Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

%term

Trinity Ransomware Targets the Healthcare Sector

The Trinity ransomware gang is launching double-extortion attacks against organizations in the healthcare sector, according to an advisory from the US Department of Health and Human Services (HHS). The ransomware gains initial access via phishing emails or software vulnerabilities. “Trinity ransomware was first seen around May 2024,” the advisory says.

Google App Scripts Become the Latest Way to Establish Credibility and Automate Phishing Attacks

Cybercriminals have found a new way of leveraging legitimate web services for malicious purposes, this time with the benefit of added automation of campaign actions. Security researchers at CheckPoint have discovered a new phishing campaign that uses Google App Scripts – a scripting platform developed by Google that lets you integrate with and automate tasks across Google products – as the destination in malicious links.

The Howler Episode 13: Lane Roush, Chief Technical Customer Officer

This month we sit down with Lane Roush, Chief Technical Customer Officer, as he shares his philosophy on owning the outcome, his approach to wellbeing, his love for Halloween costumes and much more! Lane Roush has led the Arctic Wolf Sales Engineering organization since 2016. Lane brings 20+ years of IT and security experience to the team and has been a driving force in our sales, enablement, product, channel and go to market strategy.

The Mobile Phishing Boom and How to Avoid It

As mobile technology becomes integral to day-to-day life, fraudsters are refining phishing techniques to exploit vulnerabilities in mobile browsing. According to Zimperium’s 2024 zLabs Global Mobile Threat report, 82% of phishing sites specifically targeted mobile devices in 2023. To protect customer data, enterprises need to counter-adapt.

Nucleus Security Positioned as a Growth Leader in Frost Radar: Application Security Posture Management, 2024

In September 2024, Frost & Sullivan released its Frost Radar: Application Security Posture Management (ASPM), 2024, highlighting the leaders in this rapidly growing market. We’re proud to be recognized as a top player, reflecting our strong growth and impact in the ASPM space. Our customers use Nucleus to achieve a comprehensive and unified application security posture.

ISO 27001 - 2013 vs 2022: Changes, Transition & More

Information and digital security frameworks like FedRAMP, CMMC, and ISO 27001 are not static documents. They provide a static framework for your business to comply with and achieve, but that framework is only valid for so long. Several different forces are in play to ensure that the stipulations and security measures outlined in these frameworks remain valid over time.

Building Zero Trust Security: A Full Implementation Roadmap for Businesses

Today's digital is fast-moving, and businesses face many security threats. Hackers are constantly trying to steal data, with companies often overlooking internal weak spots. The traditional ways of protecting business systems and data don't work anymore. That's where Zero Trust Security comes into play-a fresh approach that says, "Don't trust anything or anyone, unless you can verify they're safe.".

Patient Data Security in Healthcare Marketing: A Critical Necessity

Nowadays, patient engagement through online tools forms an important part of healthcare marketing. The use of digital channels to reach out to patients requires that patient data security be considered with the seriousness it deserves. Healthcare providers have access to critical personal information. Hence, protecting this data is a basic tenet that goes beyond just being a legal requirement. More so because trust between them and their patients has to be cemented.