"Hack of PJ&A Tops 2023 US Healthcare Data Breaches as Tally Jumps by 4M"

"Hack of PJ&A Tops 2023 US Healthcare Data Breaches as Tally Jumps by 4M"

An attack on the medical transcription company Perry Johnson & Associates (PJ&A) is now considered the largest US health sector data breach that occurred in 2023. PJ&A provides transcription services to medical facilities in the US, so it holds sensitive information about millions of Americans. Last year, hackers breached the company between March 27 and May 2, later stealing personal data from its systems in April. PJ&A disclosed that the breach affected more than 8.95 million people.

Submitted by grigby1 CPVI on

Baltimore Cybersecurity Conference

"FutureCon Events brings high-level Cyber Security Training discovering cutting-edge security approaches, managing risk in the ever-changing threat of the cybersecurity workforce. Join us as we talk with a panel of C-level executives who have effectively mitigated the risk of Cyber Attacks. Educating C-suite executives and CISOs (chief information security officers) on the global cybercrime epidemic, and how to build Cyber Resilient organizations."

Ohio Information Security Conference

"Forge Connections: Network with industry peers, leading security professionals, and solution vendors to establish meaningful connections that drive collaborations and partnerships. Strategize Effectively: Discover innovative strategies and best practices to design robust cybersecurity frameworks tailored to your business needs, ensuring compliance and risk mitigation. Explore Cutting-edge Solutions: Engage with top cybersecurity experts showcasing state-of-the-art technologies, tools, and services that can fortify your organization's defenses."

Phoenix Technology Summit 2024

"ElevateIT: Phoenix Technology Summit is a premier conference for technology leaders, professionals, and enthusiasts in the Phoenix area. The conference brings together industry experts and thought leaders to discuss emerging trends, best practices, and innovative solutions in the field of technology. At the ElevateIT: Phoenix Technology Summit, attendees will have the opportunity to participate in engaging keynotes, panel discussions, and interactive sessions.

Cyber Intelligence Europe

"We are pleased to bring our 10th Cyber Intelligence Europe conference and exhibition to Dublin, Ireland. Our international event brings together leading cyber security officials from across Europe and North America to discuss the latest national cyber security strategies and policies. Cyber Intelligence Europe will also discuss recent cybercrime trends and threats. With the event returning the European Union participants will be able to hear how EU nations share information and cooperate in combating cybercrimes."

New York Cybersecurity Summit

"The 13th Edition of the New York Cybersecurity Summit connects C-Suite & Senior Executives responsible for protecting their companies’ critical infrastructures with innovative solution providers and renowned information security experts. Admission gives you access to all Interactive Panels, Discussions, Catered Breakfast, Lunch & Cocktail Reception."

"New Linux glibc Flaw Lets Attackers Get Root on Major Distros"

"New Linux glibc Flaw Lets Attackers Get Root on Major Distros"

Attackers can gain root access on multiple major Linux distributions in their default configurations by exploiting a Local Privilege Escalation (LPE) vulnerability in the GNU C Library (glibc). This security flaw, tracked as CVE-2023-6246, was discovered in a glibc function called by the syslog and vsyslog functions to write messages to the system message logger. The flaw stems from a heap-based buffer overflow vulnerability that was accidentally introduced in glibc 2.37 and later backported to glibc 2.36.

Submitted by grigby1 CPVI on

"CyberArk Releases Online Ransomware Decryptor"

"CyberArk Releases Online Ransomware Decryptor"

CyberArk has released an online version of its open-source White Phoenix ransomware decryptor to help ransomware victims recover their files. Users can upload encrypted files using this new online version and then the tool ensures that as many files as possible are recoverable. The effectiveness of CyberArk's White Phoenix ransomware decryptor is heavily dependent on the encryption type and ransomware variant used. PDF, Word, Excel, ZIP, and PowerPoint files are all supported. This article continues to discuss CyberArk's White Phoenix ransomware decryptor.

Submitted by grigby1 CPVI on

"Ivanti Zero-Day Patches Delayed as 'KrustyLoader' Attacks Mount"

"Ivanti Zero-Day Patches Delayed as 'KrustyLoader' Attacks Mount"

Attackers exploited a pair of now-patched critical zero-day vulnerabilities in Ivanti VPNs. They have used the flaws to launch a Rust-based set of backdoors, which then download a backdoor malware called "KrustyLoader." The two flaws enable unauthenticated Remote Code Execution (RCE) and authentication bypass, impacting Ivanti's Connect Secure VPN gear. This article continues to discuss the Ivanti vulnerabilities and their exploitation by attackers.

Submitted by grigby1 CPVI on
Subscribe to