company logo

Product

Our Product

We are Reshaping the way Developers find and fix vulnerabilities before they get exploited.

Solutions

By Industry

BFSI

Healthcare

Education

IT & Telecom

Government

By Role

CISO

Application Security Engineer

DevsecOps Engineer

IT Manager

Resources

Resource Library

Get actionable insight straight from our threat Intel lab to keep you informed about the ever-changing Threat landscape.

Subscribe to Our Weekly Threat Digest

Company

Contact Us

Have queries, feedback or prospects? Get in touch and we shall be with you shortly.

loading..
loading..
loading..
Loading...

Password

Security Breach

LastPass

loading..
loading..
loading..

33 Mn passwords of LastPass users at risk following security breach

Over 33 million passwords were reportedly compromised following the confirmation of unauthorized access to the developer environment of LastPass in a 2-week-old...

28-Aug-2022
3 min read

No content available.

Related Articles

loading..

Healthcare

DaVita, a major kidney care provider, suffered a ransomware attack that encrypte...

DaVita, a prominent kidney care provider in the United States, disclosed on Monday that it has fallen victim to a ransomware attack. The cyberattack encrypted parts of its network, causing operational disruptions and raising alarms about potential data theft. DaVita, which operates over 2,600 dialysis centers and employs over 76,000 individuals worldwide, is now working to contain the attack and mitigate its impact on patient care.* ### What Happened During DaVita's Ransomware Attack? On April 12, 2025, DaVita confirmed in an SEC FORM-8K filing that it became aware of a ransomware incident that had encrypted certain parts of its network. The attack occurred on a weekend, a typical strategy for cybercriminals, as IT teams are often understaffed and slower to respond during this time. In response, DaVita promptly activated its security protocols and implemented containment measures to isolate the affected systems. The company has yet to provide a clear timeline for when the impacted operations will return to normal, though it remains focused on restoring its network. ### Impact on Operations and Patient Care Despite the ransomware attack, DaVita stated that it continues to provide care to patients across its treatment centers. The company assured stakeholders that its contingency plans were effectively activated to ensure that critical healthcare services, such as dialysis, are not compromised. While the ransomware attack has disrupted some operational processes, the company has emphasized that patient safety and care remain a top priority. DaVita has also taken interim steps to restore impacted systems as quickly as possible. ### Patient Data Security Concerns One of the most pressing concerns in the aftermath of a ransomware attack is the potential theft of sensitive data. In the filing, DaVita mentioned that the scope of the breach, including whether patient data had been accessed or stolen, is still under investigation. This concern is particularly significant as ransomware gangs often steal data before encrypting it in a bid to extort additional payment from their victims. Given DaVita's size and prominence in the healthcare industry, any breach involving patient data could have serious repercussions for both the company and its patients. As of now, there has been no confirmation of data theft, but the company is conducting a thorough investigation to determine the full extent of the attack. ### Company’s Immediate Actions and Response Upon detection of the ransomware attack, DaVita acted quickly by isolating the affected systems to prevent further damage. The company’s security teams have been working tirelessly to restore operations while also ensuring that all critical patient care services remain uninterrupted. DaVita's swift response illustrates the effectiveness of its contingency plans, which are designed to minimize disruption in the face of cyberattacks. However, as the investigation progresses, the company has made it clear that more details about the attack’s full impact will be provided as soon as they are available. ### What’s Next for DaVita and Its Customers? The ransomware attack on DaVita raises serious questions about the security of sensitive patient data within the healthcare industry. As cyberattacks on healthcare providers continue to rise, it is becoming increasingly critical for companies in the sector to bolster their cybersecurity measures to protect patient information and maintain trust. While DaVita has yet to determine the full extent of the damage, including any potential patient data theft, it remains committed to restoring its network and operations. The company has assured the public that it will keep stakeholders informed as more information becomes available. ### How Can Healthcare Providers Protect Themselves From Ransomware Attacks? Healthcare organizations like DaVita are prime targets for ransomware attacks due to the critical nature of the services they provide and the sensitive data they store. In response to growing cybersecurity threats, healthcare providers must implement robust security protocols, including the following: 1. **Regularly Update Systems and Software:** Keeping software up to date ensures that known vulnerabilities are patched, reducing the likelihood of an attack. 2. **Employee Training on Cybersecurity Best Practices:** Educating employees about phishing emails and other common attack vectors can help prevent ransomware from gaining access to networks. 3. **Data Backup and Encryption:** Ensuring that critical data is backed up and encrypted can make it easier to recover if a ransomware attack occurs. 4. **Incident Response Planning:** Having a well-defined incident response plan in place allows organizations to respond swiftly and minimize damage during a cyberattack. The recent ransomware attack on DaVita highlights the ongoing cybersecurity challenges faced by healthcare organizations, particularly those that manage sensitive patient data. While the company continues to investigate the attack and restore operations, patient care remains a priority, and DaVita has implemented contingency measures to minimize disruptions. As the investigation unfolds, stakeholders will be keenly watching for any updates regarding the potential theft of patient data and how DaVita plans to prevent future cyberattacks. Healthcare providers must take immediate action to safeguard their networks and data to prevent similar incidents from occurring in the future. In an increasingly connected world, ransomware attacks are an unfortunate reality that organizations must prepare for. With a focus on proactive cybersecurity measures and quick response protocols, healthcare companies like DaVita can minimize the impact of such incidents and continue providing vital services to their patients. --- **Keywords:** DaVita ransomware attack, ransomware attack healthcare, cybersecurity, patient data security, ransomware response, DaVita ransomware breach, healthcare cybersecurity, data encryption, ransomware incident response, cybersecurity measures in healthcare. **Meta Description:**

