Federal authorities are warning about seven vulnerabilities affecting a software agent used to remotely manage an array of medical devices and other connected gear. If exploited, the vulnerabilities could enable hackers to gain full control of the affected devices or alter their configurations.
Google will buy cybersecurity firm Mandiant for $5.4 billion, an acquisition Google says will give it new capabilities to respond to cybersecurity threats and bolster its cloud platform. Mandiant will be folded into Google's Cloud Platform.
As Western cybersecurity officials warn that Russia's Ukraine invasion poses an elevated cybersecurity risk to all, kudos to Cloudflare, CrowdStrike and Ping Identity for offering free endpoint security and other defenses to the healthcare sector and power sectors, for at least four months.
As Russia's ground invasion and air assault against Ukraine continues, so too do online attacks being launched against Ukrainian targets. A Ukrainian cybersecurity official says his country is fighting the first-ever "hybrid war" that bridges both the physical and online realms.
A newly revealed flaw in the Linux kernel dubbed "Dirty Pipe" could potentially allow attackers to take complete control over a device, read private messages and gain admin-level privileges. The Linux Foundation has patched the flaw.
The 2021-22 report shares Omdia’s vision of what an AIOps solution should currently deliver as well as areas expected to evolve.
Splunk was the only AIOps solution to score 100% for solution breadth.
Omdia defines AIOps as the overarching technology that can bring all the management practices (observability,...
Guidance from the Healthcare Sector Coordinating Council provides healthcare delivery organizations and vendors with recommendations for including cybersecurity in contracts pertaining to the procurement of medical device products and related services.
Russia's National Coordination Center for Computer Incidents has published a list of 17,576 IP addresses and 166 domains that it says are targeting the country's information resources via distributed denial-of-service attacks. It also published a 20-point list of remediation measures.
A phishing campaign, likely carried out by a state-sponsored threat actor, is targeting European government personnel who are aiding Ukrainian refugees, Proofpoint says. The TTPs in the campaign resemble those of Ghostwriter, a group that was the subject of a Ukrainian CERT warning on Feb. 25.
Critical cybersecurity gaps in smart infusion pumps have put the data and care of hundreds of patients at risk, according to researchers at Unit 42 of cybersecurity firm Palo Alto Networks. They say that 75% of the 200,000 smart infusion pump networks they scanned contained known security gaps.
As Russia's invasion of Ukraine continues, what should global CISOs and security teams do to ensure that their organizations stay protected? Beyond following cybersecurity agencies' guidance, experts offer advice on how to brief the board of directors, appeal for resources, support teams and more.
Protecting your endpoints in the face of relentless ransomware, fileless malware, and other advanced attacks is difficult enough. This becomes harder when your security teams are stretched thin or you don’t have the right expertise due to challenges with the ongoing cybersecurity talent shortage.
As a result,...
Adversary strategies have evolved from simple malware distribution to a broad set of automated, targeted, and sophisticated attacks that can bypass traditional endpoint protection. This has forced manufacturers to deploy multiple products from different vendors to protect against, detect, and respond to these threats....
Why didn't Russia unleash major cyberattacks against Ukrainian critical infrastructure ahead of its invasion troop advance? While theories abound, some experts warn that, unfortunately, this war and its cost to human life is only set to get worse.
Federal authorities are warning healthcare and public health sector entities to be proactive and vigilant to at least three main potential threat groups, as well as various wiper malware, linked with Russia's attack on Ukraine.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.