Latest news with #AdamBennett
Yahoo
7 days ago
- Business
- Yahoo
MLPS adopts ImageTrend Platform for improved patient care
Middlesex-London Paramedic Service (MLPS) in Canada has adopted the ImageTrend Platform to enhance patient care and align with Ontario's documentation standards. This strategic move aims to improve clinical documentation and provide deeper insights into operational performance. With the Ontario-compliant platform, MLPS will be able to streamline data collection, enhance reporting consistency, and access real-time analytics. These capabilities are crucial for operational decision-making and advancing system-wide quality initiatives. MLPS paramedic services director Adam Bennett said: 'After a thorough evaluation, we believe ImageTrend offers the right combination of innovation and support to meet the unique needs of MLPS. We're looking forward to building a successful partnership.' MLPS is now part of a rising number of Ontario paramedic services utilising ImageTrend's integrated solution, which complies with the Ontario Ambulance Documentation Standards (OADS v4.0). Set by the Ministry of Health this year, these standards dictate the documentation, submission, and application of ambulance call reports for quality improvement. ImageTrend president and CEO Patrick Sheahan said: 'Partnering with MLPS builds on our commitment to helping Canadian paramedic services document care efficiently and put their data to work. 'We look forward to supporting their team with a platform designed to meet today's needs and adapt to what's next.' MLPS serves as a paramedic service provider for Middlesex County and the City of London, operating from 13 stations with over 450 professionals. In May this year, ImageTrend expanded its reach in Canada through a partnership with Airmedic, enhancing aeromedical responses in Québec. In February, the St Charles County Ambulance District in Missouri began using ImageTrend's ePCR and Billing Bridge software. "MLPS adopts ImageTrend Platform for improved patient care" was originally created and published by Hospital Management, a GlobalData owned brand. The information on this site has been included in good faith for general informational purposes only. It is not intended to amount to advice on which you should rely, and we give no representation, warranty or guarantee, whether express or implied as to its accuracy or completeness. You must obtain professional or specialist advice before taking, or refraining from, any action on the basis of the content on our site. Error in retrieving data Sign in to access your portfolio Error in retrieving data Error in retrieving data Error in retrieving data Error in retrieving data


Cision Canada
01-08-2025
- Business
- Cision Canada
Middlesex-London Paramedic Service Selects ImageTrend Platform to Enhance Documentation and Data Insights
EAGAN, Minn., Aug. 1, 2025 /CNW/ -- Middlesex-London Paramedic Service (MLPS) has selected the ImageTrend Platform to support its ongoing efforts to improve patient care, streamline clinical documentation, and gain deeper insights into operational and system performance. By adopting ImageTrend's connected, Ontario-compliant solution, the agency is laying the foundation for better decision-making, enhanced visibility, and stronger data alignment with provincial standards. The ImageTrend Platform will help MLPS simplify data collection in the field, improve the consistency of reporting, and unlock real-time analytics to support operational decisions and system-wide quality initiatives. "After a thorough evaluation, we believe ImageTrend offers the right combination of innovation and support to meet the unique needs of MLPS. We're looking forward to building a successful partnership," said Adam Bennett, Director of Paramedic Services from Middlesex-London Paramedic Service. MLPS joins a growing number of paramedic services across Ontario that are leveraging ImageTrend's all-in-one platform to meet the Ontario Ambulance Documentation Standards (OADS v4.0), introduced by the Ministry of Health in 2025. These standards define how ambulance call reports are documented, submitted, and used to drive quality improvement efforts. "Partnering with MLPS builds on our commitment to helping Canadian paramedic services document care efficiently and put their data to work," said Patrick Sheahan, President and CEO of ImageTrend. "We look forward to supporting their team with a platform designed to meet today's needs and adapt to what's next." To learn more about ImageTrend's EMS and data intelligence solutions, visit About Middlesex-London Paramedic Service (MLPS) MLPS is the direct provider of paramedic services for the County of Middlesex and the City of London. MLPS operates from 13 strategically located stations providing 24-hour pre-hospital emergency and non-emergency care to the residents and visitors of Middlesex County and the City of London. MLPS Headquarters, located at 1035 Adelaide Street South, London, Ontario oversees over 450 highly trained professionals including Paramedics, Supervisors, Logistics Technicians, Quality and Investigations Professionals, Management, Educational and Administrative Support Staff. About ImageTrend ImageTrend transforms incident data into actionable intelligence, empowering frontline teams to effectively manage surging demands and resource constraints, driving impactful change in the communities it supports. Founded in 1998, the company serves more than 3,100 customers including 20,000 agencies across Fire, Emergency Medical Services, and Hospital segments. With its deep industry knowledge and advanced data analytics capabilities, the software provider helps its customers streamline operations, shape long-term strategies, and dramatically improve outcomes. Its comprehensive software solutions and dedicated team provide the confidence and intelligence first providers need to tackle today's challenges and prepare for tomorrow's uncertainties.


