"Leaky DICOM Medical Standard Exposes Millions of Patient Records"

"Leaky DICOM Medical Standard Exposes Millions of Patient Records"

According to researchers, around 60 million personal and medical records may have been exposed because of the use of a legacy protocol in medical equipment. Aplite researchers analyzed the Digital Imaging and Communications in Medicine (DICOM) protocol, an internationally recognized standard for medical imaging transfers used in most radiology, cardiology imaging, and radiotherapy settings.

Submitted by Gregory Rigby on

"New Spam Exploit Vector Abuses Google Forms' Quizzes"

"New Spam Exploit Vector Abuses Google Forms' Quizzes"

Another method for spammers to infiltrate systems is to abuse the quiz results feature of Google Forms. According to Cisco Talos Intelligence Group researchers, the exploit involves using a series of online forms, starting with the quiz template. The researchers discovered this exploit because of excessive queries of a suspicious domain entry as part of the phishing process. Victims will eventually be directed to an elaborate scam website where the destination cryptocurrency scam will take place, using additional forms, text chats, and other mechanisms.

Submitted by Gregory Rigby on

"McLaren Health Care Says Data Breach Impacted 2.2 Million People"

"McLaren Health Care Says Data Breach Impacted 2.2 Million People"

McLaren Health Care (McLaren) is notifying nearly 2.2 million people of a data breach that occurred between late July and August this year, exposing sensitive personal information.  McLaren is a non-profit healthcare system with an annual revenue of $6.6 billion.  McLaren has an extensive network across Michigan that includes 14 hospitals with a total bed capacity of 2,624 and is supported by a team of 490 physicians.  According to McLaren, it identified a security breach on August 22, 2023.

Submitted by Adam Ekwall on

"France, UK Seek Greater Regulation of Commercial Spyware"

"France, UK Seek Greater Regulation of Commercial Spyware"

France and Britain are calling for greater global regulation of commercial surveillance software due to the recent Pegasus and Predator spyware scandals.  In a joint initiative announced at the Peace Forum in the French capital, Paris and London warned against the unregulated development and use of surveillance technology.  It was noted that while the use of such spyware might be legitimate, it only takes “a few lines of code” to allow it to be used with malicious intent.

Submitted by Adam Ekwall on

"Iran-Linked Imperial Kitten Cyber Group Targeting Middle East's Tech Sectors"

"Iran-Linked Imperial Kitten Cyber Group Targeting Middle East's Tech Sectors"

In October 2023, an Iran-linked group targeted transportation, logistics, and technology sectors in the Middle East, including Israel, as part of an increase in Iranian cyber activity since the start of the Israel-Hamas war. CrowdStrike has attributed the attacks to a threat actor called Imperial Kitten, also known as Crimson Sandstorm, TA456, Tortoiseshell, and Yellow Liderc.

Submitted by Gregory Rigby on

"Google Ads Push Malicious CPU-Z App From Fake Windows News Site"

"Google Ads Push Malicious CPU-Z App From Fake Windows News Site"

A threat actor has been using Google Ads to distribute a trojanized version of the CPU-Z tool in order to deliver the Redline information-stealing malware. Malwarebytes analysts discovered the new campaign and believe it is part of the same operation that used Notepad++ malvertising to deliver malicious payloads. According to researchers, the malicious Google advertisement for the trojanized CPU-Z is hosted on a cloned copy of the legitimate Windows news site WindowsReport.

Submitted by Gregory Rigby on

"Security in the Impending Age of Quantum Computers"

"Security in the Impending Age of Quantum Computers"

Quantum computing is important to the cybersecurity community because a future quantum computer of adequate size and efficiency could crack today's encryption schemes, putting currently protected information and communications at risk. Public-key encryption enables over 4.5 billion Internet users to access 200 million websites and engage in retail e-commerce securely. On the other hand, certain quantum technologies have the potential to improve existing encryption. Therefore, quantum technologies serve as both a sword and a shield in cybersecurity.

Submitted by Gregory Rigby on

"1.3 Million Maine Residents Impacted by MOVEit Hack"

"1.3 Million Maine Residents Impacted by MOVEit Hack"

The State of Maine is the latest entity to disclose a significant impact from the cyberattack targeting a zero-day in Progress Software’s MOVEit file transfer tool earlier this year.  According to security researchers at Emsisoft, more than 2,500 organizations and over 69 million individuals have been affected by the MOVEit hack.  The state of Main has found that the breach affected 1.3 million Main residents.

Submitted by Adam Ekwall on

"ICBC and Allen & Overy Hit By Ransomware"

"ICBC and Allen & Overy Hit By Ransomware"

Two giants of the banking and legal sectors have recently been breached by suspected ransomware actors.  Allen & Overy is one of the UK's "Magic Circle" law firms.  It is believed that LockBit was behind the ransomware attack on Allen & Overy since they are listed on the gang's leak site.  The company stated that investigations to date have confirmed that data in its core systems, including its email and document management system, has not been affected.

Submitted by Adam Ekwall on

"Audio Deepfake Detective Developing New Sleuthing Techniques"

"Audio Deepfake Detective Developing New Sleuthing Techniques"

Audio deepfakes have raised concerns among cybersecurity experts as scammers increasingly use voice-related Artificial Intelligence (AI) schemes for various malicious activities. With AI-driven audio generation making it challenging to distinguish between real and fake audio, You "Neil" Zhang of the University of Rochester's Audio Information Research (AIR) Lab is developing new audio deepfake detection systems. Zhang is also working on watermarking techniques for the audio generation process that will help identify the source of deepfakes.

Submitted by Gregory Rigby on
Subscribe to