Cybersecurity attacks have increased the risk to patient data, with attackers targeting the physical layer such as hardware and firmware. Firmware is often exploited as its updates require a manual process that is frequently delayed by IT teams. To mitigate against this, it is essential to ask five questions of your hardware integrator about firmware authentication, hardening checks, inventory scans, traceability, and post-delivery support. The aim is to ensure robust controls that can protect against known attack vectors and expedite recovery.

Microsoft warns of new remote access trojan targeting crypto wallets
Microsoft has discovered a new remote access trojan (RAT) called StilachiRAT that targets 20 cryptocurrency wallet extensions in the Google Chrome browser. The malware can