Patient monitors with backdoor are sending info to China, CISA warns

Contec CMS8000, a patient monitor manufactured by a Chinese company, and Epsimed MN-120, which is the same monitor but relabeled, exfiltrate patients’ data to a hard-coded IP address and have a backdoor that can be used to download and execute un… Continue reading Patient monitors with backdoor are sending info to China, CISA warns

Deploying AI at the edge: The security trade-offs and how to manage them

Deploying AI at the edge brings advantages such as low latency, improved efficiency, and real-time decision-making. It also introduces new attack surfaces. Adversaries could intercept models in transit, manipulate inputs to degrade performance, or even… Continue reading Deploying AI at the edge: The security trade-offs and how to manage them

Cybercrime forums Cracked and Nulled seized, operators arrested

Law enforcement from Germany, Australia, Spain, Greece, Romania, Italy, France and the USA have seized and shut down Cracked and Nulled, the two largest cybercrime forums in the world. The takedown notice (Source: German Federal Criminal Police Office)… Continue reading Cybercrime forums Cracked and Nulled seized, operators arrested

SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs

Attackers may have leveraged vulnerabilities in the SimpleHelp remote monitoring and management solution to gain initial access to healthcare organizations. About the vulnerabilities On January 13, 2025, Horizon3.ai researchers revealed their discovery… Continue reading SimpleHelp RMM vulnerabilities may have been exploited to breach healthcare orgs

Zscaler CISO on balancing security and user convenience in hybrid work environments

In this Help Net Security interview, Sean Cordero, CISO at Zscaler, talks about securing hybrid work and the new challenges it presents to cybersecurity teams. He discusses how hybrid work has exposed gaps in traditional security models while offering … Continue reading Zscaler CISO on balancing security and user convenience in hybrid work environments

Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)

CVE-2024-40891, a command injection vulnerability in Zyxel CPE Series telecommunications devices that has yet to be fixed by the manufacturer, is being targeted by attackers, cybersecurity company Greynoise has warned. Successful exploitation would all… Continue reading Zyxel CPE devices under attack via critical vulnerability without a patch (CVE-2024-40891)

DeepSeek’s popularity exploited by malware peddlers, scammers

As US-based AI companies struggle with the news that the recently released Chinese-made open source DeepSeek-R1 reasoning model performs as well as theirs for a fraction of the cost, users are rushing to try out DeepSeek’s AI tool. In the process… Continue reading DeepSeek’s popularity exploited by malware peddlers, scammers

Preparing financial institutions for the next generation of cyber threats

In this Help Net Security interview, James Mirfin, SVP and Head of Risk and Identity Solutions at Visa, discusses key priorities for leaders combating fraud, the next-generation threats institutions must prepare for, and the role of collaboration betwe… Continue reading Preparing financial institutions for the next generation of cyber threats

Europeans targeted with new Tor-using backdoor and infostealers

A financially motivated threat actor has been targeting German and Polish-speaking users with info-stealing malware and TorNet, a previously undocumented .NET backdoor that leverages the Tor network to evade detection. The phishing email The attacker s… Continue reading Europeans targeted with new Tor-using backdoor and infostealers