Hamas-linked app offers window into cyber infrastructure, possible links to Iran

The administrators of a news site linked to Hamas have struggled to keep it online amid fighting with Israel.

The post Hamas-linked app offers window into cyber infrastructure, possible links to Iran appeared first on CyberScoop.

Continue reading Hamas-linked app offers window into cyber infrastructure, possible links to Iran

Addressing cyber threats in healthcare operational technology

The proliferation of connected medical devices (IoMT) in hospitals demands a holistic approach to cybersecurity beyond just the digital IT realm. Industrial cybersecurity (OT) requires integrated solutions to address its unique challenges. In this Help… Continue reading Addressing cyber threats in healthcare operational technology

Russian hackers offered phony drone training to exploit WinRAR vulnerability

Despite an August patch, Russian and Chinese state-backed hackers are using a vulnerability in the popular software to carry out espionage.

The post Russian hackers offered phony drone training to exploit WinRAR vulnerability appeared first on CyberScoop.

Continue reading Russian hackers offered phony drone training to exploit WinRAR vulnerability

Keeping up with the demands of the cyber insurance market

Cyber insurance has been around longer than most of us think. When American International Group (AIG) launched the first cyber insurance policy in 1997, it stepped into completely unknown territory to gain market share. Now, 26 years later, cyber insur… Continue reading Keeping up with the demands of the cyber insurance market

Unmasking the limitations of yearly penetration tests

In this Help Net Security interview, Charles d’Hondt, Head of Operations, Ambionics Security, talks about the necessity of implementing continuous penetration testing because yearly ones are not enough. They leave blind spots and cannot match the… Continue reading Unmasking the limitations of yearly penetration tests

Endpoint malware attacks decline as campaigns spread wider

In Q2 2023, 95% of malware now arrives over encrypted connections, endpoint malware volumes are decreasing despite campaigns growing more widespread, ransomware detections are declining amid a rise in double-extortion attacks, and older software vulner… Continue reading Endpoint malware attacks decline as campaigns spread wider