Blog
Our latest news.
Stay up-to-date with news and blog posts from ASMGi on how to bridge the gap to apply technology to solve business problems.
ASMGi Posts
![](https://asmgi.com/wp-content/uploads/2024/04/Hero-Image-_with-text.gif)
Zero Trust: A Paradigm Shift in Cybersecurity
![](https://asmgi.com/wp-content/uploads/2024/04/Detect-a-Scam-scaled.jpeg)
Unveiling Deception: How to Spot Scams Before They Spot You
![](https://asmgi.com/wp-content/uploads/2024/02/Ransomeware-Webinar.gif)
Ransomware: Strategies for Safeguarding Your Digital Assets
![](https://asmgi.com/wp-content/uploads/2023/11/AICyberv2-1.jpg)
Unraveling the Power of AI in Cybersecurity: Safeguarding the Digital Realm
![](https://asmgi.com/wp-content/uploads/2023/11/Strengthening_Digital_Fortressv2_1-scaled.jpeg)
Fortifying Cybersecurity Defenses
![](https://asmgi.com/wp-content/uploads/2023/09/CyberstaffCostsHC-text-1.jpeg)
Optimizing Healthcare Cybersecurity Cost and Staffing: Balancing Resources and Risk in Healthcare
![](https://asmgi.com/wp-content/uploads/2023/06/Cybersecurity-Program-900x400-1.jpg)
Leading Cybersecurity Companies GS Lab | GAVS and ASMGi Announce Strategic Partnership to Enhance Global Cyber Defense
![](https://asmgi.com/wp-content/uploads/2023/06/healthcare-TPRM.jpeg.jpg)
Understanding the Importance of Third-Party Risk Management in Healthcare
![](https://asmgi.com/wp-content/uploads/2023/06/Mfgr_Hereo.jpeg.jpg)
Embracing Smart Manufacturing: Unveiling IoT Trends, Challenges, and Cybersecurity in the Era of Industry 4.0
Cybersecurity Update – Terin D. Williams – DHS – CISA
![CyberScoop logo](https://asmgi.com/wp-content/uploads/2023/06/FBI-CLE-v2-Dec-2022-scaled.jpeg)
Real Life Cyber Attacks - Dec 1 Event
![CyberScoop logo](https://asmgi.com/wp-content/uploads/2023/06/Flexential-logo-color-Registered.png)
The age of IoT and AI is quickly advancing, demanding more compute power and lower latency at the edge to ensure quick response and great performance.
![Bleeping Computer logo](https://asmgi.com/wp-content/uploads/2023/06/Transparent-Horizontal-Logo.png)
xIoT Device Risk: Turning the Industry Inside-Out
![Quinnipiac University logo](https://asmgi.com/wp-content/uploads/2023/06/Cyber-insurance-for-digtial-risk.jpeg)
Cyber Insurance: Digital Risk Mitigation Plan From Financial Loss
![](https://asmgi.com/wp-content/uploads/2023/06/AI-Image-HIMSS-1.jpeg)
AI In Healthcare
Cybersecurity News from Around the Web
French Authorities Launch Operation to Remove PlugX Malware from Infected Systems
French judicial authorities, in collaboration with Europol, have launched a so-called "disinfection operation" to rid compromised hosts of a known malware called PlugX. The Paris Prosecutor's Office, Parquet de Paris, said the initiative was launched on July 18 and...
Malicious PyPI Package Targets macOS to Steal Google Cloud Credentials
Cybersecurity researchers have discovered a malicious package on the Python Package Index (PyPI) repository that targets Apple macOS systems with the goal of stealing users' Google Cloud credentials from a narrow pool of victims. The package, named "lr-utils-lib,"...
![Crooks Bypassed Google’s Email Verification to Create Workspace Accounts, Access 3rd-Party Services](https://asmgi.com/wp-content/uploads/2024/07/signinwithgoogle.png)
Crooks Bypassed Google’s Email Verification to Create Workspace Accounts, Access 3rd-Party Services
Google says it recently fixed an authentication weakness that allowed crooks to circumvent the email verification required to create a Google Workspace account, and leverage that to impersonate a domain holder at third-party services that allow logins through Google’s...
Crypto exchange Gemini discloses third-party data breach
Cryptocurrency exchange Gemini is warning it suffered a data breach incident caused by a cyberattack at its Automated Clearing House (ACH) service provider, whose name was not disclosed. [...]
Google fixes Chrome Password Manager bug that hides credentials
Google has fixed a bug in Chrome's Password Manager that caused user credentials to disappear temporarily for more than 18 hours. [...]
FBCS data breach impact now reaches 4.2 million people
Debt collection agency Financial Business and Consumer Solutions (FBCS) has again increased the number of people impacted by a February data breach, now saying it affects 4.2 million people in the US. [...]
July Windows Server updates break Remote Desktop connections
Microsoft has confirmed that July's security updates break remote desktop connections in organizations where Windows servers are configured to use the legacy RPC over HTTP protocol in the Remote Desktop Gateway. [...]
Acronis warns of Cyber Infrastructure default password abused in attacks
Acronis warned customers to patch a critical Cyber Infrastructure security flaw that lets attackers bypass authentication on vulnerable servers using default credentials. [...]
Russian ransomware gangs account for 69% of all ransom proceeds
Russian-speaking threat actors accounted for at least 69% of all crypto proceeds linked to ransomware throughout the previous year, exceeding $500,000,000. [...]
This AI-Powered Cybercrime Service Bundles Phishing Kits with Malicious Android Apps
A Spanish-speaking cybercrime group named GXC Team has been observed bundling phishing kits with malicious Android applications, taking malware-as-a-service (MaaS) offerings to the next level. Singaporean cybersecurity company Group-IB, which has been tracking the...