Up-to-date perspectives, case studies on evolving threats, and free cybersecurity tools.
A recent cyber incident involving cloud-based EHR vendor CareCloud reinforces a critical shift in healthcare cybersecurity: duration of access no longer defines impact—data concentration does.
Read more
How Distributed Attackers—and Ideology—Are Reshaping Cyber Risk
Read more
What the $750K Bitcoin Case Reveals About Modern Risk
Read more
A recent study shows a measurable increase in AI chatbots and agentic systems ignoring direct human instructions, bypassing safeguards, and exhibiting deceptive behavior.
Read more
A recent cyberattack targeting the Jackson County, Indiana Sheriff’s Office has triggered a multi-agency federal investigation involving the FBI and the Department of Homeland Security.
Read more
AI in the SOC highlights a critical reality: organizations rushing to deploy AI-driven security operations are encountering failure modes that are not theoretical—they are operational.
Read more
A nine-day digital blackout. Thirty-five closed clinics. An $800,000 ransom demand. Here's everything you need to know about the Medusa ransomware gang's latest — and most brazen — attacks on American public institutions.
Read More
Could your IT management tools be weaponized against you? Explore how the 2026 Stryker cyberattack exposed a critical blind spot in enterprise security — and the steps your organization should take now.
Read more
Most vulnerability management programs report in Critical/High/Medium/Low — but that doesn't tell you what risk costs. Here's how quantitative cyber risk measurement changes the equation.
Read more
March 2026 briefing: conflict-driven cyber threats for OT/ICS, manufacturing, healthcare and critical infrastructure—key risks, 30-day checklist, InfoSight.
Download Now
Geopolitical conflict is increasing healthcare cyber risk. Learn why IoMT security, medical device visibility, and cyber resilience now matter more than ever.
Read the latest
The University of Mississippi Medical Center ransomware attack disrupted clinics, communications, and EHR access. Here is what healthcare leaders should learn about downtime readiness, cyber resilience, and patient care continuity.
See the latest
A critical Honeywell CCTV vulnerability, CVE-2026-1670, can enable account takeover and unauthorized camera access. Learn the risk, affected models, and the security steps organizations should take now.
Read the latest
DOJ charges allege chip security and cryptography trade secrets were exfiltrated from Google and others. Learn the insider tactics and controls that stop them.
Read the latest
Attackers are hijacking identities through help desk resets and HR payroll portals to reroute direct deposits. Controls, detections, and response steps.
Read more
A ransomware attack on BridgePay triggered credit card payment outages across multiple cities and utilities. Local governments need vendor resilience, segmentation, MFA, and tested recovery.
Read more
Microsoft and incident responders report active exploitation of SolarWinds Web Help Desk. Patch fast, remove exposure, hunt RMM abuse, and protect AD.
Read more
Exposed AWS credentials in public S3 plus AI-assisted automation led to admin takeover in minutes.
Read more
Central Ozarks Medical Center disclosed a breach affecting nearly 12,000 patients. What was exposed, why healthcare breaches cost millions, and how to reduce impact.
Read more
A wave of fake “ChatGPT productivity” browser extensions is hijacking authenticated sessions by stealing session tokens. Learn how the attack works, what data is exposed, and the controls enterprises need to shut it down.
Read the latest
Vulnerability exploits now drive many intrusions. Learn why patch speed matters and how InfoSight Mitigator reduces exposure with risk-based prioritization and MTTR tracking.
Read More
Reprompt demonstrated one-click prompt injection and silent data exfiltration in Microsoft Copilot Personal. Controls to reduce AI assistant risk in enterprise.
Read More
ESA breaches expose why stolen credentials and tokens drive modern intrusions—and what U.S. organizations must do to contain identity-based attacks.
Read More
Email has always been a high-value attack surface, but the center of gravity has shifted.
Read More
Fintech doesn’t get hit “later.” It gets hit first—because money movement, identity, and APIs are the product.
Read more
JLR’s production shock is the 2026 warning label for manufacturers.
Read the latest
A new Health Security report captures the uncomfortable reality in healthcare right now: breach frequency is rising, disruption is becoming routine, and confidence in core defensive capabilities is low.
Read the latest
Healthcare breaches are rising, driven by ransomware, vendor access, and shadow AI. Here’s how to operationalize resilience, response speed, and governance.
Read more
How to Move Testing to the Identity Control Plane
Read more
From InfoSight’s perspective, the takeaway is direct: external early-warning channels are helpful, but they are not a control. Ransomware resilience comes from a repeatable operational program—continuous visibility, prioritized remediation, and 24/7 response—inside your organization (or delivered as a managed service).
Read the latest
In 2026 cyber risk is shifting fast from “malware problems” to identity-first attacks.
