The benefits of remote patient monitoring devices and other Internet of Things (IoT) technologies in healthcare are enormous, but so are the security risks. In this guide, we’ll cover ways healthcare providers can protect medical IoT devices from cyberthreats and ensure regulatory compliance. Strengthen network security Many IoT devices in healthcare environments weren’t built with […]
Author Archives: Onsite Computing, Inc.
As hospitals and clinics embrace remote patient monitoring devices and other Internet of Things (IoT) technologies, the risk of cyberthreats grows. Discover key steps that healthcare providers can take to safeguard both their IoT devices and their patients. Strengthen network security Many IoT devices in healthcare environments weren’t built with robust security in mind. That’s […]
The agency is recommending that organizations and individuals implement its recommendations to prevent the misuse of stolen data, though Oracle has yet to publicly do the same for its customers. Go to Source Author: Kristina Beek, Associate Editor, Dark Reading
Around the world, governments are setting higher-bar regulations with clear corporate accountability for breaches on the belief organizations won’t drive up security maturity for operational technology unless they’re made to. Go to Source Author: Warren O’Driscoll
Chinese-speaking IronHusky hackers are targeting Russian and Mongolian government organizations using upgraded MysterySnail remote access trojan (RAT) malware. […] Go to Source Author: Sergiu Gatlan
Hackers don’t break in—they log in. Credential-based attacks now fuel nearly half of all breaches. Learn how to scan your Active Directory for compromised passwords and stop attackers before they strike. […] Go to Source Author: Sponsored by Specops Software
Cisco has released security updates for a high-severity Webex vulnerability that allows unauthenticated attackers to gain client-side remote code execution using malicious meeting invite links. […] Go to Source Author: Sergiu Gatlan
A new multi-stage attack has been observed delivering malware families like Agent Tesla variants, Remcos RAT, and XLoader. “Attackers increasingly rely on such complex delivery mechanisms to evade detection, bypass traditional sandboxes, and ensure successful payload delivery and execution,” Palo Alto Networks Unit 42 researcher Saqib Khanzada said in a technical write-up of the campaign. […]
Your employees didn’t mean to expose sensitive data. They just wanted to move faster. So they used ChatGPT to summarize a deal. Uploaded a spreadsheet to an AI-enhanced tool. Integrated a chatbot into Salesforce. No big deal—until it is. If this sounds familiar, you’re not alone. Most security teams are already behind in detecting how […]
Cybersecurity researchers are warning of continued risks posed by a distributed denial-of-service (DDoS) malware known as XorDDoS, with 71.3 percent of the attacks between November 2023 and February 2025 targeting the United States. “From 2020 to 2023, the XorDDoS trojan has increased significantly in prevalence,” Cisco Talos researcher Joey Chen said in a Thursday analysis. […]


