US healthcare billing services group hacked, affecting at least half a million individuals

Credit to Author: Malwarebytes Labs| Date: Tue, 03 May 2022 13:21:40 +0000

Adaptive Health Integrations (AHI) has been breached. Sensitive information was accessed, but it took months to make the incident public.

The post US healthcare billing services group hacked, affecting at least half a million individuals appeared first on Malwarebytes Labs.

Read more

Airdrop phishing: what is it, and how is my cryptocurrency at risk?

Credit to Author: Christopher Boyd| Date: Tue, 03 May 2022 13:16:23 +0000

We take a look at the popular tactics used in Airdrop phishing to steal access to cryptocurrency users’ digital finances.

The post Airdrop phishing: what is it, and how is my cryptocurrency at risk? appeared first on Malwarebytes Labs.

Read more

Over 50 countries sign the “Declaration for the Future of the Internet”

Credit to Author: Malwarebytes Labs| Date: Tue, 03 May 2022 13:04:32 +0000

The US, EU member states, and other non-EU countries commit to this new internet declaration and encourage others to join.

The post Over 50 countries sign the “Declaration for the Future of the Internet” appeared first on Malwarebytes Labs.

Read more

Download: UEM vendor comparison chart 2022

Credit to Author: Bob Violino, Valerie Potter| Date: Tue, 03 May 2022 03:00:00 -0700

Unified endpoint management (UEM) is a strategic IT approach that consolidates how enterprises secure and manage an array of deployed devices including phones, tablets, PCs, and even IoT devices.

To read this article in full, please click here

(Insider Story)

Read more

Enterprise mobility 2022: UEM adds user experience, AI, automation

Credit to Author: Bob Violino| Date: Tue, 03 May 2022 03:00:00 -0700

The past two years have seen mobility management take on a greater importance than ever in the enterprise. As remote and hybrid work models take hold at many organizations, “mobility management” has expanded its meaning from management of mobile devices to management of all devices used by mobile employees, wherever they happen to be working from.

Unified endpoint management (UEM) has become a strategic technology at the center of companies’ efforts to control this increasingly complex environment. Essentially combining enterprise mobility management (EMM) tools with PC management tools, UEM platforms help companies manage and protect a range of devices including smartphones, tablets, laptops, and desktop computers across multiple operating systems — all from a unified interface.

To read this article in full, please click here

Read more

Russia to Rent Tech-Savvy Prisoners to Corporate IT?

Credit to Author: BrianKrebs| Date: Mon, 02 May 2022 21:29:34 +0000

Faced with a brain drain of smart people fleeing the country following its invasion of Ukraine, the Russian Federation is floating a new strategy to address a worsening shortage of qualified information technology experts: Forcing tech-savvy people within the nation’s prison population to perform low-cost IT work for domestic companies.

Read more

Microsoft launches Defender for Business to help protect small and medium businesses

Credit to Author: Christine Barrett| Date: Mon, 02 May 2022 18:00:00 +0000

Microsoft Defender for Business is now available as a standalone solution to help small and medium businesses boost security as they face growing threats.

The post Microsoft launches Defender for Business to help protect small and medium businesses appeared first on Microsoft Security Blog.

Read more

AvosLocker Ransomware Variant Abuses Driver File to Disable Anti-Virus, Scans for Log4shell

Credit to Author: Christoper Ordonez| Date: Mon, 02 May 2022 00:00:00 +0000

We found an AvosLocker ransomware variant using a legitimate anti-virus component to disable detection and blocking solutions.

Read more