On the heels of a ransomware attack, Ardent said facilities are rescheduling elective procedures and diverting some emergency room patients to other local hospitals until systems are back online.
New AI guidelines authored by CISA and the UK's NCSC stress the importance of secure design, development, deployment, and operation of AI models and tools.
Researchers observed thousands of spam emails delivering the WailingCrab malware that were sent to targets in North and South America, Europe and Asia.
Dennis Fisher and Lindsey O'Donnell-Welch talk about some of things in the security community they're thankful for, and a couple of things they're not.
Citrix is urging impacted customers to update, but also recommends that they remove any active or persistent sessions and look for patterns of suspicious session use.
The fine stems from two previously known Morgan Stanley data security incidents.
Google's Threat Analysis Group has identified four separate campaigns targeting the Zimbra Collaboration vulnerability (CVE-2023-37580) in recent months.
Merritt Baer, field CISO at Lacework and former member of the AWS office of the CISO, joins Lindsey O'Donnel-Welch in this week's Memory Safe episode to discuss her career arc, finding a true seat at the table as a security executive, and security as a business enabler.
A key European Union Parliament committee has rejected proposed language that would allow for mass scanning of encrypted messages.
Microsoft released patches for 57 vulnerabilities in November's Patch Tuesday update, including three flaws that have been actively exploited.
Welcome back to Source Code, Decipher's weekly news wrap podcast with input from our sources.
A path traversal zero day (CVE-2023-47246) in the SysAid on-premises product is under active attack by the ace Tempest threat group.
A new report revealed discrepancies in how CISOs and developers view their roles and responsibilities around software supply chain security.
Kymberlee Price, co-founder of Zatik, joins Dennis Fisher to talk about her experience running security response programs at Microsoft, BlackBerry, and other companies, and how the changing security landscape helped lead her to start her own company.
Researchers with IBM X-Force recently observed the new Gootloader variant being used for lateral movement, marking a significant change in the malware’s post-infection tactics.