BBC News
13-07-2025
- Business
- BBC News
'Run-down' Salisbury Cathedral Hotel to be converted into roof top bar
A Grade-II listed building is set to be converted into a five-star hotel with a roof top for the former Cathedral Hotel in Salisbury, Wiltshire, include 13 rooms, an al-fresco restaurant and a recreation of a historic façade on Milford "run-down" building, which has been vacant since 2022, is due to reopen in Currie, owner of the site, said: "The hotel will be a unique destination which will make a major contribution to the tourism sector and the economic future of the city." It is the first proposal to be approved amid the city's Skyline Policy, which limits the construction of new developments higher than 40ft (12.2m).The building already stands at 53ft (16.1m), but will be 3ft (0.9m) shorter after the redevelopment. The Spitfire Sky Bar, which is inspired by Mr Currie's parents who met in the city while making components for the fighter during World War Two, will offer panoramic views of landmarks across the Bennett, the planning director representing Mr Currie, said the development would be "transformative" for the city."It will not only bring back into use a vacant and run-down Grade-II listed building, but deliver for local people and visitors to Salisbury alike the chance to see and experience this historic city in an entirely new way, from a roof top perspective, and better reveal its numerous heritage assets," he added.


Techday NZ
22-04-2025
- Business
- Techday NZ
SureStack unveils AI platform for real-time cyber defence
SureStack has introduced an AI-based cybersecurity platform aimed at helping organisations optimise and validate their cybersecurity stacks in real time. The platform is built on SureStack's patent-pending "Resilient Intelligence" technology and combines Generative AI, human expertise, and real-time environment analysis. According to the company, this integration is intended to assist security teams in identifying misconfigurations and vulnerabilities that can leave systems open to cyber attacks, while also maximising the efficacy of investments in cybersecurity tools. Adam Bennett, Co-Founder and Chief Executive Officer of SureStack, said: "Misconfigurations and vulnerabilities inherent in security tools are one of the leading vectors of cyber attacks, and today's cybersecurity teams are overwhelmed, with even well-funded organisations continuing to suffer incidents and breaches. SureStack was built to help defenders reclaim control — ensuring that every tool in their security stack is properly configured, continuously validated, up-to-date, and working optimally to protect from cyber attacks." Elaborating on the value proposition, Austin Hochstedler, Co-Founder and Chief Technology Officer of SureStack, stated: "Building a good security stack isn't enough — you need to constantly verify that it's still protecting you as the environment and cyber threats evolve. SureStack delivers real-time visibility into live configurations and vulnerabilities, giving security teams the clarity they need to stay ahead of attackers and focus their efforts where they can do the most good." SureStack integrates with a range of existing cybersecurity tools used by organisations, including firewalls, endpoint protection, authentication services, Security Information and Event Management (SIEM), ticketing systems, email security, and vulnerability management solutions. The system continuously monitors configurations for deviations, misconfigurations, vulnerabilities, and security gaps, delivering alerts and updates through its dashboard interface. Integration partners at launch include CrowdStrike, Fortinet, Palo Alto, Sonic Wall, and Trellix. The company has indicated that additional integrations are in development. The platform's features include StackChat, an AI-powered cybersecurity assistant designed to support users in real time. StackChat allows security professionals to query live environments, troubleshoot problems, and access information about deployed tools, configurations, and policies. SureStack says that by providing a unified knowledge base, StackChat helps decrease training periods, improve operational efficiency, and support faster resolution of issues. Other capabilities within SureStack