Plus: EU agencies present their new cybersecurity strategy.
Part of Network | |
Presented by |
Hackers have stolen 342 million records from U.S. healthcare organizations since 2009. 2015 saw a record number of files breached. More: - Since 2009, there have been 4,746 recorded cases of U.S. healthcare organizations being breached.
- The largest number of cases was tracked in 2020, while most records were breached in 2015.
- In terms of states, California is the most affected. The state represents 10% of all cases.
- If calculated according to population size, Indiana tops the list with over 1 million cases.
- The most impactful breach happened in 2015 when threat actors breached Anthem. 37.5 million patient records were stolen in the breach.
| |
A Facebook bug that caused users to see unwarranted comments on their timelines may have been exploited by hackers. Meta claims that the bug has been patched. More: - Meta stated that the flaw happened due to a change in configuration.
- Users saw comments show up in their timeline from people they do not follow.
- Researchers claim that the flaw may have been exploited by threat actors who tried to scam people into donating money for fake cryptocurrency campaigns.
Zoom Out: - Social media apps have recently been involved with numerous security controversies.
- Twitter's former head of security recently claimed that the company does not monitor employees with access to sensitive user data.
- He also added that multiple employees might be working for foreign intelligence agencies.
- The data of over 5 million users was recently listed for sale on online hacking forums by unknown threat actors.
| |
A message from QUANTUM Save Your Data Before It Needs Saving - Air-Gapped Protection: Reliable and Cost-Effective Paying a ransom may sound like the best case scenario: get your data back, make your customers feel worth it. But actually, it can affect your business in other ways and may, in some cases, be illegal. Make sure your systems are protected across the entire data lifecycle - and never pay a ransom again. You’re able to balance cost while maximizing efficiency. No one can stop ransomware or fully prevent it from taking place - but you can make sure you’re protecting your customers and your data by ensuring that there is a fully air-gapped solution. Request A Demo | |
A malicious Chrome extension named Internet Download Manager with over 200,000 users has still not been taken down. The extension has been active since 2019. More: - The extension is likely a fake version of Internet Download Manager, an app designed for Windows.
- Tonec, the company that developed IDM, stated that all Chrome extensions pretending to be IDM are fake.
- Once a user downloads the Internet Download Manager, they are asked to install files hosted on a website called (puuupnewsapp).
- If the file is downloaded, Javascript code automatically configures browser settings.
| |
Key EU security agencies led by the EU's Justice and Home Affairs Agencies' Network have presented their new cybersecurity strategy. This strategy aims to protect the EU from cyber threats. More: - The strategy involves nine EU agencies, including Europol, CEPOL, EU-LISA, etc.
- EU-LISA monitors cyber-threats to Schengen Information System, the Visa Information System, and Eurodac, while Europol monitors criminal activity and border security in cooperation with police authorities across Europe.
- The agencies highlighted the fact that Russia's invasion of Ukraine has raised awareness of the importance of expanding cyber defense capabilities.
| |
A message from WIND RIVER Are you getting the most out of your simulation tools? With 25% of all employees expected to work remotely in 2022 (LinkedIn), companies must find new ways to provide their developers with access to the necessary hardware. Wind River® can help. With hardware simulation coupled with cloud capabilities, development can continue full force, regardless of where the hardware is. You will learn: - How simulation can enable new or support existing workflows
- What cloud capabilities can add to the development pipeline
- Why both tools together are necessary in a dispersed working environment
Register Now | |
Plex has announced that it has sent its users password reset notices. The announcement comes after an unknown threat actor breached the company's security protocol. More: - Plex is a streaming service operating in the U.S.
- The threat actor may have stolen data such as email addresses, usernames, and encrypted passwords.
- Plex claims that credit card information was not affected.
- The company has stated that it has tracked the flaw exploited by the threat actor, and it is actively working on fixing the issue, adding that the breach had a limited impact.
| |
Quick Hits: - Top companies are planning their holiday gifting now. Here’s why their gifts are sure to be a success.*
- GitLab has fixed a security flaw that had a CVSS score of 9.9. The flaw, tracked as CVE-2022-2884, allows authenticated users to achieve remote code execution by the Import from GitHub API endpoint.
- According to a new report, media companies are twice as likely to be breached as those in other industries.
- The number of global ransomware attacks has reached 1.2 million per month, with French hospitals being the latest victim.
- Hackers are using JavaScript injections to abuse WordPress sites and create DDoS prevention prompts. If successful, victims can be infected with Trojan viruses.
- Five ways you can use content and data to create a cycle of unforgettable customer experiences.*
*This is sponsored content. | |
Upcoming events at Inside: - August 24 - AMA with Matt Mahar (CEO at Cana) (Register Here)
- August 30 - An overview of simulation and cloud tools in embedded software (Register Here) *
- August 31 - AMA with Sophia Amoruso (CEO at Business Class) (Register Here)
- September 07 - AMA with Andrew Gazdecki (Founder of MicroAcquire) (Register Here)
- September 09 - AMA with Jay Ryan (U.S. Federal Government Program Manager at Security Compass) (Register Here)
- September 14 - AMA with Brian Dean (Founder of Backlinko) (Register Here)
- September 21 - AMA with Kristen Ruby (Founder of Ruby Media Group) (Register Here)
- September 28 - Free Access to the Semantic Layer Summit with 30+ Enterprise Data Leaders (Register Here) *
- September 28 - AMA with Leigh-Ann Buchanan (Founder of aīre ventures) (Register Here)
- October 12 - AMA with Bill Glenn (Executive Chairman at Crenshaw Associates) (Register Here)
- October 25 - Meet Our Fund 4, an Inside.com Summit (Register Here)
*This is a sponsored listing. | |
| | Arbër is an Inside writer who also has experience in entrepreneurship. He has experience covering Consumer Tech, Venture Capital, NFTs, Crypto, etc. Arbër holds a Bachelor's degree in Business from XAMK University in Finland. When he is not reading(and writing) business news, he chooses to watch sports or anime...and then read news about sports or anime. | | Editor | Aaron Crutchfield is based in the high desert of California. Over the last two decades, he has spent time writing and editing at various local newspapers and defense contractors in California. When he's not working, he can often be found looking at the latest memes with his kids or working on his 1962 and 1972 Fords. | |
With Quantum, we shift the focus from accumulating data to making it work for you. | |
|
767 Bryant St. #203, San Francisco, CA 94107 Copyright © 2022 Inside.com | |
|