Because mobile devices are generally security weak points for organizations, QR codes that are designed to ease processes such as image file transfers may leave protected health data vulnerable.
Sophisticated bad actors can replace a genuine QR code with a clone that redirects users to a…
Source: www.healthcareitnews.com – Read more

North Korean Hackers Use ZIP Files to Deploy Malicious PowerShell Scripts
North Korean state-sponsored hackers, known as APT37 or ScarCruft, are leveraging malicious ZIP files in phishing emails to start multi-stage cyber attacks. The malicious files,