Since 1996, the Health Insurance Portability and Accountability Act (HIPAA) has been the cornerstone of patient privacy. The act established standards for how healthcare organizations handle and share patient data, creating a framework for ensuring confidentiality. But the healthcare landscape…
Tag: Information Security Buzz
Sneaky 2FA Kit Exposes Vulnerabilities in 2FA Security
Cybersecurity researchers from Sekoia have discovered a new Adversary-in-the-Middle (AiTM) phishing kit named “Sneaky 2FA,” targeting Microsoft 365 accounts. First discovered in December last year, this phishing kit has been active since at least October 2024 and is distributed as…
DORA Comes into Force: Experts Weigh In on Its Impact and Opportunities
Today marks the enforcement of the Digital Operational Resilience Act (DORA), a regulation aimed at strengthening the financial sector’s defenses against cyber threats and operational risks. With its focus on ICT risk management, incident reporting, and operational resilience, DORA sets…
Educate, Prepare, & Mitigate: The Keys to Unlocking Cyber Resilience
In 2024, consumers saw an array of cybersecurity incidents that impacted them directly, and in dramatic ways. From the Change Healthcare attack that impacted healthcare systems and prevented some from getting medication, to the more recent issues involving Ahold Delhaize…
O’Reilly 2025 Tech Trends: AI Skills Surge as Security Takes Center Stage
The 2025 technology landscape reveals a year of seismic shifts driven by surging interest in AI and an intensified focus on cybersecurity governance. Insights from the latest O’Reilly 2025 Technology Trends Report shed light on these pivotal changes shaping the…
DOJ, FBI Dismantle Malware Used by China-Backed Hackers in Global Operation
In an international effort, the US Department of Justice (DOJ) and the Federal Bureau of Investigation (FBI) have successfully eliminated a sophisticated malware threat known as “PlugX” from over 4,200 computers across the United States. The malware, used by bad…
Critical Infrastructure Embraces CISA CyHy Service
Critical infrastructure organization enrollment in CISA’s Cyber Hygiene (CyHy) service surged 201% between 1 August 2022, and 31 August 2024, a new report released by the US cybersecurity agency has revealed. The CISA CyHy service is a suite of free…
UK Government Seeking to ‘Turbocharge’ Growth Through AI
Earlier this week, UK Prime Minister Keir Starmer released a statement and made a subsequent speech unveiling and endorsing his government’s AI Opportunities Action Plan (AOAP). He declared Artificial intelligence (AI) to be “the defining opportunity of our generation” foreshadowing…
RansomHub Affiliates Exploit AI-Generated Python Backdoor in Advanced Cyberattacks
A sophisticated Python-based backdoor, potentially developed using AI, has been identified as a critical tool for RansomHub affiliates to infiltrate and maintain access to compromised networks. The discovery, made by Andrew Nelson, Principal Digital Forensics and Incident Response (DFIR) Consultant…
The Year of Proactive Defense: Staying Ahead of Threat Actors
As January reaches its midpoint, more cybersecurity experts have weighed in on what the year ahead holds for the industry. From the rapid advancement of artificial intelligence to evolving strategies in application security and a renewed focus on education and…
Critical RCE Vulnerability in Aviatrix Controller: Wiz Issues Urgent Patch Advisory
The Wiz Incident Response team is actively addressing multiple security incidents linked to CVE-2024-50603, a critical unauthenticated remote code execution (RCE) vulnerability in Aviatrix Controller. This flaw, rated the maximum CVSS score of 10.0, poses a severe risk of privilege…
AWS S3 Buckets Under Siege: New Ransomware Exploits SSE-C
Research from the Halcyon RISE Team has revealed that a ransomware actor dubbed “Codefinger” has launched a new campaign on Amazon S3 buckets, leveraging WS’s Server-Side Encryption with Customer Provided Keys (SSE-C) to encrypt data and render victims powerless to…
The Looming Crisis: Meta, Misinformation, and Public Trust
Meta’s jaw-dropping announcement that it is ending its third-party fact-checking program is likely to trigger increased activity from fake accounts and troll farms, which specialize in disseminating intentional falsehoods. The social media giant’s decision to end its fact-checking initiatives raises…
US Tightens AI Export Controls to Curb Adversarial Misuse
In a move to cement the US’s position as a global leader in artificial intelligence (AI), the Biden-Harris Administration has unveiled an Interim Final Rule on AI Diffusion. The policy hopes to improve national security and economic strength while ensuring…
HIPAA to Mandate Increased Cybersecurity Measures in Response to Escalating Number of Attacks
The U.S. Department of Health and Human Services (HSS) Office for Civil Rights (OCR) has published a Notice of Proposed Rulemaking (NPRM) proposing substantial cybersecurity requirements for all regulated entities and their business associates to be added to the HIPAA…
The AI Conundrum in Security: Why the Future Belongs to the Bold
When it comes to artificial intelligence, there’s no denying its transformative power. In fields ranging from medicine to logistics, AI has redefined the art of the possible. But in cybersecurity, AI is less a revolution and more an evolution—a tool…
AI in Cybersecurity: Thinking Like Hackers to Build Stronger Defenses
As we hit the two-year anniversary of the release of ChatGPT, we see that businesses across all sectors have started adopting generative AI tools to create content of all kinds. But many are discovering that these tools have capabilities that…
Rethinking Age Verification for Social Media: Privacy-Friendly Solutions for Safeguarding Kids
The digital landscape has become an integral part of our lives, and social media platforms are at its heart. While these platforms offer undeniable benefits in connecting people and fostering communities, they also pose significant risks, especially for children. Exposure…
Three Russian Nationals Indicted for Operating Cryptocurrency Mixers in Money Laundering Scheme
Three Russian nationals have been charged for their involvement in operating cryptocurrency mixing services Blender.io and Sinbad.io, according to an indictment unsealed on January 7 by a federal grand jury in the Northern District of Georgia. The charges stem from…
Medusind Data Breach Exposes Over 360,000 Individuals’ Healthcare Info
Medusind, a healthcare revenue cycle management provider, has disclosed a data breach that compromised the personal and health information of 360,934 people. The breach, which happened over a year ago, affirms the ongoing cybersecurity challenges in the healthcare sector. The…