Cyberattackers Hit Data of 80K Fertility Patients
Fertility Centers of Illinois' security measures protected electronic medical records, but the attackers still got at extremely intimate data in admin files. [...]
Fertility Centers of Illinois' security measures protected electronic medical records, but the attackers still got at extremely intimate data in admin files. [...]
More than 1.3 million patient records were stolen in the just-disclosed breach, which occurred back in October. [...]
Expect many more zero-day exploits in 2022, and cyberattacks using them being launched at a significantly higher rate, warns Aamir Lakhani, researcher at FortiGuard Labs. [...]
Here’s what cybersecurity watchers want infosec pros to know heading into 2022. [...]
Security flaws in the recently released Fisher-Price Chatter Bluetooth telephone can allow nearby attackers to spy on calls or communicate with children using the device. [...]
Casey Ellis, CTO at Bugcrowd, outlines how international relations have deteriorated into a new sort of Cold War, with espionage playing out in the cyber-domain. [...]
December's Patch Tuesday updates address six publicly known bugs and seven critical security vulnerabilities. [...]
The powerful devices leveraged by the Meris botnet have weaknesses that make them easy to exploit, yet complex for organizations to track and secure, researchers said. [...]
Attackers are milking unpatched Hikvision video systems to drop a DDoS botnet, researchers warned. [...]
We want to know what your biggest cloud security concerns and challenges are, and how your company is dealing with them. Weigh in with our exclusive poll! [...]
Cyberattackers stole PS5 root keys and exploited the kernel, revealing rampant insecurity in gaming devices. [...]
Researchers discovered 14 vulnerabilities in the ‘Swiss Army Knife’ of the embedded OS used in many OT and IoT environments. They allow RCE, denial of service and data leaks. [...]
Aamir Lakhani, security researcher at Fortinet, says no sector is off limits these days: It's time for everyone to strengthen the kill chain. [...]
Amazon Web Services (AWS) recently released the Security at the Edge: Core Principles whitepaper. Today’s business leaders know that it’s critical to ensure that both the security of their environments and the security present in traditional cloud networks are extended to workloads at the edge. The whitepaper …
Three security vulnerabilities in Axis video products could open up the door to a bevy of different cyberattacks on businesses. [...]
Apple's personal item-tracker devices can be used to deliver malware, slurp credentials, steal tokens and more thanks to XSS. [...]
A high-severity vulnerability could cause system crashes, knocking out sensors, medical equipment and more. [...]
The issue lies in a parental-control function that's always enabled by default, even if users don't configure for child security. [...]
A driver privilege-escalation bug gives attackers kernel-mode access to millions of PCs used for gaming. [...]
Record-breaking distributed denial of service attack targets Russia’s version of Google - Yandex. [...]
The first half of 2021 saw 1.5 billion attacks on smart devices, with attackers looking to steal data, mine cryptocurrency or build botnets. [...]
The BrakTooth set of security vulnerabilities impacts at least 11 vendors' chipsets. [...]
IoT vulnerabilities turned the remote into a listening device, researchers found, which impacted 18 million Xfinity customers. [...]
A pair of unpatched security vulnerabilities can allow unauthenticated cyberattackers to turn off window, door and motion-sensor monitoring. [...]
The once-dominant handset maker BlackBerry is busy squashing BadAlloc bugs in its QNX real-time operating system used in cars in medical devices. [...]