Summary: The content discusses the use of unsanctioned apps, including AI, by cybersecurity professionals and the risks associated with it.

Threat Actor: N/A Victim: N/A

Key Point :

73% of cybersecurity professionals have used unsanctioned apps, including AI, in the past year. Most professionals acknowledged data loss, lack of visibility and control, and data breaches as the top risks of using unauthorized tools.…
Read More

Summary: This article discusses a cybercrime incident where a terminated worker unlawfully accessed patient information at Geisinger, a healthcare organization.

Threat Actor: Former employee of Nuance Communications Inc. | Nuance Communications Inc. Victim: Geisinger | Geisinger

Key Point :

An ex-employee of Nuance Communications Inc. has been indicted for unlawfully accessing patient information at Geisinger, a healthcare organization.…
Read More

Summary: This content discusses the unpatchable vulnerabilities found in temperature monitors made by Proges Plus and used in hospitals.

Threat Actor: No specific threat actor mentioned. Victim: Hospitals using temperature monitors made by Proges Plus.

Key Point :

Researchers have discovered unpatchable vulnerabilities in temperature monitors made by Proges Plus and used in hospitals.…
Read More
Executive Summary

This post reviews strategies for identifying and mitigating potential attack vectors against virtual machine (VM) services in the cloud. Organizations can use this information to understand the potential risks associated with their VM services and strengthen their defense mechanisms. This research focuses on VM services offered by three major cloud service providers (CSPs): Amazon Web Services (AWS), Azure and Google Cloud Platform (GCP).…

Read More

Summary: This article discusses the importance of exposure management in cybersecurity and how organizations can prioritize their security efforts to protect their most vulnerable areas.

Threat Actor: N/A

Victim: N/A

Key Points:

Organizations need to implement asset identification and understand their assets’ security posture to effectively protect against cyber threats.…
Read More

Being a CISO is a balancing act: ensuring organizations are secure without compromising users’ productivity. This requires taking multiple elements into consideration, like cost, complexity, performance and user experience. CISOs around the globe use Cato SSE 360, as part of the Cato SASE Cloud platform to balance these factors without compromise.…

Read More

Mar 04, 2024The Hacker NewsSaaS Security / Vulnerability Assessment

A company’s lifecycle stage, size, and state have a significant impact on its security needs, policies, and priorities. This is particularly true for modern mid-market companies that are either experiencing or have experienced rapid growth. As requirements and tasks continue to accumulate and malicious actors remain active around the clock, budgets are often stagnant at best.…

Read More

If you thought the software supply chain security problem was difficult enough today, buckle up. The explosive growth in artificial intelligence (AI) use is about to make those supply chain issues exponentially harder to navigate in the years to come. 

Developers, application security pros, and DevSecOps professionals are called to fix the highest risk flaws that lurk in what seems like the endless combinations of open source and proprietary components that are woven into their applications and cloud infrastructure.…

Read More

Beware of What Is Lurking in the Shadows of Your IT

Five Stages of a Ransomware Attack, during one ransomware incident X-Force uncovered an entrenched advanced adversary that was leveraging a Shadow IT bridged network to maintain access to two organizations for over a year.

During the investigation, X-Force identified the ransomware attack was contained within a single domain of the multi-domain forest.…

Read More