Category: Cybersecurity Insiders

Five Steps to Overcoming Cyber Complacency

[By Mike Toole, Head of IT and Security at Blumira] It’s no secret that news about breaches and cyberattacks emerge daily. As a result of this constant exposure, even the most dedicated professionals understandably experience “data breach fatigue” and become…

Kate Middleton Medical Record Data was hacked

The Princess of London, Kate Middleton, has been undergoing treatment for undisclosed health issues at ‘The London Clinic’ in recent weeks. However, reports from the Daily Mail suggest that hackers or a hacking group attempted to breach the medical data…

United Health spends $2 billion in ransomware recovery

UnitedHealth recently disclosed that it has disbursed approximately $2 billion to its healthcare subsidiaries affected by a ransomware attack detected last month. The company also announced plans to roll out medical claims preparation software to assist customers in managing payments…

CISA Hacked and over 70m files leaked online from AT&T database

In February of this year, the Cybersecurity and Infrastructure Security Agency (CISA) revealed that its systems had been compromised by hackers, exploiting vulnerabilities within Ivanti products utilized by the federal agency. According to a CISA spokesperson, flaws within Ivanti Connect…

Ransomware attack on Fujitsu Servers

Reports have surfaced indicating that a hacking group specializing in ransomware has breached Fujitsu Servers’ computer network, purportedly stealing sensitive data. Details remain sparse, pending the conclusion of a thorough investigation by the IT company. While Fujitsu has yet to…

Demystifying Serverless Security: Safeguarding the Future of Cloud Computing

Serverless computing has revolutionized the landscape of cloud computing, offering unparalleled scalability, flexibility, and cost-effectiveness. However, as organizations increasingly adopt server-less architectures for their applications, concerns about security have risen to the forefront. Understanding and effectively addressing these security challenges…