Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

OS hardening 20 Best Practices

Operating system (OS) hardening, a facet of system hardening, involves the implementation of security measures of operating systems like Windows, Linux, or macOS (aka OS X) to bolster their defenses against cyberattacks. The primary aim is to fortify sensitive computing systems, thereby reducing their vulnerability to various security threats, including data breaches, unauthorized access, system intrusions, and malware in accordance with best security practices.

New Claims of Attacks Against Israeli SCADA Systems

Since Hamas’s attack on Israel last month, SecurityScorecard’s SecurityScorecard Threat Research, Intelligence, Knowledge, and Engagement (STRIKE) Team has paid close attention to hacktivist activity provoked by the conflict, with particular focus on the international scope.

Dark Pink APT Attacks

A recent wave of advanced persistent threat (APT) attacks is spreading throughout the Asia-Pacific (APAC) region, and these have been attributed to a newly identified group known as Dark Pink (also referred to as the Saaiwc Group). While evidence suggests that Dark Pink commenced its operations as early as mid-2021, the group’s activities escalated notably in the latter part of 2022.

Mega-Luxury Casino Owned by Las Vegas Sands Suffers Data Breach

In Singapore, there is a massive luxury resort named the Marina Bay Sands (MBS); its owner is state-side, known as the Las Vegas Sands (LVS). LVS hosts 11 properties in Asia and the US—MBS hosts more than 2,500 rooms. MBS is a vast resort with more than a million feet of entertainment options and 50+ on-campus restaurants. Sand’s knows a lot about their clients, and following a recent data breach, so do hackers.

BrickLink, LEGO Fanatic Building Site, Allegedly Targeted by Ransomware

The ever-changing universe of LEGO dominates the toy industry; LEGO is one of the most recognizable toy brands in the world, a perk of which is die-hard fans. LEGO fanatics flock to BrickLink, a privately owned website where individuals can design, sell, and buy block sets. LEGO also features some designs following community voting. An estimated 1.4 million people have registered accounts with the platform, including sellers and consumers.

A Guide to GDPR Article 30: RoPA (Records of Processing Activities)

Data privacy has never been more critical for business success as it is today, and organizations worldwide are grappling with the stringent requirements of the General Data Protection Regulation (GDPR). One crucial aspect of GDPR compliance is maintaining a Record of Processing Activities (RoPA), which serves as a testament to an organization’s commitment to data protection. But what exactly is a RoPA, and how can organizations create and manage one effectively?

Healthcare Trends that Impact Physical and Digital Security

It is of critical importance for healthcare institutions to ensure the safety of medical personnel, patients, records, equipment, and facilities. This must be done with minimal disruption to the doctors and nurses who are administering care. As healthcare facilities review and upgrade their physical and digital security systems, here are key trends impacting future healthcare.

Threat Assessment: Connected Medical Devices

The terminology that describes medical devices and connected medical devices can be confusing. Let’s start by looking at how these devices are defined. Medical Device: a contrivance designed and manufactured for use in healthcare, and not solely medicinal or nutritional. Internet of Medical Things (IoMT): devices linked to cloud platforms that store and analyze data.

Importance of Encryption in Messaging Apps

It's almost impossible to imagine modern life without using messengers and other text apps. We have all become more or less dependent on convenient online communication. After all, it is also lightning-fast. We use messaging apps for work, and to communicate with friends and family. And also to share personal information. Yet, are we sure that our content actually remains private? What is clear is that as the volume of digital communication increases, so does the importance of ensuring the privacy and security of our content.