Read more
Device code phishing abuses a legitimate Microsoft sign-in flow to steal M365 access tokens. Learn how it works, who’s using it, and defenses.
Read More
On December 10, 2025, reporting confirmed what defenders already suspected: the React Server Components (RSC) vulnerability (CVE-2025-55182, “React2Shell”) has moved from “patch fast” to “assume scanning and attempted exploitation is already happening.”
Read the latest
Initial access brokers (IABs) have moved from fringe players to a core engine of the modern intrusion economy.
Read More
Insider risk is not a niche problem or an HR-only concern. It is the predictable outcome of giving humans and partners legitimate access to critical systems and data.
Read More
New York just turned hospital cybersecurity into a measurable obligation, and the clock already started.
Read More
The financial sector is often hailed for having some of the most robust cybersecurity defenses in the world. Yet, as a recent high-profile breach proves, your security is only as strong as your weakest link.
Read More
The Akira ransomware group has emerged as a formidable adversary, prompting a joint alert from the FBI and CISA.
Read More
In an era where operational technology (OT) and information technology (IT) are converging faster than ever, the security implications couldn't be more stark.
Read More
The state of Nevada suffered a ransomware attack that disrupted more than 60 government agencies, including health services, public safety, and the DMV.
Read More
This is not “just ransomware” and not “just BEC.” It is operational hijack: organized crime, affiliates, and access brokers using phishing, vendor impersonation, and malicious remote tools to reach the systems that move raw materials, schedule lines, release shipments, and touch OT.
Read More
The Environmental Protection Agency is moving from warnings to active co-piloting with the water sector on cybersecurity.
Read More
Government Technology reports that a string of cyberattacks against public defender offices in Arizona, New Mexico, and Colorado disrupted access to case files and slowed legal services, exposing how fragile this part of the justice system is to ransomware and data-theft operations.
Read more
Health-ISAC’s latest alert says healthcare is in a sustained high-threat period, not a spike.
Read More
HIPAA Journal reported two vulnerabilities in Vertikal Systems’ Hospital Manager Backend Services that could let unauthorized actors access sensitive hospital and patient information.
Read More
The Oracle E-Business Suite (EBS) zero-day, tracked as CVE-2025-61882, is hitting more organizations than first disclosed.
Read More
AI is accelerating phishing, identity abuse, and vendor fraud. This playbook shows exactly what stops it: verification ladders, phishing-resistant MFA, privileged access hygiene, and supplier guardrails.
Download The White Paper
The Conduent breach was not a brief 2025 incident but a three-month intrusion starting in October 2024 that let an attacker move through a contractor serving government and healthcare programs, turning one vendor’s compromise into many customers’ problem.
Read more
On Oct. 15, F5 confirmed that a nation-state actor had been inside parts of its environment since at least August, accessing internal development and knowledge systems tied to its BIG-IP product line.
Read more
The headline figure—an 85 % spike in cyberattacks during the federal shutdown—is not just a statistic for Washington. It’s a warning light for every agency or municipality whose defenders may be distracted, under-resourced or stretched during times of operational disruption. The same conditions that make federal agencies vulnerable—reduced staffing, employee stress, paused modernization—apply equally at state, county and city levels.
Read More
Read More
Read More
The Recall That Sounds Like Science Fiction. A cybersecurity flaw has forced Johnson & Johnson’s Abiomed division to issue a Class I recall—the FDA’s highest risk level—on its Impella heart-pump controllers. These are the small external devices that regulate life-sustaining cardiac blood flow in critical-care patients.
Read More
AI meeting transcription / notetaking tools are proliferating (often embedded in meeting platforms or offered as standalone apps). They promise convenience and automation, but they carry significant cybersecurity, compliance, legal, and governance risks.
Read More
Surveillance cameras designed to protect can easily become tools of exploitation when left unpatched or misconfigured. In education, finance, and public sectors, this risk directly translates to compromised safety and trust. InfoSight’s proactive vulnerability management and continuous monitoring programs ensure these devices remain assets—not attack vectors.
Read more
With more than half of CISA’s workforce sidelined during a government shutdown, the ripple effects extend beyond Washington.
Read More
For IT and security leaders in education, this isn’t just a privacy concern. It’s a cybersecurity risk that directly intersects with safeguarding, compliance, and trust.
Read More
A U.S. home healthcare company accidentally exposed more than 150,000 patient and employee records on the open web.
Read More
Airports are among the most complex digital ecosystems in the world. Every gate assignment, boarding pass, and baggage transfer depends on tightly integrated IT and OT systems operated not only by airlines and airports, but also by third-party vendors. That interconnectedness makes aviation one of ransomware’s most appealing—and dangerous—targets.
