Tag cybersecurity

Groups Oppose HHS’s Proposed Rollbacks on Health IT

Healthcare, Industry Specific, Standards, Regulations & Compliance Healthcare Groups Warn of Risks from HHS’ Proposed IT Certification Changes Marianne Kolbasuk McGee ( HealthInfoSec) • March 3, 2026 Proposed reductions in health IT certification requirements by HHS are facing resistance from industry groups concerned about privacy and security implications. (Image: Getty…

Read MoreGroups Oppose HHS’s Proposed Rollbacks on Health IT

🔍 Weekly Overview: Fortinet Vulnerability, Chrome Zero-Day, BadIIS Malware, Record DDoS Attack, SaaS Security Incident & More

Cybersecurity Weekly Update: New Vulnerabilities and Persistent Threats This week, the cybersecurity landscape revealed alarming developments as multiple organizations fell victim to sophisticated attacks, highlighting the evolving tactics employed by cybercriminals. Notably, Fortinet disclosed a serious vulnerability affecting its FortiWeb application firewall, categorized as CVE-2025-58034. This flaw, assigned a medium…

Read More🔍 Weekly Overview: Fortinet Vulnerability, Chrome Zero-Day, BadIIS Malware, Record DDoS Attack, SaaS Security Incident & More

Proposed Legislation Would Permit Cyber Crime Victims to Engage in Hacking Back

The debate surrounding the legality and morality of counter-hacking actions, known colloquially as “hacking back,” has resurfaced as a significant concern among cybersecurity professionals and lawmakers. As cybersecurity incidents continue to escalate, victims are often left questioning whether they can retaliate against their attackers. While hacking back is considered illegal…

Read MoreProposed Legislation Would Permit Cyber Crime Victims to Engage in Hacking Back

Cybersecurity Leadership: Navigating Identity, Access, and Complexity

Insights from CEOs and CISOs on Navigating the ‘Work From Anywhere’ Challenge Tom Field (SecurityEditor) • March 3, 2021 In the current landscape where remote work is becoming the norm, identity and access management solutions face unprecedented challenges. Leading CEOs and Chief Information Security Officers (CISOs) have shared crucial strategies…

Read MoreCybersecurity Leadership: Navigating Identity, Access, and Complexity

Fortinet Alerts Users to New Authentication Bypass Vulnerability in FortiGate and FortiProxy

Security Alert: Critical Vulnerability Discovered in Fortinet Products Fortinet has issued a private alert regarding a serious security vulnerability affecting its FortiGate firewalls and FortiProxy web proxies. This issue has the potential to enable unauthorized actions on vulnerable devices, raising significant concerns for businesses relying on these solutions. The vulnerability,…

Read MoreFortinet Alerts Users to New Authentication Bypass Vulnerability in FortiGate and FortiProxy

Fortinet Alerts on Ongoing Exploitation of Critical Authentication Bypass Vulnerability

Fortinet Confirms Active Exploitation of Critical Vulnerability in Firewall and Proxy Products On Monday, Fortinet disclosed a critical security vulnerability affecting its firewall and proxy offerings, warning that the flaw is currently being exploited in the wild. This vulnerability, tracked as CVE-2022-40684 and rated with a CVSS score of 9.6,…

Read MoreFortinet Alerts on Ongoing Exploitation of Critical Authentication Bypass Vulnerability

Zurich to Purchase Beazley in $11 Billion European Insurance Agreement

Cyber Insurance, Governance & Risk Management Cyber Insurance Expansion Triggers Consolidation in the Insurance Sector Michael Novinson (MichaelNovinson) • March 2, 2026 Zurich Insurance Group has announced its intention to acquire U.K.-based insurer Beazley for a substantial $11 billion, creating a formidable entity with a significant presence in the cyber…

Read MoreZurich to Purchase Beazley in $11 Billion European Insurance Agreement

Active Exploitation of React2Shell Vulnerability for Linux Backdoor Deployment

A significant security vulnerability known as React2Shell is currently being exploited by cybercriminals to deploy various malware strains, including KSwapDoor and ZnDoor, as reported by Palo Alto Networks’ Unit 42 and NTT Security. The exploitation of this vulnerability poses urgent risks to organizations, particularly those leveraging React and Next.js frameworks.…

Read MoreActive Exploitation of React2Shell Vulnerability for Linux Backdoor Deployment

The Risks of Cyber Conflicts Between IT, OT, and Medical Devices

Healthcare organizations face significant challenges in device security, often exacerbated by what can be characterized as turf wars between various teams, including healthcare technology management, operational technology staff, IT departments, and security units. This fragmentation stems from unclear ownership and accountability mechanisms around device security, posing a potential risk to…

Read MoreThe Risks of Cyber Conflicts Between IT, OT, and Medical Devices