logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Understanding metrics to measure SOC effectiveness
  • Biggest data theft in world history takes place in India
  • MITRE’s System of Trust risk model manager improves supply chain resiliency
  • Bitcoin-cloud mining scam
  • Streaming Platform Gaint Lionsgate Exposes Over 37m Users’ Data

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-1578 (pimcore) 22 March 2023
  • CVE-2022-4095 (linux_kernel) 22 March 2023
  • CVE-2023-1567 (student_study_center_desk_management_system) 22 March 2023
  • CVE-2023-1568 (student_study_center_desk_management_system) 22 March 2023
  • CVE-2023-1569 (e-commerce_system) 22 March 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Required Actions to Prevent Common Ransomware Exploits, Access Points

Posted on 18 November 2020

From healthitsecurity.com

healthcare ransomware attacks exploit methods attackers hacking groups extortion threat methods cybersecurity employee training

Healthcare is leaving out the proverbial welcome mat for hackers, failing to address key vulnerable endpoints, which later become top access points and exploits for ransomware attacks.

Read more…

Posted in News

Post navigation

Previous post: Apple Lets Some of its Big Sur macOS Apps Bypass Firewall and VPNs
Next post: Shiton ransomware – cryptovirus that locks victim files until a ransom is paid
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.