Tag “Fortinet”

Protecting Data in the Quantum Age

The dynamic realm of cybersecurity continues to pose significant challenges for businesses as they strive to protect against an array of threats. Among the dangers faced are advanced persistent threats, ransomware, and wiper attacks, which serve to highlight the urgent need for robust security measures. However, one of the most…

Read MoreProtecting Data in the Quantum Age

Essential Developments in Cyber Attacks, Vulnerabilities, and Data Breaches

Cybersecurity Weekly Recap: Notable Incidents and Emerging Threats In a concerning development this week, cybersecurity experts have reported a surge in malicious activities targeting organizations across various sectors. One of the most alarming incidents involves a new scam campaign that utilizes physical letters falsely attributed to the notorious BianLian ransomware…

Read MoreEssential Developments in Cyber Attacks, Vulnerabilities, and Data Breaches

Ransomware Groups Exploiting Weaknesses in Perimeter Security Appliances

Manufacturers of perimeter security appliances, which encompass devices like CCTV systems, firewalls, radar technologies, and access control solutions, have increasingly overlooked the need to embed strong security features into their products. This oversight leaves these devices vulnerable, contributing to a surge in ransomware incidents. A recent annual threat report published…

Read MoreRansomware Groups Exploiting Weaknesses in Perimeter Security Appliances

Claroty, Nozomi, and Armis Lead Cyber-Physical Security Rankings

Gartner’s First-Ever Ranking of Cyber-Physical Security Vendors Highlights a Shift in Market Dynamics In a comprehensive new report by Gartner, the cyber-physical security landscape has been significantly illuminated, spotlighting the leading vendors within this niche sector. Not only have traditional players like Microsoft entered the fray, but dedicated operational technology…

Read MoreClaroty, Nozomi, and Armis Lead Cyber-Physical Security Rankings

Breach Update: FBI Issues Warning on Ghost Threats

Cybercrime, Fraud Management & Cybercrime, Incident & Breach Response Also: Lee Enterprises Recovering From Ransomware Attack, Ivanti POC Released Anviksha More (@AnvikshaMore) • February 20, 2025 Image: Shutterstock / ISMG This week, ISMG provides a summary of notable cybersecurity incidents globally, highlighting an FBI warning regarding Ghost ransomware, Google addressing…

Read MoreBreach Update: FBI Issues Warning on Ghost Threats

Five Eyes Issues Guidance for Securing Edge Devices

Network Firewalls, Network Access Control, Security Operations Guidance Aimed at Enhancing Rapid Compromise Detection for Enterprises Akshaya Asokan (asokan_akshaya) • February 5, 2025 Image: Shutterstock In a significant move to bolster cybersecurity, the Five Eyes intelligence coalition has released a set of minimum security requirements aimed at edge device vendors.…

Read MoreFive Eyes Issues Guidance for Securing Edge Devices

Recent Cyber Incidents: Attacks, Vulnerabilities, and Data Breaches

Security Breach Exposes Sensitive Data at UnitedHealth Group and Highlights AI Vulnerabilities In what is now considered the largest medical data breach in U.S. history, UnitedHealth Group disclosed a ransomware attack on its subsidiary, Change Healthcare. The incident, which occurred in February 2024, compromised the personal and health information of…

Read MoreRecent Cyber Incidents: Attacks, Vulnerabilities, and Data Breaches

Addressing Vulnerability Lags Exploited by Salt Typhoon

Critical Infrastructure Security, Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Chinese Hackers Target Unpatched Microsoft, Sophos, Fortinet, and Ivanti Products Mathew J. Schwartz (euroinfosec) • January 24, 2025 Image: Shutterstock In a significant breach, Chinese state-sponsored hackers have been exploiting vulnerabilities in the telecommunications networks of the U.S. and…

Read MoreAddressing Vulnerability Lags Exploited by Salt Typhoon