Two senators called on the Department of Homeland Security to investigate the possibility that VPNs are allowing valuable information to be routed to foreign adversaries.
Two U.S. senators are taking bipartisan aim at foreign-owned virtual private networks (VPNs), which they say are often headquartered “in countries that do not share American interests or values” – specifically, China and Russia.
Vaporworms, a fileless malware is now coming of age and may be the next big threat enterprises will have to contend with this year according to senior security analyst Marc Laliberte of WatchGuard Technologies.
Plixer is in the world of flow record analysis, solving issues for both network and security operations folks. “Oh, so they’re a netflow collector?” Yes, that’s how Plixer started back in 1999, but there’s much more to the story than just collection of flow records now that they’ve got nearly 20 years of software development under their belt.
As technology continues to transform the way healthcare is delivered, the industry is burdened by the growing cybersecurity risks inherent in the expansion of connected devices. Understanding that each connected device opens another pathway for threat actors, it’s incumbent upon device manufacturers to keep security foremost throughout the development life cycle. The question is, how can manufacturers ensure the security of the devices they create? Furthermore, what can healthcare companies do to mitigate the risks inherent in the future of healthcare cybersecurity?
The average cost of a cyber breach for companies now exceeds one-million dollars according to a new report by Radware.
Nearly 48,000 patients have been affected by a breach of a credit card processing system that was utilized by Baylor, Scott and White Medical Center, a hospital in Texas.
A breach discovered September 29 at Baylor Scott & White Medical Center – Frisco may have compromised the payment information of about 47,000 patients or guarantors.
Cryptoming software can be used for other things such as stealing corporate secrets according to Troy Kent, a threat researcher at Awake Security who presented his findings at the InfoSecurity America Conference.
A suspected Chines APT group exploited the recently patched ColdFusion vulnerability in the wild by compromising a vulnerable ColdFusion server after directly uploading a China Chopper webshell.