Topic: healthcare sector
-
Australia's Critical Infrastructure Under Siege: Attacks Double
Australia's critical infrastructure has experienced a 111% increase in cyber attack notifications, with the ASD issuing over 190 alerts in FY25, highlighting growing vulnerabilities in essential services. The healthcare sector is particularly at risk, with malicious actors succeeding in 95% of in...
Read More » -
Your Critical Infrastructure Is at Risk - Act Now
Outdated and unsupported technology in critical national infrastructure creates predictable vulnerabilities that are regularly exploited, undermining national resilience and public safety. The healthcare sector is the most exposed due to its reliance on obsolete systems, with high risks also in w...
Read More » -
NY Blood Center Data Breach: 194,000 People Alerted
The New York Blood Center experienced a major data breach in January 2025, compromising nearly 194,000 individuals' data and ranking among the largest healthcare breaches of the year. Exposed information includes personal and financial details, health records, and test results, with affected indi...
Read More » -
Microsoft Nukes 200+ Fake Certificates in Teams Malware Attack
Microsoft revoked over 200 fraudulent certificates used by cybercriminals to distribute malware via fake Microsoft Teams installation files, a campaign linked to the Vanilla Tempest group. The attackers employed SEO poisoning and malvertising to trick users into downloading malicious files, which...
Read More » -
Industrial Control System Vulnerabilities Reach All-Time High
Industrial cybersecurity faces a severe escalation, with over 500 ICS security advisories published in 2025, a record high, and a dramatic increase in both the volume and average severity of vulnerabilities compared to previous years. The most frequently impacted systems are foundational operatio...
Read More » -
Hackers Exploit Gladinet CentreStack Flaw for RCE Attacks
A critical security flaw in Gladinet's CentreStack and Triofox platforms, due to hardcoded AES encryption keys, allows attackers to forge authentication tickets and gain remote code execution on servers. Attackers are actively exploiting this vulnerability, combining it with a known local file in...
Read More »