article thumbnail

Sophos details five years of China-linked threat actors’ activity targeting network devices worldwide

Security Affairs

Sophos, with the help of other cybersecurity firms, government, and law enforcement agencies investigated the cyber attacks and attributed them multiple China-linked APT groups, such as Volt Typhoon , APT31 and APT41 / Winnti. The Chinese hackers have also ramped up the use of zero-day vulnerabilities in targeted devices.

article thumbnail

Millions of Dell Laptops Found Vulnerable to Firmware-Level Exploit

Centraleyes

A critical firmware flaw in Dell’s ControlVault security chip exposed millions of laptops to persistent compromise. While patches are available, the incident underscores deeper governance and risk oversight gaps that many organizations have yet to address. Yet adoption remains inconsistent.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Quantum Threats and How to Protect Your Data

SecureWorld News

A primary concern with quantum computing is its ability to break encryption standards essential to online communication, financial transactions, and secure government data. Current efforts to address quantum threats Recognizing these risks, organizations and governments are developing quantum-resistant cryptographic methods.

article thumbnail

Ghost Ransomware a Persistent Global Threat to Critical Infrastructure

SecureWorld News

The FBI, CISA, and MS-ISAC have issued a joint cybersecurity advisory warning organizations about Ghost (Cring) ransomware, a sophisticated cyber threat that has been compromising critical infrastructure, businesses, and government entities worldwide. Strengthening identity security Enforce phishing-resistant MFA for all privileged accounts.

article thumbnail

FDA Playbook Engineers Safety Into Medical Device Manufacturing

SecureWorld News

The FDA's playbook is a clear signal that governance, risk, and compliance (GRC) practices must evolve beyond checkbox HIPAA compliance," said Hemanth Tadepalli , Cybersecurity and Compliance Engineer at May Mobility. CISA and NIST.

article thumbnail

The Edge Has Become the Battleground

SecureWorld News

Governance pressure joining technology risk Capitol Hill is circulating a draft "Cyber Hygiene Safe Harbor" bill: firms demonstrating secure-by-design practices would gain liability shields after nation-state incidents. Note firmware version, last patch date, vendor support status. infrastructure71% traced to abandoned edge hardware.

article thumbnail

2025 Supply Chain Threat Landscape: AI, APIs, and the Weakest Link

SecureWorld News

In another case, a medical device manufacturer's firmware update system was targeted; malware was inserted into life-saving equipment (like pacemakers and insulin pumps), raising alarms about physical safety. Each device can be a new weak link if not secured.