article thumbnail

Introducing secure print controls for pharmaceutical manufacturers

OpenText Information Management

Government agencies around the world, including the US Food and Drug Administration (FDA), use current Good Manufacturing Practices (cGMP) as the primary way to ensure pharmaceutical quality.

article thumbnail

Pharmaceutical companies exploited by phishing scam targeting job seekers

IT Governance

Earlier this month, two major pharmaceutical giants issued warnings about phishing emails targeting job hunters. The post Pharmaceutical companies exploited by phishing scam targeting job seekers appeared first on IT Governance Blog.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What’s new in OpenText Life Sciences Smart View 20.4

OpenText Information Management

With the shift to remote work environments, Life Sciences organizations need a way to provide their workers with secure and compliant access to highly regulated content that is stored on-premises. appeared first on OpenText Blogs. appeared first on OpenText Blogs.

article thumbnail

Ask Fitis, the Bear: Real Crooks Sign Their Malware

Krebs on Security

Megatraffer explained that malware purveyors need a certificate because many antivirus products will be far more interested in unsigned software, and because signed files downloaded from the Internet don’t tend to get blocked by security features built into modern web browsers. “Why do I need a certificate? account on Carder[.]su

article thumbnail

What does the future hold for the Life Sciences supply chain?

OpenText Information Management

Recent legislation efforts in the US like “Protecting Our Pharmaceutical Supply Chain from China Act of 2020” and “Securing America’s Medicine Cabinet Act of 2020” are once again raising a longstanding struggle in the Life Sciences industry: the trend towards localization.

article thumbnail

New RA Group ransomware gang is the latest group using leaked Babuk source code

Security Affairs

Compromised organizations operate in different business verticals, including manufacturing, wealth management, insurance providers, and pharmaceuticals. The researchers noticed that the path contains the same mutex name as the Babuk ransomware, a circumstance that suggests the malware borrows Babuk’s leaked source code. We are in the final!

article thumbnail

Malvertising campaign exploits recently disclosed WordPress Plugin flaws

Security Affairs

Experts at Defiant, the company that developed the Wordfence security plugin for WordPress, uncovered a malvertising campaign that leverages recently disclosed plugin flaws to inject malicious code into websites. The post Malvertising campaign exploits recently disclosed WordPress Plugin flaws appeared first on Security Affairs.