Recent Threats Highlight the Importance of Cybersecurity in Healthcare
Early on October 28, we got to know that personal and medical details – including names, social security numbers, and diagnostics images – of more than 3 million U.S. patients are available online, unprotected and accessible to anyone who knows how to search for it. Later that same day, the ... Read More
New Research report “Connected Medical Device Security” shows health networks still exposed to significant risk of attack and disruption
Forescout Research Labs analyzed the security of Healthcare Delivery Organizations in 2020, comparing data from the same review in 2019 and found major issues with legacy systems and insufficient segmentation. The growing number and diversity of devices in HDOs has introduced new cybersecurity risks. The ability to compromise devices ... Read More
Major Vulnerability in Windows DNS Servers: Responding to CVE-2020-1350 (SIGRed)
As part of Microsoft’s traditional Patch Tuesday in July, CVE-2020-1350 (codenamed “SIGRed”) was fixed and disclosed publicly. This vulnerability is very serious, with a CVSS score of 10, and allows remote unauthenticated attackers to run arbitrary code with elevated privileges. The Vulnerability The vulnerable component is the Windows DNS Server ... Read More
Which Device will be YOUR weakest link this year?
The modern enterprise is rapidly evolving from an on-prem network with a hard-shell security perimeter to a network of networks – and the diverse devices that form them. Are there devices that stand out as higher risk? If so, what is the business impact and how do we manage the ... Read More
EKANS Strikes Again: Honda and Enel Taken Down by Ransomware
After we first reported on the EKANS ransomware back in February there have been three big new developments. First, the large hospital operator Fresenius was hit by the malware and had its operations disrupted and patient data leaked online. Second, the malware forced Honda to shut down some of its ... Read More
Identifying and Protecting Devices Vulnerable to Ripple20
Executive summary A set of 19 vulnerabilities, collectively called Ripple20, affecting the widely used Treck embedded IP stack, have been disclosed by the cybersecurity research company JSOF. Four of the vulnerabilities have a critical CVSS score, with impact including Remote Code Execution and Exposure of Sensitive Information. The vulnerabilities potentially ... Read More

