article thumbnail

CISA: Vulnerabilities Discovered in Illumina DNA Sequencing Devices

SecureWorld News

Healthcare providers and laboratory personnel have been put on alert after two separate cybersecurity vulnerabilities were discovered in medical devices commonly used in clinical diagnostics and research. On April 27, 2023, the U.S. This vulnerability affects instruments with UCS v2.x x and has a CVSS v3 base score of 10.0,

article thumbnail

Malvertising Is a Cybercrime Heavyweight, Not an Underdog

SecureWorld News

Just to illustrate the scope of the issue, the Malwarebytes Threat Intelligence team spotted more than 800 malvertising campaigns in only the first six months of 2023, noting that the number of attacks that flew under researchers' radar was likely much higher. Of course, good old vigilance won't go amiss.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

Trending Sources

article thumbnail

How to Choose the Best Vulnerability Scanning Tool for Your Business

Galido

As the name clearly suggests, a vulnerability scanner scans systems and networks to identify and report back on open ports, active IP addresses and log-ons, software, OSs (Operating Systems) etc. Researching vulnerability scanners. Thus, researching and zeroing in on a good vulnerability scanning tool is an arduous task.

Tools 84
article thumbnail

IoT Adoption in Healthcare Brings Security Opportunities

CIO Business Intelligence

For example, according to research from Unit 42, 75% of infusion pumps have unpatched vulnerabilities. 3 Unit 42 research also found that 83% of ultrasound, MRI, and CT scanners run on an end-of-life operating system. 4 Those operating systems have known vulnerabilities that can potentially be exploited.

article thumbnail

Browser Isolation: The Missing Piece in Your Security Puzzle

SecureWorld News

However, conventional solutions such as antivirus, firewalls, and other detection and blocking tools can only offer a limited level of security. Companies can use isolated view on any operating system and any device through a commonly used web browser that supports HTML5 to eliminate the risk of interacting with fraudulent links and files.

article thumbnail

North Korean Threat Actors Targeting Healthcare Sector with Maui Ransomware

SecureWorld News

The Stairwell research team says that Maui "stood out" because it lacked some basic components commonly seen in other ransomware strains. It is because of this that researchers think Maui is manually operated, meaning the threat actor(s) is specifically choosing what files to encrypt and then exfiltrating the results.

article thumbnail

Why endpoint security will be a renewed priority for businesses of all sizes in 2023

CIO Business Intelligence

While firewalls and other “perimeter” security defences remain critical for protecting and organisation and its assets, there has been a renewed focus placed on the importance of endpoint defences, because it is that individual’s vulnerability that is too often the easiest thing to exploit. Ongoing training of employees.