top of page
Untitled design.png

Weekly INK

Each week we compile an advisory on the latest threats, trends and newsworthy topics from the cyber security industry affecting small and medium enterprises. Join our subscribers below and help us prevent cybersecurity breaches.

watermark4.png

Issue #42 - April 24, 2023

National cybersecurity labeling program expected in May for IoT devices

Source: SC Media

Regulators have zeroed-in on securing the device infrastructure, such as the FDA's efforts to enforce cyber requirements for manufacturers. Industry leaders hinted at the RSA Conference on April 25 that the White House will formally announce its plan for developing the national cybersecurity labeling program in May.




Most Common Connected Devices That Pose Risk to Hospitals

Source: Data Breach Today

Study: Unpatched Nurse Call Systems, Printers and IP Cameras Top the List. A study of connected medical devices suggests nurse call systems may be among the riskiest devices in smart hospitals.




Debunking the Myth: Securing OT Is Possible

Source: Info Risk Today

OT attacks have nearly doubled year-over-year. Amid an increase in the number of attacks, companies are struggling with the complexities of protecting their OT infrastructure, said Mark Cristiano, global commercial director of cybersecurity services at Rockwell Automation.




Equifax: The New Era of Cybersecurity

Source: Data Breach Today

Equifax EVP and CISO Jamil Farshchi on Public-Private Collaboration, Transparency. The high-profile Equifax breach happened nearly six years ago. Jamil Farshchi, CISO of Equifax, discussed how the firm invested $1.5 billion, hired new staff and improved governance to prevent future attacks, but he said security organizations need to enter a new era of cooperation and transparency.




Thousands of Apache Superset servers exposed to RCE attacks

Source: Bleeping Computer

Apache Superset is vulnerable to authentication bypass and remote code execution at default configurations, allowing attackers to potentially access and modify data, harvest credentials, and execute commands.



89 views

Comments


Help us Prevent Breaches.

We will never share or sell your information. Unsubscribe at any time.

Email: *

Received.

bottom of page