comprise real-time validation of stacks against known threats and vulnerabilities, daily monitoring of external threat landscapes for new vulnerabilities related to the user's security stack, and regular data collection from sources such as security vendor websites, the National Institute of Standards and Technology (NIST), and vulnerability databases. An automated grading system is also included to help defenders identify priorities and act on the changes that could most quickly reduce risk. The platform also enables adversarial attack simulations, validating whether current configurations would mitigate common threat tactics and vulnerabilities, referencing the MITRE ATT&CK framework as a benchmark. SureStack provisions each customer with a private tenant and provides several deployment and hosting options. Organisations with strict compliance or sovereignty needs can choose self-hosted environments. The service is available with tiered pricing structures catering to managed service providers (MSPs), managed security service providers (MSSPs), mid-sized organisations, large enterprises, and government bodies. The founding team at SureStack brings experience from sectors including defence, intelligence, healthcare, and financial services. Insights from defending high-target environments are embedded in the platform's methodology.

Associated Press
03-04-2025
- Business
- Associated Press
Red Piranha Shuts Down Ransomware Gang Targeting Australian Legal Sector
Red Piranha has delivered a decisive blow to one of the most advanced phishing campaigns ever detected in the Australian legal sector. 'This takedown highlights the importance of having advanced threat detection and response capabilities embedded at every layer of defence.' — Adam Bennett, CEO of Red Piranha MELBOURNE, VICTORIA, AUSTRALIA, April 3, 2025 / / -- Red Piranha, Australia's leading cybersecurity company and creator of the Crystal Eye Unified Threat Management platform, has delivered a decisive blow to one of the most advanced phishing campaigns ever detected in the Australian legal sector. The target? A shadowy cybercrime group called SAIGA, which had quietly been breaching Australian legal firms using phishing-as-a-service (PaaS) kits, adversary-in-the-middle (AiTM) proxy attacks, and MFA-bypass techniques to infiltrate Microsoft Office 365 environments. 'Threat actors are becoming increasingly sophisticated, deploying adversary-in-the-middle (AiTM) phishing kits capable of defeating MFA and EDR solutions,' said Adam Bennett, CEO of Red Piranha. 'This takedown highlights the importance of having advanced threat detection and response capabilities embedded at every layer of defence.' The takedown marks a significant milestone in the fight against phishing-as-a-service (PaaS) operations and ransomware attacks and highlights Red Piranha's leadership in threat detection, investigation, and response. Inside the SAIGA Group's Phishing Campaign In February 2025, Red Piranha's security threat research team uncovered what would become one of the most significant investigations of the year so far. It began with what appeared to be a routine email phishing attempt targeting a legal office associated with one of the Red Piranha clients. But this wasn't just another scam. It was the gateway to an expensive, previously undetected cybercrime operation run by a group known as SAIGA. As Red Piranha security team dug deeper, they quickly realized that they had stumbled onto a sprawling Phishing-as-a-Service (PaaS) ecosystem one far more advanced, organized, and dangerous. The email that triggered the investigation was alarmingly convincing. It replicated the company's branding, featuring real employee signatures and a fake 'View Documents' link that redirected victims to a fraudulent Google Sites page. From there, users were lured into a cloned Microsoft 365 login screen, built using a sophisticated Adversary-in-the-Middle (AiTM) phishing kit. The moment a user entered their email address, the phishing kit sprang into action verifying credentials in real time against Microsoft servers, pulling in company logos, and harvesting cookies and session tokens. The stolen data, including email addresses, passwords, session cookies, and even network information, was immediately pushed