Read More
In late August, Nevada was struck by a serious ransomware incident that disrupted several state websites and digital services. The attack was first detected on August 24, when state officials identified what they described as a “security incident” that later revealed itself to be ransomware. Forensic investigators believe that state data was exfiltrated during the breach.
Read More
KillSec ransomware, formerly a hacktivist group, now targets exposed cloud resources for profit at scale. Recent attacks in the U.S., Peru, and Colombia highlight growing healthcare supply chain risks across Latin America and beyond.
Read the latest
The NY Blood Center ransomware attack shows why healthcare needs proactive vulnerability management and HIPAA-aligned cybersecurity.
Read More
Fort Bend County’s 2025 library cyberattack cost taxpayers nearly $5.8 million to recover.
Read More
For years, enterprises have invested heavily in vulnerability management, chasing bigger scans, fancier dashboards, and endless reports. But here’s the reality: identifying thousands of vulnerabilities doesn’t make you secure. What matters is knowing which ones to fix first, how to fix them efficiently, and confirming they’re actually gone.
Read more
In recent weeks, a cybersecurity researcher uncovered a 378GB unprotected backup database tied to Navy Federal Credit Union, the largest U.S. credit union with over 14.5 million members and $180B in assets.
Read more
A recent breach at a medical-equipment provider compromised data of over 90,000 patients. The incident shows how vulnerabilities in device-based vendors directly threaten both operational integrity and patient privacy.
Read more
In this edition of Ask Our Expert, we sat down with Ray Arteaga, InfoSight’s Senior Vice President of Advisory Services, to talk about a topic that affects every organization—vulnerability management.
Read More
F&B is heavily targeted due to operational weaknesses—InfoSight protects your IT/OT systems so operations stay online when it matters.
Read More
Enterprises are racing to adopt AI and expand in the cloud, but many are underinvesting in the controls that stop the most common attacks.
Read more
Outlining how America’s AI Action Plan pairs secure-by-design AI with new assurance, sharing, and response playbooks to protect critical infrastructure.
Read More
Most teams can describe AI GRC. Very few can operate it at scale—especially with agentic AI and a growing stack of third-party tools that quietly ship “AI features” every month.
Read More
Generative tools amplify phishing and impersonation; use AI defensively with guardrails.
Read More
In the latest installment of InfoSight Insights, we explore a critical issue in AI security: the vulnerability of advanced language models like GPT-5 to exploitation, stressing the importance of rigorous AI assessments for enterprise use.
Read the latest
Ransomware actors are shifting focus from encryption to pure data theft.
Read More
As summer winds down and organizations start prepping for fall initiatives, those of us inside the SOC (Security Operations Center) haven’t had the luxury of slowing down.
Read more
A recent report highlights serious concern over impending reductions in federal cybersecurity support for critical infrastructure operators—and the potential fallout of shifting responsibilities to states
Read More
Organizational Warning Brief | August 2025
Read more
New compliance pressures are forcing critical infrastructure operators to move beyond reactive defenses—embracing proactive, audit-ready cybersecurity as a core business function.
Read More
Cyber attacks are transforming with AI—becoming smarter, faster, and scaled.
Read More
AI-generated voice fraud is rendering voice authentication obsolete, exposing banks to regulatory, legal, and financial risk unless they rapidly adopt AI-resilient identity controls.
Read more
A new report reveals that during the first half of 2025, ransomware attacks on schools, colleges, and universities jumped 23% year-over-year—with 130 confirmed or suspected incidents and an average ransom demand of $556,000. That places education as the fourth most targeted sector, following business, government, and healthcare.
Read More
With Microsoft powering everything from authentication to communication, the cost of ignoring risk assessments is escalating—fast.
Read More
Giving back to children in need.
Read more
It ranks among the five largest health-related email breaches of the year.
Read more
In an era where digital infrastructure underpins nearly everything—from national security to everyday commerce—asking whether your systems are truly secure is no longer rhetorical. Here are the latest developments that should raise eyebrows.
Read More
Customer, partner, and employee data compromised at Nippon Steel Solutions following a zero‑day network vulnerability.
Read more
Now through the end of this year, for every new partnership, InfoSight will donate a portion of the engagement to leading U.S. charities.
Learn More
As global tensions and geopolitical instability persist, government-sponsored cyber operations continue to escalate. While we remain committed to protecting our national freedoms, adversaries are advancing tactics like wiper malware, AI-driven spear-phishing, and supply chain incursions—specifically targeting critical infrastructure and public sector systems.
Read More
Key Takeaways from NRECA Cyber Coop and Texas Electric Cooperatives IT Show
Read More
With Scattered Spider’s rapid pivot into aviation—bolstered by an FBI alert—and an unprecedented summer travel surge, the stakes have never been higher. Robust identity verification, hardened MFA, segmented networks, and vigilant travelers together form the strongest defense to keep flights—and vacations—flying smoothly. Sources
Read more
InfoSight wrapped up the NRECA Co-op Cyber Tech Conference with DHS Chief Meteorologist Sunny Wescott’s expert briefing on extreme weather risks and celebrated David Eckert’s victory in our Putter Challenge.
