The phone call is the new phishing email

Voice-based phishing was at the root of multiple attack sprees Mandiant responded to last year, reflecting a concerning shift in tactics.

The post The phone call is the new phishing email appeared first on CyberScoop.

Continue reading The phone call is the new phishing email

If threat actors gave you a chance to redact the patient data they hacked before they leak it, would you take them up on the offer? Read about the Woundtech incident.

On January 2, while many were still greeting each other with “Happy New Year,” Wound Technology Network (“Woundtech”), a Florida-headquartered mobile wound treatment provider, was not off to a great start for the year. On or abo… Continue reading If threat actors gave you a chance to redact the patient data they hacked before they leak it, would you take them up on the offer? Read about the Woundtech incident.

3.7 Million Telehealth Patients Allegedly Affected By Two Recent Breaches

He hasn’t attracted much attention or media coverage yet, and he doesn’t have any leak site or Telegram account. However, those reporting breaches involving patient data should note a threat actor known as “Stuckin2019” (or simp… Continue reading 3.7 Million Telehealth Patients Allegedly Affected By Two Recent Breaches

Aqua’s Trivy Vulnerability Scanner Hit by Supply Chain Attack

Hackers published a malicious scanner release and replaced tags to point to information-stealer malware.
The post Aqua’s Trivy Vulnerability Scanner Hit by Supply Chain Attack appeared first on SecurityWeek.
Continue reading Aqua’s Trivy Vulnerability Scanner Hit by Supply Chain Attack

Apiiro introduces AI Threat Modeling to identify risks before code exists

Apiiro has announced AI Threat Modeling, a new capability within Apiiro Guardian Agent that automatically generates architecture-aware threat models to identify security and compliance risks before code exists. AI Threat Modeling allows enterprises to … Continue reading Apiiro introduces AI Threat Modeling to identify risks before code exists