loading..   15-Apr-2025
loading..   5 min read
loading..

VPN

SSL

Fortinet alert: Patch FortiGate SSL-VPN exploits. Hackers used symlinks to retai...

A newly disclosed Fortinet advisory reveals that hackers have maintained stealthy, persistent access to compromised FortiGate devices even after organizations patched the initial vulnerabilities used in the attacks.** The campaign, active since early 2023, underscores growing concerns over advanced post-exploitation techniques targeting network infrastructure. ### **How the Attack Works** Threat actors exploited known flaws, including critical CVEs like CVE-2022-42475 (a remote code execution bug) and CVE-2023-27997 (a heap overflow vulnerability), to create a **symbolic link (symlink)** between FortiGate’s user file system and root file system. This symlink, hidden in folders hosting SSL-VPN language files, granted attackers read-only access to sensitive configurations and system data. Fortinet confirmed that the symlink persisted even after initial vulnerabilities were patched, enabling continued surveillance. Devices with SSL-VPN functionality enabled are exclusively at risk. ### **Fortinet’s Mitigation Measures** The company rolled out urgent FortiOS updates to eliminate the threat: - **Versions 7.6.2, 7.4.7, 7.2.11, 7.0.17, 6.4.16**: Remove malicious symlinks and block future SSL-VPN-based exploits. - **Antivirus enhancements**: Older FortiOS versions (7.4, 7.2, 7.0, 6.4) now detect and auto-delete the symlink. Fortinet advises all users to: 1. Immediately upgrade to the latest firmware. 2. Audit device configurations for tampering. 3. Assume credentials are compromised and reset them. ### **Global Cybersecurity Alerts** The **U.S. CISA** and France’s **CERT-FR** issued parallel advisories, urging organizations to: - Disable SSL-VPN until patches are applied. - Monitor for unauthorized access dating back to early 2023. ### **Expert Insights: “Attackers Are Outpacing Defenders”** Benjamin Harris, CEO of cybersecurity firm watchTowr, warned *The Hacker News* that adversaries are exploiting vulnerabilities faster than companies can patch. “Attackers deploy backdoors designed to survive patches, upgrades, and even factory resets,” Harris said, noting impacts on **critical infrastructure sectors**. ### **What’s Next?** Fortinet has notified affected customers directly, though the campaign’s global, non-targeted nature complicates attribution. Organizations must prioritize: - **Patch compliance**: Apply updates to break attacker persistence. - **SSL-VPN scrutiny**: Disable if unused or until secured. - **Configuration audits**: Treat all settings as potentially compromised.

loading..   12-Apr-2025
loading..   2 min read
loading..

