Tag “Fortinet”

Ransomware Groups Exploiting Weaknesses in Perimeter Security Appliances

Manufacturers of perimeter security appliances, which encompass devices like CCTV systems, firewalls, radar technologies, and access control solutions, have increasingly overlooked the need to embed strong security features into their products. This oversight leaves these devices vulnerable, contributing to a surge in ransomware incidents. A recent annual threat report published…

Read MoreRansomware Groups Exploiting Weaknesses in Perimeter Security Appliances

Claroty, Nozomi, and Armis Lead Cyber-Physical Security Rankings

Gartner’s First-Ever Ranking of Cyber-Physical Security Vendors Highlights a Shift in Market Dynamics In a comprehensive new report by Gartner, the cyber-physical security landscape has been significantly illuminated, spotlighting the leading vendors within this niche sector. Not only have traditional players like Microsoft entered the fray, but dedicated operational technology…

Read MoreClaroty, Nozomi, and Armis Lead Cyber-Physical Security Rankings

Breach Update: FBI Issues Warning on Ghost Threats

Cybercrime, Fraud Management & Cybercrime, Incident & Breach Response Also: Lee Enterprises Recovering From Ransomware Attack, Ivanti POC Released Anviksha More (@AnvikshaMore) • February 20, 2025 Image: Shutterstock / ISMG This week, ISMG provides a summary of notable cybersecurity incidents globally, highlighting an FBI warning regarding Ghost ransomware, Google addressing…

Read MoreBreach Update: FBI Issues Warning on Ghost Threats

Five Eyes Issues Guidance for Securing Edge Devices

Network Firewalls, Network Access Control, Security Operations Guidance Aimed at Enhancing Rapid Compromise Detection for Enterprises Akshaya Asokan (asokan_akshaya) • February 5, 2025 Image: Shutterstock In a significant move to bolster cybersecurity, the Five Eyes intelligence coalition has released a set of minimum security requirements aimed at edge device vendors.…

Read MoreFive Eyes Issues Guidance for Securing Edge Devices

Recent Cyber Incidents: Attacks, Vulnerabilities, and Data Breaches

Security Breach Exposes Sensitive Data at UnitedHealth Group and Highlights AI Vulnerabilities In what is now considered the largest medical data breach in U.S. history, UnitedHealth Group disclosed a ransomware attack on its subsidiary, Change Healthcare. The incident, which occurred in February 2024, compromised the personal and health information of…

Read MoreRecent Cyber Incidents: Attacks, Vulnerabilities, and Data Breaches

Addressing Vulnerability Lags Exploited by Salt Typhoon

Critical Infrastructure Security, Cyberwarfare / Nation-State Attacks, Fraud Management & Cybercrime Chinese Hackers Target Unpatched Microsoft, Sophos, Fortinet, and Ivanti Products Mathew J. Schwartz (euroinfosec) • January 24, 2025 Image: Shutterstock In a significant breach, Chinese state-sponsored hackers have been exploiting vulnerabilities in the telecommunications networks of the U.S. and…

Read MoreAddressing Vulnerability Lags Exploited by Salt Typhoon

In Response to Data Breaches, Legislative Task Force Focuses on School Cybersecurity

Granite School District Data Breach Sparks Legislative Focus on Cybersecurity In December 2023, Granite School District in Salt Lake City became the latest victim of a significant data breach, affecting approximately 450,000 current and former students. The incident has garnered the attention of the Utah Legislature, particularly the state’s School…

Read MoreIn Response to Data Breaches, Legislative Task Force Focuses on School Cybersecurity

Fortinet Users Experience Ongoing Active Zero-Day Alerts: Past and Present

Governance & Risk Management, Network Firewalls, Network Access Control, Patch Management Warning Issued for Active Zero-Day Vulnerability as Device Configurations Are Exposed Mathew J. Schwartz (euroinfosec) • January 17, 2025 Image: Shutterstock Fortinet has issued an urgent alert to users of its firewall products, advising them to apply patches for…

Read MoreFortinet Users Experience Ongoing Active Zero-Day Alerts: Past and Present