Sumitovant Biopharma is a patient-first, technology-driven biopharmaceutical company that’s accelerating the development and commercialization of novel therapies for patients with rare conditions and other serious diseases. Through the company’s proprietary computing and data platforms, scientific expertise, and...
Password security is a critical start for protecting devices and networks from malicious threats. However, implementing successful password security can be easier said than done. Do you have employees who are worried they won't remember something more complex than "password123"? Are you looking for 7 actionable steps...
The Palo Alto Networks Unit 42 threat research team has observed more than a 73% increase in the use of Red Team tools such as Cobalt Strike by threat actors. These tools are purpose-built to obfuscate network payloads and emulate real-world traffic to avoid detection. It is imperative that organizations today employ...
Download this must-read e-book book to understand why software firewalls are critical for today’s competitive enterprises. Five short chapters cover the foundational points of software firewalls and will help you understand how they can help your organization secure investments in public clouds, private clouds,...
Protecting your data from breaches is only one aspect of enterprise security, but it's important to go further to ensure that your secrets will remain safe – even in the unlikely event of a breach. Your information shouldn't just be protected by an account password, but also by a unique Secret Key: a 128-bit,...
The best way to level-up your existing IAM infrastructure is to add a single sign-on (SSO) to protect logins for approved apps. This guide will show you the benefits of a combined approach, in which company-approved and non-approved logins are attached to a single, strongly vetted identity to simplify administration,...
A recent attack by a Russian ransomware-as-a-service group that stole the personal information of 2.5 million patients of McLaren Health Care has triggered at least three proposed federal class action lawsuits in recent days, claiming the healthcare company failed to protect patient privacy.
As the cybersecurity landscape becomes increasingly complex, it’s essential for organizations to invest in the continuous maturation of their SOCs. Integrating malware sandboxing into SOC operations is an effective way to enhance threat detection, streamline workflows, and improve overall security posture. By...
Cisco has released urgent fixes to a critical vulnerability affecting an emergency communication system used to track callers' location in real time. A developer inadvertently hard-coded credentials in Cisco Emergency Responder software, opening a permanent backdoor for unauthenticated attackers.
Genetics testing firm 23andMe is investigating a data leak of ancestry DNA information for certain customers whose usernames and passwords were previously hacked on other websites. The company suspects a massive credential stuffing attack on individual accounts using recycled passwords and no MFA.
Hotel and casino giant MGM Resorts says the recent hack attack against it cost $110 million in lost revenue and mitigation expenses. The publicly traded company expects to recoup losses and costs to date via cyber insurance. MGM Resorts says that its investigation remains ongoing.
Hackers have weaponized a zero-day in a popular workspace collaboration tool to create administrator accounts and gain unrestricted access to their on-premises instances of the software, Atlassian's Confluence Data Center and Server products, which serves millions of daily active users.
Fundraising software powerhouse Blackbaud will pay $49.5 million to settle a multistate investigation into the company's data security practices and its response to a 2020 ransomware attack. The firm must also enhance its security and not misrepresent its data security practices.
Trick question for CSOs: When does a security incident qualify as being a data breach? The answer is that it's "a very complicated question" best left to the legal team, said former Uber CSO Joe Sullivan, sharing lessons learned from the U.S. Department of Justice's case against him.
Microsoft says it spotted an unusual hacking campaign in which hackers attempted to move laterally through the Azure cloud after compromising a virtual SQL server. It marks the first time that computing giant defenders have seen a lateral movement attempt with SQL Server as the starting point.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing govinfosecurity.com, you agree to our use of cookies.