Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Mental Health Center Targeted by Disruptions, Quarter of a Million Exposures

The Harris Center for Mental Health and Intellectual and Developmental Disabilities (IDD) has six regional locations and assists those with behavioral health and developmental needs. Every year, they serve thousands within Harris County and deliver over a million services nationwide. In November, Harris experienced a network disruption; an unauthorized actor accessed and compromised the data of 238,463 individuals within Harris’ network.

Singing River Health Strangled by Network Ransomware Encryptions

Singing River Health System (SRHS) is a healthcare network located in the tail of Mississippi (and northern Alabama). They provide a comprehensive network of medical services for residents, including cancer, emergency, hospice, pediatrics, and urgent care. SRHS’ emergency departments at Gulfport Hospital, Ocean Springs Hospital, and Pascagoula Hospital serve over 100,000 patients yearly.

2024 IT Predictions: What to Make of AI, Cloud, and Cyber Resiliency

The future is notoriously hard to see coming. In the 1997 sci-fi classic Men in Black — bet you didn’t see that reference coming — a movie about extraterrestrials living amongst us and the secret organization that monitors them, the character Kay, played by the great Tommy Lee Jones, sums up this reality perfectly: While vistors from distant galaxies have yet to make first contact — or have they? — his point stands.

What Happens if You Answer a Spam Call?

If you accidentally answer a spam call, scammers know your number is connected to a real person and can target you with more spam calls. These targeted spam calls will try to trick you into giving up your personal information which allows cybercriminals to steal your money, your identity and even your voice. You should avoid answering spam calls to help prevent cybercriminals from trying to steal your personal information.

Blink-and-Update: All About Rhadamanthys Stealer

Rhadamanthys, an info stealer, written in C++, was first seen on August 22, 2022. This stealer, still gets updates and patched regularly. Version 0.5.0 shifted towards a more customizable framework allowing threat actors to counter security measures and exploit vulnerabilities by deploying targeted plugins, such as ‘Data Spy,’ which monitors RDP logins.

NIS2: Who is affected?

This is a question we get a lot from our customers. The NIS2 Directive’s wording is not always very explicit. NIS2 is a framework that countries need to implement. Because it’s a Directive and not a Regulation, each EU country has the autonomy to roll it out under their own interpretation. NIS2’s language is broad, making it challenging to get your head around, especially until countries publish their specifics.

Navigating the Cloud Misconfiguration Maze: A Cybersecurity Odyssey

Imagine a world where digital fortresses are impervious to cyber threats – a utopia for any cybersecurity professional. Yet, we live in a realm where one misstep in cloud configurations opens the gates to potential havoc. As someone who has journeyed through the labyrinth of cybersecurity for over two decades, I've witnessed firsthand how a simple misconfiguration can escalate from a minor hiccup to a full-blown security nightmare.

Top VR Games Of 2023

VR games have been steadily gaining popularity for several years now, and this immersive form of gaming could potentially revolutionize the industry. Is there a new VR game coming in 2024? Definitely, 2024 is a year of big discoveries and good projects in VR. Having said that, the future of VR gaming is still uncertain, so we will focus on what is already known. We have thoroughly researched the top VR games of 2023 and compiled our findings below. After reading, you'll likely be eager to grab a headset and dive into the action!

Cyber Exposure Management Meets the New SEC Reporting Requirements

The recent SEC breach disclosure rules place enormous pressure on CISOs. The new SEC disclosure requirements for public companies require companies to report annually on their cybersecurity risk management and governance efforts and publicly announce cybersecurity incidents that prove "material." Determining materiality may be one of organizations' most prominent challenges with the new rules. What exactly is a material cybersecurity incident?

Three-Quarters of Organizations Have Experienced Phishing Attack in the Last 12 Months

Regardless of whether your environment remains on-premise, resides in the cloud, or is a hybrid configuration, new data makes it clear that your biggest risk is phishing attacks. According to Netwrix’s 2023 Hybrid Security Trends Report, released late last month, 73% of organizations have some form of hybrid environment, with slightly less than half of all workloads (44%) residing in the cloud.