Network Scanning Traffic Observed in Public Clouds
unit42.paloaltonetworks.com/cloud-network-scanning-traffic/ Tracking network scanning activities can help researchers understand which services are being targeted. By monitoring the origins of the scanners, researchers can also identify compromised endpoints. If a host belonging to a known organization suddenly starts to scan a part of the internet, it is a strong indicator that the host is compromised.
Misconfigured Database Leaks 880 Million Medical Records
www.infosecurity-magazine.com/news/misconfigured-database-leaks-880-m/ Researchers have found an unsecured database leaking over 886 million patient records online, although it’s now confirmed that this was dummy data.. The non-password-protected data trove was found by Jeremiah Fowler and Website Planet and traced to healthcare AI firm Deep 6 AI, which fixed the privacy snafu promptly after it was responsibly disclosed.