Read more
A message from Tom Garcia, President and CEO of InfoSight, Inc.
Read More
This structured baseline ensures that all subsequent recommendations are directly aligned with regulatory mandates, operational priorities and enterprise risk-management objectives.
Get Report
Analysts stress that small utilities and other critical-infrastructure operators in the U.S. remain attractive “targets of opportunity,” and could face both genuine and psychologically driven campaigns.
Read More
Discover how SOCaaS can deliver enterprise-grade 24/7 threat detection, rapid incident response, and audit-ready compliance for your co-op—without the expense of building an in-house SOC.
Read the Brief
An effective OT/IoT recovery plan is a synthesis of rapid containment, precision restoration, and strategic hardening. By institutionalizing these practices, organizations not only rebound quickly but also fortify their environments against evolving threats.
Learn More
Utilities don't just keep the lights on—they keep communities alive. And in a disaster, cyber resilience is just as critical as physical restoration.
Read more
The exposure of these HMIs is a wake-up call. Without visibility, segmentation, and continuous monitoring, critical water infrastructure remains dangerously vulnerable. InfoSight helps utilities take decisive action—before adversaries do.
Read More
Any organization within a U.S. critical infrastructure sector—especially those with legacy systems, remote access requirements, and insufficient endpoint controls—is at elevated risk of a LummaC2 infection.
Read more
Read More
Summer 2025, Vol. I, Issue IV - As we usher in the first days of summer, the cyber-risk landscape shows no signs of cooling off. In recent weeks, we’ve seen high-stakes litigation against major dialysis providers, ransomware outbreaks crippling behavioral-health and municipal services, insider breaches at state health agencies, and executive turmoil within leading insurers—all underscoring how threat actors are diversifying their targets and tactics.
Read More
Read more
Read more
This post dissects the Morgan County 911 cyber-attack that crippled critical emergency communications, pinpoints the underlying vulnerabilities in administrative and dispatch systems.
Read More
In the past two years, U.S. healthcare organizations have endured an unprecedented wave of data breaches, exposing over 409 million patient records—but the root cause often lies in misconfigured email systems and inadequate protections.
Learn more
With China dominating global inverter manufacturing, national security experts warn that these backdoors could be leveraged to inflict catastrophic damage on U.S. power systems.
Read more
InfoSight, Inc. published the Cybersecurity Compliance Guide for the Energy Sector—a tactical playbook to operationalize NERC CIP, strengthen third-party vendor governance, and fortify grid resiliency against today’s 70% surge in attacks. Download the guide now to empower your team with scalable, co-managed cybersecurity solutions.
Get Report
Read more
The official release of the 2025 InfoSight CPS Risk Exposure Report—our flagship annual analysis delivering mission-critical insights into the shifting risk paradigm of cyber-physical systems risk across healthcare and hospital environments. This forward-thinking study cuts through the noise to equip the C-Suite, OT managers and risk stakeholders with pragmatic, ROI-driven recommendations. Download the full report now and empower your team to proactively harden CPS environments, streamline operations, and elevate your risk management posture.
Download now
April’s threat environment reinforces a multifaceted escalation in cyber risk across higher education, critical infrastructure, energy, healthcare, and supply-chain ecosystems.
Read more
CISA'S recommendations for securing Water Systems
Read more
In this issue, we cover the rising tide of cyberattacks on critical infrastructure, emerging trends, and significant policy shifts affecting cybersecurity services. Read on for detailed insights, incident timelines, and our latest update on CISA.
Read More
Cyber risk quantification offers a data-driven way to measure both financial and operational consequences, guiding more informed cybersecurity investments. This white paper examines evolving risk assessment strategies, the advantages of quantifying cyber risk, and how OT asset owners can secure critical infrastructure without compromising operational efficiency.
Read More
The Health-ISAC 2025 report reveals a surge in cyberattacks against the healthcare sector. Key findings include a rise in ransomware, sophisticated nation-state cyber-espionage targeting sensitive data, and new vulnerabilities from expanding IoMT devices.
Download now
Our Incident Response Playbook is a compressive program document with over (13) forms and templates to implement your own IR program. Native MS Word files allow you to customize the IPR for your organization's needs.
Request Now!
Set of (17) Employee Cybersecurity Awareness Courses free of charge. Train your employees how not to fall victim and to protect both themselves and the organization from bad actors! Native PowerPoint file format to use as your own...
Request Now!
Subscribe to our newsletter to keep you updated on the latest cybersecurity insights & resources.
One follow-up from a security expert—no spam, ever.