REvil Servers Shoved Offline by Governments – But They’ll Be Back, Researchers Say

A multi-country effort has given ransomware gang REvil a taste of its own medicine by pwning its backups and pushing its leak site and Tor payment site offline. The REvil…

Mandating a Zero-Trust Approach for Software Supply Chains

Sounil Yu, CISO at JupiterOne, discusses software bills of materials (SBOMs) and the need for a shift in thinking about securing software supply chains. In the wake of the SolarWinds…

More and More Companies Are Getting Hit with Ransomware

The increasing frequency and size of ransomware attacks are becoming a huge concern for thousands of organizations globally. All over the world, threat actors take advantage of security vulnerabilities and…

Medtronic recalls insulin pump controllers over life-threatening flaws

A threat actor can exploit these vulnerabilities to hijack Medtronic devices and modify how much insulin should be administered to a patient. Medtronic, a well-known medical device maker, has recalled…

Study shows AI-generated fake reports fool experts

Padlokr –  Padlokr –  It doesn’t take a human mind to produce misinformation convincing enough to fool experts in such critical fields as cybersecurity. iLexx/iStock via Getty Images Priyanka Ranade,…

Top 5 Healthcare Cyber Attacks and Threats

Even before the novel coronavirus pandemic, which forced healthcare organizations to shift to provide patients remote care and telemedicine rapidly, the healthcare industry had already embraced the cloud, as well…

Healthcare data security issues: Best security practices for virtual healthcare sessions

The healthcare sector has, and still is, undergoing a digital transformation — the Covid-19 pandemic exacerbating this change. Telehealth (healthcare is delivered by remote methods) has been used successfully during…

Smart Toys and Their Cybersecurity Risks: Are Our Toys Becoming a Sci-Fi Nightmare? [updated 2021]

In the “Living Doll” episode of “The Twilight Zone,” a lifelike doll named Talky Tina turned rogue and terrorized a family. This nightmare scenario of out-of-control toys is sometimes portrayed…

The Most Vulnerable and Hackable Medical Devices

  The Internet of Things (IoT) adds convenience and capabilities in both personal and professional applications. Smart device usage in the medical field is growing by leaps and bounds: in…