Blog

Explore our blogs for the latest insights, tips, and best practices in third-party risk management. Stay informed and protect your organization by navigating the complexities of third-party relationships with confidence. Read on to enhance your risk management strategy!

Blog Category - Cybersecurity

Cybersecurity, Risk Landscape

39 Million Impacted By Bangkok Hospital Breach

On January 10 the Bangkok Post reported nearly 39 million health records were reportedly stolen from Bangkok Siriraj Hospital and nearby Siriraj Piyamaharajkarun Hospital. The records were being offered for sale on raidforums.com, “an internet database-sharing forum.” The poster, which...

Read More
Cybersecurity, Risk Landscape

Municipal Ransomware Attacks: Hometown Blues

In my hometown of Los Ranchos, in Bernalillo County, New Mexico, village residents include goats behind crumbling adobe walls and roosters crowing from the top of mobile homes. Riding horseback down the street is not uncommon. But, even the sleepiest of...

Read More
Cybersecurity, Risk Landscape

Credential Stuffing Attacks: How To Protect Yourself

The New York Office of the Attorney General said this week that it identified and notified 17 well-known online retailers, restaurant chains, and food delivery services that have been the victims of credential stuffing attacks. What Is Credential Stuffing? Credential...

Read More
Cybersecurity, Risk Landscape

HO! HO! Oh NOOOO! The Log4j Vulnerability

Here we go again: another holiday season, another exploit. It appears many IT, risk, and security professionals are going to have to wait to down their favorite holiday cheer as another exploit has brought tumult to the community. A Log4j...

Read More
Cybersecurity, Risk Landscape

‘Tis the Season for Scamming: Protect Yourself and Your Customers

It should be the season of good cheer, but the rise in shopping this time of year brings with it a rise in scams. It’s harder to be cheerful when you realize that great deal you thought you were so...

Read More
Cybersecurity, Risk Landscape

Let’s Talk About The GraphQL API Authorization Vulnerability

Cybersecurity firm Salt Labs recently discovered a “GraphQL API authorization vulnerability” in a large B2B financial technology platform. This vulnerability would give attackers ways to submit unauthorized transactions against customer accounts, harvest sensitive data and initiate unauthorized transactions. What exactly is a...

Read More
1 2 3 4 5 6 17