Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Fines for HIPAA Non-Compliance

In today’s digital age, the exchange and storage of information has become very common in all sectors of the world, healthcare being no exception. But with this transmission and storage comes the dangers of security and unauthorized access. The Health Insurance Portability and Accountability Act (HIPAA) was enacted with stringent regulations to safeguard this data and its violations can be severe.

The Impact of UNECE R155 on Automotive Cybersecurity

In an era where technology and transportation converge, the fusion of vehicles with IoT technologies heralds a new dawn of mobility. This leap forward promises enhanced connectivity and autonomous capabilities, yet casts a shadow of cyber vulnerabilities that could jeopardize not just the integrity of the vehicles but the safety of their passengers.

CVE-2024-3400: Zero-Day Remote Code Execution Vulnerability Exploited to Attack PAN-OS

A command injection vulnerability, being tracked as CVE-2024-3400, was recently discovered in the GlobalProtect feature of Palo Alto Networks PAN-OS software. This vulnerability has a CVSS score of 10 (Critical) and is actively being exploited in the wild. It impacts versions PAN-OS 120.2, PAN-OS 11.0 and PAN-OS 11.1. If exploited on vulnerable PAN-OS versions and distinct feature configurations, an unauthenticated attacker could execute arbitrary code with root privileges on the firewall.

PasskeyScanner: A Kroll BurpSuite Extension for Passkeys

Despite being a globally accepted security measure, passwords have associated issues that have led to countless breaches and compromised systems over many years of not-so-secure authentication technology. Yet passwords remain the dominant form of authentication because more secure options have not been accessible to all users. Passwords have evolved into the security risk they are today because, as the security requirements for passwords have increased, usability has decreased.

iPhone Security: How to Remove A Hacker From My iPhone

We have all become pretty familiar with our smartphones due to the amount of time we spend on them. According to recent data, the average user spends 3 hours and 15 minutes on their phones every day. As a result, the chance of you noticing something is not quite right with your phone is quite high. However, knowing the cause of the problem and how to fix it can be slightly more difficult. Is your iPhone behaving strangely due to outdated software, age, or hardware problem?

Centripetal and 4Data: A Powerful Union for Intelligence Powered Cybersecurity

In the ever-evolving cybersecurity landscape, staying ahead of threats is not just a priority but a necessity. Today, we’re announcing a strategic partnership with 4Data Solutions, a renowned technology solutions provider. This alliance is poised to redefine cybersecurity solutions across the UK while elevating the standards of protection for businesses worldwide.

Random but Memorable - Episode 12.6: Shadow IT Incident Sequel with Charlie from Wagestream

Whether or not you're familiar with shadow IT, know this: it's everywhere. Our guest this week, Charlie Livingstone, shines a light on the growing problem of shadow IT and how Wagestream are managing the risks it poses. Sit down with Roo and Charlie, as they unpack what shadow IT actually is, the growing challenges associated with it, and what we can do to safeguard ourselves and our organizations. 🔦🖥️

Episode 3:Weaving privilege elevation controls into your access management routines

In the third episode, we will delve deep into implementing the basics of privilege elevation and delegation management (PEDM) to enforce time-limited, requirement-based access to mission-critical resources. Join us to learn more about how you can grant access permissions to your users on an all-or-nothing basis and make the most of our PAM solution to handle real-time PEDM challenges.