tampabaytech2

UNHACKED 025 HIPAA Compliance, SIEM, and Incident Response

HIPAA Compliance, SIEM, and Incident Response In this episode, Bryan Graf, SVP, Compliance Advisory at Abacode Cybersecurity & Compliance goes over HIPAA compliance. HIPAA, or the Health Information Portability and Accountability Act, is a law that requires any organization that stores, processes, or transmits protected health information (PHI) to protect that data via safeguards defined …

UNHACKED 025 HIPAA Compliance, SIEM, and Incident Response Read More »

YouTube channels of Taylor Swift, Justin Bieber, Harry Styles, and other musicians compromised

Some of the biggest stars around have seen content placed on their YouTube accounts without permission over the last couple of days. Taylor Swift has around 40 million subscribers. Justin Bieber? 68 million. Harry Styles, a respectable 12 million. You can even add Eminem and Michael Jackson to the list of those taken over. Big …

YouTube channels of Taylor Swift, Justin Bieber, Harry Styles, and other musicians compromised Read More »

H-ISAC Report Identifies Top Cyber Threats Concerning Healthcare Execs

H-ISAC and Booz Allen Hamilton released a report and survey outlining the top cyber threats concerning healthcare executives in today’s sophisticated cyber threat landscape. H-ISAC surveyed cybersecurity, IT, and non-IT executives and found no significant differences between the disciplines when the experts were asked to rank the top five greatest cybersecurity concerns facing their organizations …

H-ISAC Report Identifies Top Cyber Threats Concerning Healthcare Execs Read More »

Successful operations against Russian Sandworm and Strontium groups targeting Ukraine revealed

The US Department of Justice (DoJ) and Microsoft have taken the sting out of two operations believed to be controlled by the Russian Federation’s Main Intelligence Directorate (GRU). On Wednesday, the DOJ announced that it had disrupted GRU’s control over thousands of internet-connected firewall devices compromised by the Russian Sandworm group. One day later, Microsoft …

Successful operations against Russian Sandworm and Strontium groups targeting Ukraine revealed Read More »

Don’t enter your recovery phrase! Phishers target Ledger crypto-wallet users

Ledger is one of the biggest hardware cryptocurrency wallets around and scammers have noticed. Phishing mails are in circulation, hoping to snag Ledger users with a sneaky request for passphrases. What is a Ledger recovery phrase? A recovery phrase is an incredibly important combination of words that act as the literal keys to your digital …

Don’t enter your recovery phrase! Phishers target Ledger crypto-wallet users Read More »

Scroll to Top