Healthcare organizations targeted with Maui ransomware
A less known ransomware threat dubbed Maui has been and is likely to continue hitting healthcare organizations, a new CISA alert warns. Maui is unusual in many ways: it does not show a ransom note, it does not rely upon external infrastructure to rec.....»»
Thales Passwordless 360° enables organizations to improve their identity management practices
Thales announced Passwordless 360°, a new concept for passwordless authentication which offers Thales customers the broadest coverage of passwordless function across multiple types of users and assurance levels. Passwordless 360° has the flexibilit.....»»
TikTok hack compromised CNN account; Paris Hilton and others targeted
A TikTok hack allowed attackers to take control of CNN’s account, while other high-profile accounts were also targeted. The nature of the security breach remains a mystery at present. It was said to have involved direct messaging, but was seemin.....»»
N2WS launches cross-cloud volume restore for AWS and Azure
N2WS has introduced several new features to its cloud-native backup and disaster recovery (BDR) platform to help enterprises and managed service providers (MSPs) with combatting the increasing number of cybersecurity attacks on organizations while al.....»»
London hospitals declare emergency following ransomware attack
Attack takes out third-party testing and diagnostics provider critical to care. Enlarge A ransomware attack that crippled a London-based medical testing and diagnostics provider has led several major hospitals in the ci.....»»
SailPoint Risk Connectors helps organizations identify and act on risks
SailPoint has announced a new offering on its Atlas platform, SailPoint Risk Connectors. As part of its Atlas platform, SailPoint Risk Connectors makes it easier for organizations to make informed access decisions based on an identity’s third-party.....»»
Organizations are moving from experimenting with AI to adopting it
Despite AI’s potential, only 14% of organizations are ready to implement and utilize these technologies. While AI offers significant advantages, the focus must shift to essential, foundational actions to realize its full potential, emphasizing.....»»
Businesses must prioritize digital trust to avoid major problems
As organizations pursue digital transformation, they urgently need to prioritize digital trust to achieve their goals and prepare for future market opportunities, legislation, and regulatory compliance, according to ISACA. The ISACA State of Digital.....»»
20 free cybersecurity tools you might have missed
Free, open-source cybersecurity tools have become indispensable to protecting individuals, organizations, and critical infrastructure from cyber threats. These tools are created through collaborative and transparent efforts, making them affordable an.....»»
New understanding of astatine"s chemical properties could aid targeted alpha therapy for cancer
Astatine is one of the least-studied elements of the periodic table, because all isotopes of astatine are unstable, with the longest half-life barely exceeding 8 hours. Thus, only radiochemists at the production facilities (limited worldwide) can hav.....»»
Team of international experts call for urgent action against increasing threat from invasive species
While invasive alien species have long been recognized as a major threat to nature and people, urgent action now is needed to tackle this global issue. This is the critical evaluation by the 88 authors, representing 101 organizations from 47 countrie.....»»
Superconducting circuit for qubit control within large-scale quantum computer systems successfully demonstrated
In support of the development of large-scale superconducting quantum computers, researchers with the National Institute of Advanced Industrial Science and Technology (AIST), one of the largest public research organizations in Japan, in collaboration.....»»
Week in review: Attackers trying to access Check Point VPNs, NIST CSF 2.0 security metrics evolution
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RansomLord: Open-source anti-ransomware exploit tool RansomLord is an open-source tool that automates the creation of PE files, which are used to ex.....»»
Check Point VPN zero-day exploited since beginning of April (CVE-2024-24919)
Attackers have been exploiting CVE-2024-24919, a zero-day vulnerability in Check Point Security Gateways, to pinpoint and extract password hashes for local accounts, which they then used to move laterally in the target organizations’ network. &.....»»
Volunteer recruitment still "tough": UK survey shows no signs of improvement
More than half of voluntary organizations are still finding volunteer recruitment difficult, according to a major sector survey which shows that the situation has not improved over the last 12 months......»»
Exploring hierarchy in dynamic environments
Most organizations operate under command hierarchies: Workers, who know the ground reality, report to managers, who know the big picture. If these views conflict, what happens to organizational performance?.....»»
Identity-related incidents becoming severe, costing organizations a fortune
With the rise of identity sprawl and system complexity, more businesses are suffering identity-related incidents than ever before, according to IDSA. Identity-related incidents in headlines Identity-related incidents continue to dominate today’s he.....»»
59% of public sector apps carry long-standing security flaws
Applications developed by public sector organizations have more security debt than those created by the private sector, according to Veracode. Security debt, defined for this report as flaws that remain unfixed for longer than a year, exists in 59% o.....»»
Creating HR success: Key factors in training assessors for enhanced performance ratings
New research published in Industrial and Organizational Psychology from University of Alabama at Birmingham Collat School of Business faculty is examining how organizations can improve their training programs by customizing frame-of-reference trainin.....»»
Moonstone Sleet: A new North Korean threat actor
Microsoft has named yet another state-aligned threat actor: Moonstone Sleet (formerly Storm-1789), which engages in cyberespionage and ransomware attacks to further goals of the North Korean regime. “Moonstone Sleet uses tactics, techniques, an.....»»
Check Point confirms VPN services targeted by hackers
Hackers are after poorly protected VPN accounts as they look for easy ways into corporate infrastructure......»»