Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Rising Trend of Ransomware Attacks in Healthcare: Complications from Supply Chain Attacks in Healthcare

Incident Overview In a significant breach of healthcare data security, the Qilin ransomware gang has leaked 400GB of NHS and patient data on Telegram. The group, identified as the Qilin ransomware gang, claimed responsibility for the exfiltration and demanded a $50 million ransom, threatening to release the data if their demands were not met. Following failed negotiations, the gang followed through on their threat and made the entire dataset public.

CVE-2024-5805 & CVE-2024-5806: Authentication Bypass Vulnerabilities in Progress MOVEit Transfer and MOVEit Gateway

On June 25, 2024, Progress disclosed two vulnerabilities affecting MOVEit Transfer and MOVEit Gateway: CVE-2024-5805: A critical severity authentication bypass vulnerability affecting MOVEit Gateway (SFTP module). MOVEit Gateway is a proxy for MOVEit Transfer, designed to securely handle inbound connections when deployed behind a firewall.

Splunk .conf24 reflections - Federated data, resilience, and a parade of fezzes

Fresh from the recent.conf24 user conference in fabulous Las Vegas, I thought I’d share what I thought were some of the key points throughout the week. Along with admiring the traditional display of fezzes and capes throughout the week, we were excited about the great conversations with our customers, business partners, Splunkers, and, of course, the lovely Buttercup.

10 Essential Motorcycle Safety Tips Every Rider Should Know

As a motorcycle enthusiast, there's nothing quite like the thrill of hitting the open road on two wheels. The sense of freedom, the wind in your face, the nimble handling - it's an exhilarating experience. But with great fun comes great responsibility. Riding a motorcycle inherently carries more risk than driving a car. That's why it's crucial to prioritize safety every time you gear up for a ride.

How to Buy Bitcoin (BTC) in India

Bitcoin (BTC) is the first and most well-known cryptocurrency, often referred to as digital gold. It operates on a decentralised network and offers a secure and transparent method for conducting peer-to-peer transactions. As the pioneering cryptocurrency, Bitcoin has set the standard for the digital asset market and continues to be a preferred investment choice. For those looking to enter this market, understanding how to buy Bitcoin in India can be an essential step toward building a diversified investment portfolio.

eSIM Cybersecurity: More Advantages or Drawbacks?

As eSIM technology gets more popular every year and more people turn to it rather than physical SIM cards, what are the benefits? With eSIM technology, the SIM is built into the device, making it more convenient. An eSIM stands for embedded subscriber identity module and is an essential component that allows modern mobile devices to connect to mobile network operator services worldwide. However, I am more concerned about security rather than the features that new innovations bring. This is why I am dedicated to learning what security protocols eSIM uses and how safe embedded SIMs are for users.