Systems

  • Blog

    Healthcare systems are rife with exploits — and ransomware gangs have noticed

    Healthcare organizations are facing serious threats from ransomware groups, with nearly nine-in-ten (89%) found to have medical devices that are vulnerable to exploits. That’s according to research from Claroty, which examined the state of security among healthcare organizations — and the diagnosis isn’t good. The report found that effectively all (99%) of healthcare organizations have at least one known, actively…

    Read More »
  • Blog

    The No-Stress Guide to Septic Systems

    It’s easier to get your head around maintenance when you have a clear sense of parts and function. Here’s an overview of how a conventional home septic system works: Instead of shunting wastewater into the sewer system, a septic system sends all water (and any waste) from sinks, showers, and toilets into a large watertight tank buried on the property.…

    Read More »
  • Blog

    EncryptHub linked to MMC zero-day attacks on Windows systems

    A threat actor known as EncryptHub has been linked to Windows zero-day attacks exploiting a Microsoft Management Console vulnerability patched this month. Uncovered by Trend Micro staff researcher Aliakbar Zahravi, this security feature bypass (dubbed ‘MSC EvilTwin’ and now tracked as CVE-2025-26633) resides in how MSC files are handled on vulnerable devices. Attackers can leverage the vulnerability to evade Windows…

    Read More »
  • Blog

    Best DIY Home Security Systems of 2025

    DIY home security systems have become a popular alternative to professionally installed systems. Even ADT, whose systems historically could only be bought through an installer, now allows you to buy its systems directly from the company and install them yourself. There are many things to consider when choosing a DIY home security system. Is it easy to set up and…

    Read More »
  • Blog

    New VanHelsing ransomware targets Windows, ARM, ESXi systems

    A new multi-platform ransomware-as-a-service (RaaS) operation named VanHelsing has emerged, targeting Windows, Linux, BSD, ARM, and ESXi systems. VanHelsing was first promoted on underground cybercrime platforms on March 7, offering experienced affiliates a free pass to join while mandating a deposit of $5,000 from less experienced threat actors. The new ransomware operation was first documented by CYFIRMA late last week,…

    Read More »
  • Blog

    Integrating Low-Code Platforms with Legacy Systems

    Low-code platforms accelerate application development and automate business processes. These platforms enable users to create applications with minimal hand-coding, using visual interfaces and pre-built components. Many organizations still rely on legacy systems that have been in use for years or even decades. These legacy systems are deeply embedded and are often difficult to replace due to their complexity, cost, and…

    Read More »
  • Blog

    Best Home Security Systems of 2025

    Home security systems differ in ways you can’t see, such as the reliability of their sensors and their tech support services. These differences came to light in our first-ever survey on home security systems owned by more than 11,000 Consumer Reports members. We used those results to create our first home security system satisfaction ratings. Below you’ll find the top…

    Read More »
  • Blog

    Developer guilty of using kill switch to sabotage employer’s systems

    A software developer has been found guilty of sabotaging his ex-employer’s systems by running custom malware and installing a “kill switch” after being demoted at the company. Davis Lu, 55, of Houston, was a software developer for an Ohio company, reportedly Eaton Corp, from November 2007 to October 2019. Eaton Corporation is a global power management company that provides electrical, hydraulic,…

    Read More »
  • Blog

    Nakivo backup flaw still present on some systems months after firms’ ‘silent patch’, researchers claim

    Over 200 vulnerable internet-facing Nakivo backup and replication instances have been identified months after the firm silently patched a security flaw without publicly disclosing the issue. Security researchers at watchTowr recently published a report detailing their discovery of an arbitrary file read vulnerability in Nakivo’s central management solution. The report noted that, if exploited, the flaw could enable an attacker…

    Read More »
  • Blog

    Over 49,000 misconfigured building access systems exposed online

    Researchers discovered 49,000 misconfigured and exposed Access Management Systems (AMS) across multiple industries and countries, which could compromise privacy and physical security in critical sectors. Access Management Systems are security systems that control employee access to buildings, facilities, and restricted areas via biometrics, ID cards, or license plates. Security researchers at Modat conducted a comprehensive investigation in early 2025 and discovered…

    Read More »
Back to top button
close