PP

LSC

Planned Parenthood Data Breach: Lab Co-op’s HIPAA Violation Exposes Dark Web Lea...

Laboratory Services Cooperative (LSC), a non-profit provider of lab testing services to Planned Parenthood clinics, has admitted to a catastrophic cybersecurity failure that exposed highly sensitive patient and employee data. Critics are calling it one of the **worst healthcare data breaches of the decade**, with millions of individuals at risk of identity theft, financial fraud, and medical privacy violations. ### **A Timeline of Negligence** According to LSC’s belated press release, hackers infiltrated their systems on **October 27, 2024**, accessing troves of data including Social Security numbers, bank account details, medical diagnoses, and insurance records. Yet, the organization waited **four months** to notify the public—a delay experts condemn as reckless. _“This timeline reeks of negligence,”_ said cybersecurity analyst Dr. Elena Torres of SecureNet Insights. “Four months is more than enough time for stolen data to be weaponised on the dark web. LSC’s failure to act swiftly placed countless lives in jeopardy.” The breach impacted Planned Parenthood affiliates in **12 states**, though LSC has refused to disclose specifics, directing victims to a vague FAQ page. Critics argue this lack of transparency exacerbates risks for vulnerable patients, particularly in states with restrictive reproductive healthcare laws. ### **A Treasure Trove for Cybercriminals** The stolen data reads like a hacker’s wishlist: - **Full medical histories**, including lab results, diagnoses, and treatment locations. - **Financial data** such as bank account numbers, credit card details, and insurance IDs. - **Government identifiers** like Social Security numbers, driver’s licenses, and passport information. “This isn’t just a breach—it’s a **goldmine for black market sellers**,” warned dark web researcher Marcus Chen. “Medical records fetch top dollar, often used for insurance scams or blackmail.” ### **LSC’s Flawed Response: Too Little, Too Late** While LSC claims to have enlisted “third-party cybersecurity specialists” to monitor the dark web, experts dismiss these efforts as **security theater**. “Once data hits the dark web, the damage is done,” said Torres. “Monitoring is a Band-Aid on a bullet wound. LSC should’ve invested in robust encryption and multi-factor authentication long before this breach.” The organization’s offer of **free credit monitoring via CyEx Medical Shield Complete** has also drawn fire. Victims report enrollment hurdles, with many claiming the service fails to cover medical identity theft—a glaring omission given the nature of the exposed data. ### **Planned Parenthood Patients: Silent Victims** The breach’s timing raises alarming questions. LSC began partnering with Planned Parenthood centers “in recent years,” coinciding with rising cyberattacks targeting reproductive healthcare providers. Advocacy groups fear bad actors could exploit stolen data to harass or doxx abortion seekers. “This isn’t just about privacy—it’s about **safety**,” said Rachel Nguyen of the Digital Rights Collective. “In post-Roe America, a breach like this could have life-or-death consequences.” Attorneys nationwide are mobilizing. “LSC’s delayed disclosure violates HIPAA’s 60-day notification rule,” said consumer rights lawyer David Klein. “We’re exploring **multi-million-dollar class actions** for negligence and emotional distress.” State attorneys general in California, New York, and Texas have launched investigations, with potential fines under HIPAA exceeding **$1.5 million per violation**.

loading..   12-Apr-2025
loading..   3 min read