Healthcare organizations targeted with Maui ransomware
A less known ransomware threat dubbed Maui has been and is likely to continue hitting healthcare organizations, a new CISA alert warns. Maui is unusual in many ways: it does not show a ransom note, it does not rely upon external infrastructure to rec.....»»
![Google](https://www.google.com/images/poweredby_transparent/poweredby_FFFFFF.gif)
Organizations are moving from experimenting with AI to adopting it
Despite AI’s potential, only 14% of organizations are ready to implement and utilize these technologies. While AI offers significant advantages, the focus must shift to essential, foundational actions to realize its full potential, emphasizing.....»»
Businesses must prioritize digital trust to avoid major problems
As organizations pursue digital transformation, they urgently need to prioritize digital trust to achieve their goals and prepare for future market opportunities, legislation, and regulatory compliance, according to ISACA. The ISACA State of Digital.....»»
20 free cybersecurity tools you might have missed
Free, open-source cybersecurity tools have become indispensable to protecting individuals, organizations, and critical infrastructure from cyber threats. These tools are created through collaborative and transparent efforts, making them affordable an.....»»
New understanding of astatine"s chemical properties could aid targeted alpha therapy for cancer
Astatine is one of the least-studied elements of the periodic table, because all isotopes of astatine are unstable, with the longest half-life barely exceeding 8 hours. Thus, only radiochemists at the production facilities (limited worldwide) can hav.....»»
Team of international experts call for urgent action against increasing threat from invasive species
While invasive alien species have long been recognized as a major threat to nature and people, urgent action now is needed to tackle this global issue. This is the critical evaluation by the 88 authors, representing 101 organizations from 47 countrie.....»»
Superconducting circuit for qubit control within large-scale quantum computer systems successfully demonstrated
In support of the development of large-scale superconducting quantum computers, researchers with the National Institute of Advanced Industrial Science and Technology (AIST), one of the largest public research organizations in Japan, in collaboration.....»»
Week in review: Attackers trying to access Check Point VPNs, NIST CSF 2.0 security metrics evolution
Here’s an overview of some of last week’s most interesting news, articles, interviews and videos: RansomLord: Open-source anti-ransomware exploit tool RansomLord is an open-source tool that automates the creation of PE files, which are used to ex.....»»
Check Point VPN zero-day exploited since beginning of April (CVE-2024-24919)
Attackers have been exploiting CVE-2024-24919, a zero-day vulnerability in Check Point Security Gateways, to pinpoint and extract password hashes for local accounts, which they then used to move laterally in the target organizations’ network. &.....»»
Volunteer recruitment still "tough": UK survey shows no signs of improvement
More than half of voluntary organizations are still finding volunteer recruitment difficult, according to a major sector survey which shows that the situation has not improved over the last 12 months......»»
Exploring hierarchy in dynamic environments
Most organizations operate under command hierarchies: Workers, who know the ground reality, report to managers, who know the big picture. If these views conflict, what happens to organizational performance?.....»»
Identity-related incidents becoming severe, costing organizations a fortune
With the rise of identity sprawl and system complexity, more businesses are suffering identity-related incidents than ever before, according to IDSA. Identity-related incidents in headlines Identity-related incidents continue to dominate today’s he.....»»
59% of public sector apps carry long-standing security flaws
Applications developed by public sector organizations have more security debt than those created by the private sector, according to Veracode. Security debt, defined for this report as flaws that remain unfixed for longer than a year, exists in 59% o.....»»
Creating HR success: Key factors in training assessors for enhanced performance ratings
New research published in Industrial and Organizational Psychology from University of Alabama at Birmingham Collat School of Business faculty is examining how organizations can improve their training programs by customizing frame-of-reference trainin.....»»
Moonstone Sleet: A new North Korean threat actor
Microsoft has named yet another state-aligned threat actor: Moonstone Sleet (formerly Storm-1789), which engages in cyberespionage and ransomware attacks to further goals of the North Korean regime. “Moonstone Sleet uses tactics, techniques, an.....»»
Check Point confirms VPN services targeted by hackers
Hackers are after poorly protected VPN accounts as they look for easy ways into corporate infrastructure......»»
RansomLord: Open-source anti-ransomware exploit tool
RansomLord is an open-source tool that automates the creation of PE files, which are used to exploit ransomware pre-encryption. “I created RansomLord to demonstrate ransomware is not invincible, has vulnerabilities and its developers make mista.....»»
Hacker group says it carried out Christie’s cyberattack
A hacker group has claimed responsibility for a cyberattack that targeted auction house Christie’s earlier this month......»»
34% of organizations lack cloud cybersecurity skills
Incident response today is too time consuming and manual, leaving organizations vulnerable to damage due to their inability to efficiently investigate and respond to identified threats, according to Cado Security. The incident response challenge is f.....»»
A new ransomware is hijacking Windows BitLocker to encrypt and steal files
New ransomware strain is creating new boot volumes and using labels to communicate with victims......»»
Detectify platform enhancements address growing attack surface complexity
Detectify announced a new Domains page and major improvements to existing capabilities for setting custom attack surface policies. These updates bring control over attack surface data and enable organizations to seamlessly configure alerts for policy.....»»