to Telegram bots controlled by SAIGA operators. This was no smash-and-grab it was a fully operational credential interception machine, designed for persistence and scale. The phishing infrastructure was found to be part of a broader campaign orchestrated by SAIGA Group, a ransomware-as-a-service (RaaS) and financial crime syndicate operating largely via Telegram. The group offered high-priced phishing kits and services to criminal clients worldwide. Their phishing kits included real-time credential validation, proxy login mechanisms, and tools for long-term access and lateral movement within compromised environments. Red Piranha's security investigation revealed a vast and active criminal infrastructure: 123 phishing domains used in active campaigns 70 Telegram bots delivering stolen data to threat operators Over 8,000 compromised credentials harvested from legal and professional email systems Extensive use of AiTM tactics to bypass MFA Real-time credential validation via proxied logins to Microsoft servers SAIGA's phishing pages were supported by a backend built on Evilginx, customized with Telegram-based alerting and integrated cookie theft for persistent access. The operation's infrastructure included C2 servers, phishing dashboards, and obfuscated code to avoid detection. Through advanced threat hunting and OSINT, Red Piranha was able to uncover connections between Telegram usernames, bot tokens, and server-side configurations, mapping out the full extent of the SAIGA campaign. Dismantling the Threat Actor SAIGA Armed with this intelligence, Red Piranha launched a coordinated counteroffensive. Within days of public disclosure, the SAIGA network began to crumble. Their phishing domains stopped resolving or returned API errors. Telegram channels vanished, renamed, or went private. Gitea and GitLab repositories were scrubbed. Even the TikTok account was deleted. The infrastructure that had once delivered stolen data in real time went dark. This wasn't just an investigation it was a dismantling. Red Piranha didn't just discover SAIGA's tools; they exposed its users, disrupted its operations, and shattered its footprint. Beyond the technical win, the investigation sent a clear message to the legal sector: sophisticated phishing campaigns have evolved beyond simple deception. With attackers now bypassing MFA through AiTM tactics and credential hijacking, traditional defences are no longer sufficient. Law firms and high-value industries must adopt real-time Threat Detection, Investigation, and Response (TDIR) capabilities if they hope to stay ahead of modern threat actors. Red Piranha's proactive measures didn't just protect one client, they pre-emptively secured countless others. In line with its role as the sole APAC member of the Cyber Threat Alliance, Red Piranha distributed all Indicators of Compromise (IOCs) including domains, hashes, bot tokens, and IP addresses across its Crystal Eye threat platform and the wider threat intelligence community. By feeding this intelligence directly into its intrusion prevention, DNS sinkholing, and anti-phishing mechanisms, Red Piranha ensured SAIGA's infrastructure could no longer operate undetected. As of March 2025, over 88 criminal users were believed to be operating under SAIGA, with 123 domains and 64 unique usernames linked to the group. Thanks to this investigation, those numbers are no longer growing they're collapsing. What started with a single phishing email evolved into a campaign takedown that reverberated across the cybercrime underworld. Red Piranha exposed not just a phishing kit, but an entire PaaS economy. SAIGA operated in the shadows. Red Piranha turned on the lights. About Red Piranha Red Piranha is an Australian cybersecurity firm specializing in unified threat management and advanced threat intelligence. Its flagship product, Crystal Eye, provides enterprise-grade security to organizations globally, integrating firewall, endpoint protection, threat intelligence, and security orchestration into a single platform. As the only APAC-based member of the Cyber Threat Alliance, Red Piranha collaborates internationally to ensure timely, intelligence-driven cybersecurity outcomes for its clients. Swati Gupta Red Piranha 0402337485 X LinkedIn Instagram YouTube Legal Disclaimer: