Attack Surface Management 2022 Midyear Review Part 2

Attack Surface Management 2022 Midyear Review Part 2

The number of vulnerabilities published by CVE increased in the first half of 2022, with 12,380 records compared to 9,420 during the same period last year. This trend was also seen through Trend Micro ZDI. There was an increase from 770 Advisories issued between January 1st and June 30th 2021. Now, there are 944 total security alerts available via this program since the midyear of 2022 alone. Vulnerabilities with a high-severity rating made up the…

Read More

Addressing Ransomware in Hospitals & Medical Devices

Addressing Ransomware in Hospitals & Medical Devices

Ransomware attacks have been on the rise in recent years, and hospitals are increasingly becoming targets. In many cases, these attacks can have devastating consequences, disrupting vital services and putting patients’ lives at risk. Historically, ransomware was just another nuisance. Criminals would just do email phishing and attack every target they could. But as cybercriminals become more and more sophisticated, they create more complex attacks that target big-ticket victims such as healthcare facilities. There are…

Read More

Leading ransomware variants in Q3

Leading ransomware variants in Q3

Leading ransomware variants in Q3 | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company

LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company

LV Ransomware Exploits ProxyShell in Attack on a Jordan-based Company Our blog entry provides a look at an attack involving the LV ransomware on a Jordan-based company from an intrusion analysis standpoint By: Mohamed Fahmy, Sherif Magdy, Ahmed Samir October 25, 2022 Read time:  ( words) The Trend Micro research team recently analyzed an infection related to the LV ransomware group, a ransomware as a service (RaaS) operation that has been active since late 2020,…

Read More

New opportunities at the intersection of physical and cybersecurity

New opportunities at the intersection of physical and cybersecurity

New opportunities at the intersection of physical and cybersecurity | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Attack Surface Management 2022 Midyear Review Part 1

Attack Surface Management 2022 Midyear Review Part 1

Attack Surface Management 2022 Midyear Review Part 1 Privacy & Risks In our 2022 midyear roundup, we examine the most significant trends and incidents that influenced the cybersecurity landscape in the first half of the year. By: Trend Micro October 20, 2022 Read time:  ( words) The digital age is an exciting time for businesses as it offers the opportunity to be more efficient and effective with how things are done. Many companies have taken…

Read More

Examining the Effects of Cyberattacks on Patient Care

Examining the Effects of Cyberattacks on Patient Care

Cyberattacks on healthcare entities aren’t just annoyances. Healthcare IT and security professionals who participated in a recent survey conducted by the Ponemon Institute said cyberattacks result in poor patient outcomes including delayed procedures, increased complications – and even a rise in mortality. “The key takeaway of this research is that there is a direct connection between a cyber event and an adverse patient outcome,” says Ryan Witt, a healthcare cybersecurity executive with Proofpoint, which sponsored…

Read More

Setting the stage for ransomware recovery

Setting the stage for ransomware recovery

Setting the stage for ransomware recovery | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy…

Read More

Cybersecurity blind spots: The risks hiding in your own IT environment

Cybersecurity blind spots: The risks hiding in your own IT environment

Cybersecurity blind spots: The risks hiding in your own IT environment | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more….

Read More

60% of SMBs experienced a cyberattack in the last year

60% of SMBs experienced a cyberattack in the last year

60% of SMBs experienced a cyberattack in the last year | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More
1 12 13 14 15 16 42