Researchers explore real-world deployment of connected medical devices
ZingBox researchers detected, identified and analyzed the behavior of medical devices deployed in more than 50 hospitals, clinics, and other healthcare locations. Researchers …
Most healthcare breaches still come from hacking
In 2017 the number of individuals affected by breaches within the healthcare sector reached a four-year low. However, 71 percentof breaches in 2017 were due to hacking and IT …
Week in review: Memcached-based reflected DDoS attacks, new issue of (IN)SECURE
Here’s an overview of some of last week’s most interesting news and articles: Automating out of the skill gap sinkhole When thinking about the bigger picture, …
Keeping on top of ICS-focused hacking groups, defenses
How many hacking groups are focusing on ICS systems? Dragos security researchers say at least five were active in 2017. “While only one has demonstrated an apparent …
Microsoft releases Spectre fixes for Windows 10 on Skylake CPUs
Microsoft has pushed out a new set of Spectre (variant 2) security updates. For the moment, these are just for some devices running on Skylake CPUs and Windows 10 Fall …
Is your IoT strategy creating security holes?
Although most organizations plan to increase adoption of IoT into operations, only 28 percent consider security strategies specific to IoT as “very important.” Anticipated …
New infosec products of the week: March 2, 2018
Demisto brings visibility into SOC metrics Demisto’s latest release of its Security Operations Platform enables customers to leverage the incident metrics through …
SecOps reality gap: 85% say practicing SecOps is a goal, 35% actually do
More than half of companies (52 percent) admit to cutting back on security measures to meet a business deadline or objective. Based on a survey of over 200 senior-level …
Successful digital business transformation requires a cultural shift
When embarking on a digital business transformation, too often organizations ignore the need to change the mindset of their staff, according to Gartner. A technology shift not …
Hackers breached German government’s secure computer networks
The Russia-linked Sofacy hacking group has breached the secure computer networks of a number of German federal agencies. The group – also known as APT28, Fancy Bear, and …
(IN)SECURE Magazine issue 57 released
(IN)SECURE Magazine is a free digital security publication discussing some of the hottest information security topics. We’ve redesigned the magazine from the ground up …
What employers need to know about cybersecurity jobseekers
Based on a blind survey of cybersecurity professionals in the United States and Canada, a new (ISC)² report reveals low numbers of highly engaged workers. Only 15% of …
Featured news
Resources
Don't miss
- Sandworm APT’s initial access subgroup hits organizations accross the globe
- PAN-OS authentication bypass hole plugged, PoC is public (CVE-2025-0108)
- The UK’s secret iCloud backdoor request: A dangerous step toward Orwellian mass surveillance
- Over 3 million Fortune 500 employee accounts compromised since 2022
- CISOs and boards see things differently