Microsoft Power Apps misconfiguration exposes data from 38 million records

Microsoft Power Apps misconfiguration exposes data from 38 million records

The leaked data included personal information for COVID-19 contact tracing and vaccination appointments, social security numbers for job applicants, employee IDs, names and email addresses. Image: Microsoft A lack of proper security configuration with Microsoft’s Power Apps has led to the exposure of data from some 38 million records, according to security firm UpGuard. In a report published Monday, UpGuard said that the misconfiguration of the low-code development platform exposed such information as COVID-19 contact…

Read More

McAfee Enterprise ATR Uncovers Vulnerabilities in Globally Used B. Braun Infusion Pump

McAfee Enterprise ATR Uncovers Vulnerabilities in Globally Used B. Braun Infusion Pump

Overview As part of our continued goal to provide safer products for enterprises and consumers, we at McAfee Advanced Threat Research (ATR) recently investigated the B. Braun Infusomat Space Large Volume Pump along with the B. Braun SpaceStation, which are designed for use in both adult and pediatric medical facilities. This research was done with support from Culinda – a trusted leader in the medical cyber-security space. Though this partnership, our research led us to…

Read More

Overmedicated: Breaking the Security Barrier of a Globally Deployed Infusion Pump

Overmedicated: Breaking the Security Barrier of a Globally Deployed Infusion Pump

Cyberattacks on medical centers are one of the most despicable forms of cyber threat there is. For instance, on October 28th, 2020, a cyberattack at the University of Vermont Medical Center in Burlington VT led to 75% of the scheduled chemotherapy patients being turned away. Many of us have friends and loved ones who have had to undergo intensive treatments, and the last thing we want in this situation is for their critical care to…

Read More

Time to Fix High Severity Apps Increases by Ten Days

Time to Fix High Severity Apps Increases by Ten Days

The average time taken to fix high severity application security flaws has increased by ten days in just a month, according to the latest data from NTT Application Security. The security vendor’s AppSec Stats Flash report for August offers a broad view of the current state of application security across various verticals. Most important is the data that details how quickly or otherwise organizations are at closing the window of exposure (WoE) between a patch…

Read More

Over a Third of Smart Device Owners Do Not Take Security Measures

Over a Third of Smart Device Owners Do Not Take Security Measures

More than a third (35%) of connected device owners in the UK do not take additional security measures to protect their smart home devices and rely solely on inbuilt security features. This is according to findings from the 2021 Norton Cyber Safety Insights Report: Special Release – Home & Safety, which examined consumers’ at-home online behaviors. The UK portion of the study revealed a worrying lack of security hygiene for smart devices among British consumers. Only…

Read More

Microsoft Power Apps Tool Exposed 38 Million Records by Default

Microsoft Power Apps Tool Exposed 38 Million Records by Default

A configuration issue with a popular Microsoft development platform has exposed tens of millions of sensitive customer records, including those containing COVID-19 information, according to researchers. Microsoft Power Apps enables “citizen developers” to create mobile and web-based apps for their businesses. However, a team from UpGuard found that the portal for the platform was configured to allow public access in many cases, exposing at least 38 million records. The issue stems from the Open Data…

Read More

Securing Enterprise Mailboxes with Hornetsecurity

Securing Enterprise Mailboxes with Hornetsecurity

Introduction In 2020 Microsoft reported over 258 million monthly commercial users of its Office 365 productivity suite. For decades Microsoft has been powering business with software like Outlook, Word, and Excel. As technology and connectivity have improved, so has functionality and user requirements. Now, over 75 million people use Microsoft Teams every month for virtual meeting experiences. Consumers of Microsoft technology have moved away from self-managed instances of services like Microsoft Exchange for email communication,…

Read More

The Top 10 Highest Paying Jobs in Information Security – Part 2

The Top 10 Highest Paying Jobs in Information Security – Part 2

Information security is an exciting and rapidly growing field for individuals who are interested in protecting users and their data. In an effort to map out the industry as a possible career choice, we recently conducted research into the top 10 infosec jobs based on overall pay grade. We now continue with the second part of our two-part series. A Security Engineer is a mid-level employee who builds and maintains an organization’s IT security solutions. In this capacity, Security Engineers…

Read More

Silver Optis: Innovative and Socially Conscious Technologies at Black Hat

Silver Optis: Innovative and Socially Conscious Technologies at Black Hat

By Olivia Gallucci, Cybersecurity Reporter, Cyber Defense Magazine I interviewed approximately sixty industry leaders from over forty companies who attended Black Hat. Although this article series—The Optis—can be read as a traditional Black Hat recap, I specifically highlight twenty-one companies that stand out and whose growth I recommend watching. Rochester Institute of Technology’s Cybersecurity Club, RITSEC, inspired the metrics I used to analyze and rank companies. Specifically, I adopted RITSEC’s motto, “Security Through Community,” while…

Read More
1 2,133 2,134 2,135 2,136 2,137 2,595