Author: nlqip

Cybersecurity experts faulted UHG for failure to deploy multifactor authentication MFA — a basic enterprise security access control — across Change Healthcare’s servers. UHG acquired Change Healthcare in October 2022. Letter blames inexperienced security leadership Steven Martin, UHG’s chief information security officer, was appointed in June 2023. “He had not worked in a full-time cybersecurity…

Read More

A massive trove of 361 million email addresses from credentials stolen by password-stealing malware, in credential stuffing attacks, and from data breaches was added to the Have I Been Pwned data breach notification service, allowing anyone to check if their accounts have been compromised. Cybersecurity researchers collected these credentials from numerous Telegram cybercrime channels, where the…

Read More

On June 2, Snowflake indicated a recent increase in cyber threat activity targeting customer accounts on its cloud data platform. Snowflake issued a recommendation for users to query for unusual activity and conduct further analysis to prevent unauthorized user access. Users and administrators are encouraged to hunt for any malicious activity, report positive findings to CISA,…

Read More

​Security researchers at Tenable discovered what they describe as a high-severity vulnerability in Azure Service Tag that could allow attackers to access customers’ private data. Service Tags are groups of IP addresses for a specific Azure service used for firewall filtering and IP-based Access Control Lists (ACLs) when network isolation is needed to safeguard Azure…

Read More

Following a cybercrime group’s claims that it stole data from 560 million Ticketmaster customers, the ticket sales and distribution firm’s parent company told the US Securities and Exchange Commission (SEC) on Friday that it had identified unauthorized activity with a cloud partner. “On May 20, 2024, Live Nation Entertainment identified unauthorized activity within a third-party…

Read More

Cloud security is a crucial component of the digital era. With that in mind, the National Security Agency (NSA) and Cybersecurity and Infrastructure Security Agency (CISA) collaborated to issue five joint cybersecurity bulletins on best practices aimed at enhancing security for cloud services. These bulletins address critical aspects such as identity and access management, key…

Read More

Researchers have published a proof-of-concept (PoC) exploit script demonstrating a chained remote code execution (RCE) vulnerability on Progress Telerik Report Servers. The Telerik Report Server is an API-powered end-to-end encrypted report management solution organizations use to streamline the creation, sharing, storage, distribution, and scheduling of reports. Cybersecurity researcher Sina Kheirkha developed the exploit with the…

Read More

‘I am more optimistic than I have ever been for the potential and growth ahead of us and believe these changes will best position us for long-term success,’ says new AWS CEO Matt Garman. Matt Garman is now officially Amazon Web Services’ new CEO, effective Monday. The longtime AWS veteran is hitting the ground running,…

Read More

Live Nation disclosed that its Ticketmaster subsidiary was impacted by ‘unauthorized activity within a third-party cloud database environment.’ Live Nation disclosed Friday that its Ticketmaster subsidiary was impacted by malicious activity in a cloud database operated by a third party, which resulted in the theft of company data. CRN reached out to Ticketmaster for further…

Read More

‘We’ve integrated everything that an enterprise needs to deploy a private cellular network. And we’ve made it much simpler so that the network admin can now deploy it very easily. We’re also taking a big step in the journey to integrate it into HP Aruba Networking Central, because what we’ve heard from customers is they…

Read More