Browsed by
Author: Greg Swiecicki

Biopharmaceutical Firm Suffers Ransomware Attack, Data Dump

Biopharmaceutical Firm Suffers Ransomware Attack, Data Dump

The pharmaceutical organization that deals with EcecuPharm clinical trials has been infected with ransomware. During the attack, personal data of employees, social security numbers, personal data of taxpayers, bank accounts, passports and credit cards were disclosed.

https://www.darkreading.com/attacks-breaches/biopharmaceutical-firm-suffers-ransomware-attack-data-dump/d/d-id/1337673

Hackers Exploit Web Application Vulnerabilities to Deploy Malicious Web Shell

Hackers Exploit Web Application Vulnerabilities to Deploy Malicious Web Shell

Malicious cybercriminals use network shells to access victims’ networks. Network shell malware is a significant threat and still difficult to detect by most security tools. Cybercriminals are increasingly using this type of malware.

https://www.cisomag.com/hackers-exploit-web-application-vulnerabilities-to-deploy-malicious-web-shell/

The device for blocking satellite communications

The device for blocking satellite communications

Impressive Engineering has reported a remote device for blocking satellite communications, making temporarily hostile satellites in orbit useless. This device allows you to turn off satellites from the Earth’s surface. So far, no one has boasted of space weapons, apparently, since 2017, more than 13 systems can work. Experts say that technology does not damage satellites. Still, it can be a dangerous weapon, because it can cut off soldiers on the mission from the communication network or neutralize enemy missile warning systems. I wonder how enormous the consequences can be with the disabling of satellites from the Earth; probably shortly, we will find out. As it usually happens.

How Can Data Privacy Co-Exist with Data Intelligence in this Age?

How Can Data Privacy Co-Exist with Data Intelligence in this Age?

In today’s world, data plays a significant role. Gadgets that have become our everyday life in a modern way of life collect confidential information about us. When publishing our private information passionately on social media, we must be aware of its use by third parties. Either way, inadequate data protection can have devastating effects.

https://www.cybersecurity-insiders.com/how-can-data-privacy-co-exist-with-data-intelligence-in-this-age/

What’s Your Cybersecurity Architecture Integration Business Plan?

What’s Your Cybersecurity Architecture Integration Business Plan?

In the age of vast numbers of cyber attacks, most companies have dozens of cybersecurity products and tools. Constant changes are caused by the desire to protect the company and keep pace with opponents. The problem is involved, the number of devices will not ensure security until they will cooperate, and what often happens there is no such cooperation.

https://www.darkreading.com/operations/whats-your-cybersecurity-architecture-integration-business-plan/a/d-id/1337609