Carbon Black won't be getting a new residence anytime soon after indications of interest in the organization fell short of Broadcom's expectations. The semiconductor giant had been looking to fetch $1 billion for the security firm - including debt - but offers at that dollar figure remained elusive.
A glitch in Wyze home security cameras permitted thousands of users to catch glimpses inside strangers' homes as its cloud system came back online after an hourslong outage. Around 13,000 Wyze users received thumbnails from cameras that were not their own, and around 1,504 users tapped on them.
Unlike identity theft, first-party fraud is harder to spot when a consumer opens an account. To guard against this growing blind spot, banks need to invest in transaction-monitoring tools and take a more holistic approach to fraud, said Ian Mitchell, co-founder of Mission Omega.
The FDA's multifaceted approach to strengthening medical device security centers on several key areas, including enhanced regulatory oversight, industry collaboration and a recent organizational change that raises the profile of the agency's device work, said the FDA's Dr. Suzanne Schwartz.
Sophos announced Thursday that its CEO for the past 12 years, Kris Hagerman, has stepped down. Long-time Sophos executive Joe Levy, who has nearly three decades of experience in cybersecurity products and services, is the new president and acting CEO, "effective immediately."
Protecting our identities is extremely important. An identity fabric is a robust identity control framework, but before you can roll one out, you need to understand all aspects of the IAM life cycle, assess all the areas of risk and make sure that remediation controls are in place.
The U.S. federal government says it disrupted a criminal botnet that Russian military intelligence had converted into a platform for global cyberespionage. The malware targets Linux-based IoT devices - in this case, routers made by New York manufacturer Ubiquiti.
A Canadian effort fueled by a surge of car thefts to ban pen-testing devices such as the Flipper Zero that grab wireless signals has provoked a backlash among security researchers and advocates, who accused Ottawa of seeking a scapegoat for bad auto industry security practices.
Venture capital investor Pramod Gosavi discussed the drawbacks of relying on network-centric cybersecurity solutions that are driving up costs. He recommended proactive strategies, such as zero trust, that emphasize minimal access and continuous verification and investments in AI-based technologies.
Breathless reports claim 3 million IoT toothbrushes have been remotely compromised and used to target unsuspecting businesses via distributed denial-of-service attacks. Just one problem: This story has more holes in it than the teeth of kid with a 10-pack-a-day Gummy Bear habit.
The United States ramped up pressure on the commercial surveillance industry shortly before the United Kingdom and France convened a two-day meeting dubbed the Pall Mall Process intended to culminate in an international agreement limiting the proliferation of advanced spyware.
The number of victims who opt to pay a ransom appears to have declined to a record low. During the last three months of 2023, an average of 29% of organizations hit by ransomware paid a ransom - a notable shift from what ransomware watchers saw in recent years.
The FBI announcing that it has forcibly removed "KV Botnet" Chinese nation-state malware from "hundreds" of poorly secured SOHO routers across America highlights the risk posed by the growing volume of outdated IoT devices. The FBI's fix is temporary, and we need a more permanent solution.
Multiple vulnerabilities in a widely used open-source implementation of the UEFI specification allow attackers to introduce malware operating at the firmware level. The vulnerabilities mainly affect server machines in which a boot server delivers the operating system over the local network.
In the latest weekly update, Troy Leach, CSO at Cloud Security Alliance, joins three editors at ISMG to discuss important cybersecurity issues, including how generative AI is enhancing multi-cloud security, AI's influence on authentication processes, and the state of zero trust and IoT security.
Our website uses cookies. Cookies enable us to provide the best experience possible and help us understand how visitors use our website. By browsing healthcareinfosecurity.com, you agree to our use of cookies.