Remove vulnerabilities-threats dealing-with-insider-threats-in-the-age-of-covid
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And what parallels might infosec learn from COVID-19? Mike notes how some basic rules of physical hygiene that can slow the spread of COVID-19 can also map into the digital world. Ahmadi: Billy provided me the images from various pieces of medical device software and in them we found literally over 1000 known vulnerabilities.

IT 52
article thumbnail

The Hacker Mind Podcast: Hacking Healthcare

ForAllSecure

And what parallels might infosec learn from COVID-19? Mike notes how some basic rules of physical hygiene that can slow the spread of COVID-19 can also map into the digital world. Ahmadi: Billy provided me the images from various pieces of medical device software and in them we found literally over 1000 known vulnerabilities.

IT 52
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Leaked Chats Show LAPSUS$ Stole T-Mobile Source Code

Krebs on Security

KrebsOnSecurity recently reviewed a copy of the private chat messages between members of the LAPSUS$ cybercrime group in the week leading up to the arrest of its most active members last month. The logs show LAPSUS$ breached T-Mobile multiple times in March, stealing source code for a range of company projects.

MDM 349
article thumbnail

List of data breaches and cyber attacks in September 2021 – 91 million records breached

IT Governance

Hackers steal Covid test data of 1.4 Vermont radio stations dealing with fallout from cyberattack (wcax.com) (1). Vermont radio stations dealing with fallout from cyberattack (wcax.com) (1). Vermont radio stations dealing with fallout from cyberattack (wcax.com) (1). Cyber attacks. Cyber attacks.