Information

Huntington Hospital Issues Notice of Unauthorized Access to Personal Information of 13,000 Patients

The hospital learned that a night shift employee improperly accessed electronic medical patient records in violation of its policies, leading… Read More

2 years ago

Top 10 types of information security threats for IT teams

Top 10 types of information security threats for IT teams click here to read full Article Read More on latest… Read More

2 years ago

Certified Information Systems Auditor (CISA)

Certified Information Systems Auditor (CISA) click here to read full Article Read More on latest Security Updates Read More

2 years ago

New Android Spyware Campaign Targets South Korean Users to Steal Sensitive Information

Researchers at Zimperium who discovered the campaign reported their findings to the US and South Korean authorities, but the host… Read More

3 years ago

Robinhood Data Breach leaks information of 7 M people

Robinhood disclosed that its popular app had suffered a breach, affecting around 7 million customers which resulted in unauthorized access… Read More

3 years ago

U.S. Offers $10 Million reward for information on DarkSide cybercrime group

The U.S. government announced a reward of $10 million for information that may lead to the identification or arrest of… Read More

3 years ago

U.S. Offers $10 Million Reward for Information on DarkSide Ransomware Group

The U.S. government on Thursday announced a $10 million reward for information that may lead to the identification or location… Read More

3 years ago

US State Department Offers $10 Million Reward for Information on DarkSide Leaders, $5 Million for Affiliates

The US State Department announced a $10 million reward for any information leading to the identification or location of any… Read More

3 years ago

China Issues Draft Measures on Security Assessment of Cross-border Data Transfer – Privacy & Information Security Law Blog

If made final, the Draft Measures would apply to cross-border transfers of personal information and “important data” collected and generated… Read More

3 years ago

Protecting your device information with Private Set Membership

Private Set Membership considers the scenario in which Google holds a database of items, and user devices need to contact… Read More

3 years ago

Extracting type information from Go binaries

During the 2021 edition of the SAS conference, I had the pleasure of delivering a workshop focused on reverse-engineering Go… Read More

3 years ago

Why It’s Important To Protect Your Personal Information

The world we are evolving into today is based on advanced digital technology, having as… Why It’s Important To Protect… Read More

3 years ago

Experts Warn of Unprotected Prometheus Endpoints Exposing Sensitive Information

A large-scale unauthenticated scraping of publicly available and non-secured endpoints from older versions of Prometheus event monitoring and alerting solution… Read More

3 years ago

Information & attention – a balancing act for improved situational intelligence

Teams in Security Operations Centers (SOC) increasingly need to balance their attention across vast amounts of information from multiple sources.… Read More

3 years ago

Navistar confirms data breach involved employee healthcare information

The potentially compromised data included the full names, addresses, dates of birth, and SSNs of an unspecified number of employees,… Read More

3 years ago

German Federal Office for Information Security (BSI) investigates Chinese mobile phones

The decision of the BSI comes after the Lithuanian cyber defense published a report claiming that some mobile phones by… Read More

3 years ago