article thumbnail

A week in security (January 18 – January 24)

Malwarebytes

The European Medicines Agency (EMA) revealed that some of the unlawfully accessed documents relating to COVID-19 medicines and vaccines have been leaked on the internet. Source: Brave website) Sharing an eBook with your Kindle could have let hackers hijack your account. Other cybersecurity news. Source: SCMagazine).

IoT 61
article thumbnail

How to protect healthcare and life-sciences data from a cyber attack pandemic

Thales Cloud Protection & Licensing

At the other end of the spectrum, the proliferation of connected medical devices and the internet of medical things (IoMT) have dramatically accelerated. Read our eBook to learn how to continue to adopt innovations such as cloud, big data, AI, and IoMT while automating and streamlining data protection and simplifying compliance.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

ENISA Threat Landscape Report 2020

Security Affairs

The publication is divided into 22 different reports, which are available in both pdf form and ebook form. Another element of concern is the diffusion of IoT devices , in many cases, smart objects are exposed online without protection. Infographic – Threat Landscape Mapping during COVID-19 ). states the report.

article thumbnail

2022: The threat landscape is paved with faster and more complex attacks with no signs of stopping

Webroot

In particular, we witnessed an increase in distributed denial of service (DDoS) attacks and a surge in the usage of the internet of things (IoT). Earlier in 2021, we detailed the hidden costs of ransomware in our eBook. Ransomware. Since mid-October 2021, there have been more than 25 active strains of ransomware circulating.

article thumbnail

Rogue Certificates and Shadow IT: The Underbelly of Digital Certificate Growth

Security Boulevard

Indeed, the first two Critical Security Controls identified by the Center for Internet Security involve building an inventory of enterprise hardware and software for a reason. Tale of 3 Clouds eBook: How Venafi Creates Digital Transformation. Security and IT personnel can’t defend what they don’t know about.

article thumbnail

How to Unwrap Digital Identity for a Happy Holiday Season in Retail

Security Boulevard

Enforce Zero Trust security : Leverage intelligent, contextual, and continuous security to connect and protect your employees, consumers, devices, and Internet of Things ( IoT ) at scale. Download your retail eBook today, and make this holiday season memorable, profitable, and secure. .

Retail 52
article thumbnail

Five Lessons from the JBS Attack for Securing the Manufacturing Supply Chain

Security Boulevard

Other attack tactics include exploiting overprovisioned workforce, supplier, and partner credentials to gain access to ecosystem applications; weak authentication policies; and gaining access through unsecured non-human identities, such as Internet of Things (IoT)-connected devices. And the list goes on. .