article thumbnail

Future Proofing Tech Investments in Turbulent Times: Real Stories

Jane Frankland

Prioritising security, performance, and reliability through trusted partners is key to keeping up with the ever-changing, turbulent times, as is having an eye on technical debt, which I’ll discuss later, and effective planning.

article thumbnail

APT Attacks & Prevention

eSecurity Planet

For example, the BlackTech cyber-espionage ATP group, suspected to be backed by the Chinese government, sent emails containing Excel files with malicious macros to Japanese and Taiwanese corporations in the defense technology, media, and communications sectors. Also read: PowerShell Is Source of More Than a Third of Critical Security Threats.

Firewall 109
article thumbnail

McAfee Enterprise ATR Uncovers Vulnerabilities in Globally Used B. Braun Infusion Pump

McAfee

Lastly, the pump runs its own custom Real Time Operating System (RTOS) and firmware on a M32C microcontroller. Looking at the variable names inside the disposable data file and relevant code in the pump firmware led us to one key/value pair that specifies the “head volume” of the tube, which can be seen in the figure above.