Cybersecurity Tools

Widespread Vulnerability in SSH Servers: The Terrapin Attack Threat

The Terrapin attack, a newly identified security threat, jeopardizes nearly 11 million SSH servers that are accessible online. Originating from academic research at Ruhr University Bochum in Germany, this attack specifically targets the SSH protocol, affecting both clients and servers. It exploits vulnerabilities during the handshake process, especially when using certain encryption modes, compromising the […]

The post Widespread Vulnerability in SSH Servers: The Terrapin Attack Threat appeared first on Heimdal Security Blog.

Cybersecurity Tools

4 ways to advance your global security operations center

EXECUTIVE SUMMARY: If your organization maintains a Global Security Operations Center (GSOC), ensure that you’re not heavily reliant on legacy systems and processes. In this article, find out about how to strategically advance your operations, enabling you to effectively prevent threats and drive more sustainable business outcomes. What is a global security operations center? In […]

The post 4 ways to advance your global security operations center appeared first on CyberTalk.

Cybersecurity Tools

Major Data Breach at HealthEC Affects Millions

HealthEC LLC, a leading provider in health management solutions, experienced a significant data breach, impacting approximately 4.5 million individuals. This incident affected patients who received care through one of HealthEC’s client organizations. The company’s population health management platform, used by numerous healthcare organizations, integrates various aspects of patient data, including analytics, care coordination, and compliance. […]

The post Major Data Breach at HealthEC Affects Millions appeared first on Heimdal Security Blog.

Cybersecurity Tools

Black Basta Buster Utilizes Ransomware Flaw to Recover Files

Security research and consulting firm SRLabs exploited a vulnerability in the encryption algorithm of a specific strain of Black Basta ransomware to develop and release a decryptor tool named Black Basta Buster. This tool, released in response to the activities of a prolific cybercriminal gang, can decrypt files affected by the malware. However, the decryptor’s […]

The post Black Basta Buster Utilizes Ransomware Flaw to Recover Files appeared first on Heimdal Security Blog.

Cybersecurity Tools

The Weeks in Cyber Security and Data Privacy: 18 – 31 December 2023

Welcome to a new year! Following our Christmas break, we’re rounding up two weeks’ worth of the biggest and most interesting news stories. At the end of each month, these incidents – and any others that we find – will be used to inform our monthly analysis of data breaches and cyber attacks. We’ll also soon publish our 2023 review of publicly disclosed incidents and records known to be breached across the year, as well as our quarterly report, so keep an eye on our blog. Publicly disclosed data breaches and cyber attacks: in the spotlight Unprotected Real Estate Wealth

The post The Weeks in Cyber Security and Data Privacy: 18 – 31 December 2023 appeared first on IT Governance UK Blog.

Cybersecurity Tools

CISO of Fortune 35 company talks 55 million alerts

EXECUTIVE SUMMARY: Thomas Dager is the CISO at Archer Daniels Midland Company (ADM). He develops, implements and monitors a strategic, comprehensive enterprise information security and IT risk management program to ensure the integrity, confidentiality and availability of information owned, controlled or processed by the organization. Previously, he was with Delta Community Credit Union as an […]

The post CISO of Fortune 35 company talks 55 million alerts appeared first on CyberTalk.

Scroll to Top