Category Security

A Practical Guide for MSPs

Cybersecurity reporting is a critical yet often overlooked opportunity for service providers managing cybersecurity for their clients, and specifically for virtual Chief Information Security Officers (vCISOs). While reporting is seen as a requirement for tracking cybersecurity progress, it often becomes…

Medusind Breach Exposes Sensitive Patient Data

US dental and medical billing firm Medusind is notifying over 360,000 customers that their personal, financial and medical data may have been accessed by a cybercriminal actor. The breach relates to a cyber incident that took place back on December…

Microsegmentation For all Users, Workloads and Devices by Elisity

Network segmentation remains a critical security requirement, yet organizations struggle with traditional approaches that demand extensive hardware investments, complex policy management, and disruptive network changes. Healthcare and manufacturing sectors face particular challenges as they integrate diverse endpoints – from legacy…

Fake PoC Exploit Targets Security Researchers with Infostealer

Threat actors have created a fake proof-of-concept (PoC) exploit for a critical Microsoft vulnerability, designed to lure security researchers into downloading and executing information-stealing malware, Trend Micro has reported. The fake PoC relates to a critical vulnerability in Microsoft’s Windows…

Green Bay Packers Pro Shop Data Breach Compromises Customers

The Green Bay Packers disclosed on Monday a data breach affecting their official online retail store, packersproshop.com, after discovering malicious code designed to steal customer payment information. The breach, identified in late October 2024, involved the insertion of a card…