Aggregator
How healthcare CISOs can balance security and accessibility without compromising care
In this Help Net Security interview, Sunil Seshadri, EVP and CSO at HealthEquity, talks about the growing risks to healthcare data and what organizations can do to stay ahead. He shares insights on vendor management, zero trust, and securing the software supply chain, along with practical steps to tackle legacy system vulnerabilities. His advice helps organizations strengthen security without disrupting patient care. Given the rise in supply chain attacks, how should healthcare organizations approach vendor … More →
The post How healthcare CISOs can balance security and accessibility without compromising care appeared first on Help Net Security.
Rash of Hacks Hits Nursing Homes and Rehab Centers
More than a half dozen nursing homes and rehabilitation centers have reported an assortment of major hacks in the last month affecting a total of more than 130,000 individuals. What makes facilities caring for elderly and disabled patients an attractive and vulnerable target to cybercriminals?
Hackers Exploit Unpatched ChatGPT Bug
Hackers are exploiting a vulnerability in ChatGPT's infrastructure to redirect users to malicious websites, with security researchers recording more than 10,000 exploit attempts in a week from a single malicious IP address. The financial sector has borne the brunt of the attacks.
Tesla Owners Doxxed as Elon Musk and DOGE Fallout Grows
The White House slammed a website that purported to reveal the names, addresses and phone numbers of Tesla owners - unless they showed proof of selling their vehicles made by Elon Musk's car company - amid growing criticism over his efforts to sharply reduce the size of the federal government.
UK NCSC Sets 2035 Deadline for Post-Quantum Migration
The British cybersecurity agency urged critical infrastructure operators to adapt to post-quantum cryptography by 2035 as it and other government agencies prepare for the inevitability of quantum computers capable of breaking current encryption algorithms.
AWS SNS 被利用引发数据泄露及网络钓鱼危机
【转发有礼】360SRC×HackingGroup「奇御」AI安全技术沙龙·3月29日北京,线下约起~
CVE-2025-1314 | smub Custom Twitter Feeds Plugin up to 2.2.5 on WordPress ctf_clear_cache_admin cross-site request forgery
CVE-2025-1766 | themewinter Eventin Plugin up to 4.0.24 on WordPress Ticket Payment payment_complete authorization
CVE-2025-1770 | themewinter Eventin Plugin up to 4.0.24 on WordPress style path traversal
5 апреля – день X: Oracle, Маск или запрет TikTok в США
Kali Linux 2025.1a Released: New Tools and Desktop Environment Upgrades
Kali Linux, the renowned cybersecurity-focused Linux distribution, has just ushered in the new year with the release of Kali Linux 2025.1a. This update builds upon the existing features, offering myriad enhancements and improvements designed to give users a streamlined experience. Whether you’re already a seasoned Kali user or about to dive into the world of […]
The post Kali Linux 2025.1a Released: New Tools and Desktop Environment Upgrades appeared first on GBHackers Security | #1 Globally Trusted Cyber Security News Platform.
Fortinet 荣膺 2025 年 Gartner Peer Insights 零信任网络访问(ZTNA)“客户之选”
Chinese military-linked companies dominate US digital supply chain
Despite growing national security concerns and government restrictions, Chinese military-linked companies remain deeply embedded in the US digital supply chain, according to Bitsight. These organizations, many of which have been designated by the US Department of Defense as “Chinese Military Companies,” continue to provide essential digital infrastructure, exposing US businesses and critical industries to potential cybersecurity threats. ByteDance Group (TikTok’s parent company) alone is connected to 35.4% of the US market, demonstrating how even high-profile … More →
The post Chinese military-linked companies dominate US digital supply chain appeared first on Help Net Security.