article thumbnail

French pharmaceuticals distribution platform Apodis Pharma leaking 1.7+ TB of confidential data

Security Affairs

The CyberNews investigation team discovered French pharmaceuticals distribution platform Apodis Pharma leaking 1.7+ Apodis Pharma is a company that offers a digital supply chain management platform and other software solutions created for pharmacies, healthcare institutions, pharmaceutical laboratories, and health insurance companies.

article thumbnail

National Safety Council data leak: Credentials of NASA, Tesla, DoJ, Verizon, and 2K others leaked by workplace safety organization

Security Affairs

The data was publicly accessible for 5 months, as the leak was first indexed by IoT search engines on January 31st, 2023. Among the accessible files, researchers also discovered a backup of a database storing user emails and hashed passwords.

Passwords 139
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

How to protect healthcare and life-sciences data from a cyber attack pandemic

Thales Cloud Protection & Licensing

According to analyst firm IDC , 93% of pharmaceutical companies and 72% of biotech companies already have business-critical applications in the cloud, including product lifecycle management, analytics, revenue management, and much more. Data security. But the threat is a lot more insidious. The risks of non-compliance.

article thumbnail

Why You Need to Tune EDR to Secure Your Environment

eSecurity Planet

This allows EDR to deploy very quickly, but it also allows for a number of security vulnerabilities. Here we’ll discuss why EDR vendors choose these configurations, and how organizations can tune their EDR systems to fit their organization and improve security. Also read: 10 Top Active Directory Security Tools.

Security 113
article thumbnail

STEPS FORWARD: Math geniuses strive to make a pivotal advance — by obfuscating software code

The Last Watchdog

Simply put, iO must be achieved in order to preserve privacy and security while tapping into the next generation of IT infrastructure. It will, of course, be vital to have these next-gen, AI-infused systems run securely, in ways that preserve individual privacy. An intolerable security bottleneck, in fact, is taking shape.

article thumbnail

The Hacker Mind Podcast: Hacking Industrial Control Systems

ForAllSecure

So there’s a need, a definite need, for information security professionals to have access to industrial control systems -- not virtual, but actual hands on systems -- so they can learn. In a moment I’ll introduce you to someone who is trying to do that--bring ICS equipment to security conferences. Technology Security.

article thumbnail

Connected consumer data: Meaningful outcomes for our health and wealth

Reltio

In addition, the availability of third- party consumer data providers, the Internet of Things (IoT) and the data generated by consumer wearable devices have irrevocably changed the landscape for all companies in the consumer health space. increasing level of security scrutiny and privacy regulations.