloud Security Products, Features at AWS re:Invent 2024 appeared first on SecurityWeek.

SecurityWeek – ​Read More

Top US Consumer Watchdog Has a Plan to Fight Predatory Data Brokers

A new proposal by the Consumer Financial Protection Bureau would use a 54-year-old privacy law to impose new oversight of the data broker industry. But first, the agency must survive Elon Musk.

Security Latest – ​Read More

TorGuard VPN Review: The Good, the Bad, and the Ugly

Uncover the pros, cons, and everything in between in our in-depth TorGuard VPN review. Explore its features, security, performance, and pricing.

Security | TechRepublic – ​Read More

Energy Sector Contractor ENGlobal Targeted in Ransomware Attack

Energy sector contractor ENGlobal Corporation has restricted access to some of its systems in response to a ransomware attack.

The post Energy Sector Contractor ENGlobal Targeted in Ransomware Attack appeared first on SecurityWeek.

SecurityWeek – ​Read More

Cisco Warns of Attacks Exploiting Decade-Old ASA Vulnerability

Cisco has updated an advisory for CVE-2014-2120 to warn customers that the vulnerability has been exploited in the wild. 

The post Cisco Warns of Attacks Exploiting Decade-Old ASA Vulnerability appeared first on SecurityWeek.

SecurityWeek – ​Read More

NachoVPN Tool Exploits Flaws in Popular VPN Clients for System Compromise

Cybersecurity researchers have disclosed a set of flaws impacting Palo Alto Networks and SonicWall virtual private network (VPN) clients that could be potentially exploited to gain remote code execution on Windows and macOS systems.
“By targeting the implicit trust VPN clients place in servers, attackers can manipulate client behaviours, execute arbitrary commands, and gain high levels of access

The Hacker News – ​Read More

US agency proposes new rule blocking data brokers from selling Americans’ sensitive personal data

The U.S. consumer protection agency said it’s closing the loophole to block the “widespread evasion” of federal law by data brokers.

© 2024 TechCrunch. All rights reserved. For personal use only.

Security News | TechCrunch – ​Read More

North Korean Kimsuky Hackers Use Russian Email Addresses for Credential Theft Attacks

The North Korea-aligned threat actor known as Kimsuky has been linked to a series of phishing attacks that involve sending email messages that originate from Russian sender addresses to ultimately conduct credential theft.
“Phishing emails were sent mainly through email services in Japan and Korea until early September,” South Korean cybersecurity company Genians said. “Then, from mid-September,

The Hacker News – ​Read More