Image of WiFi symbol for blog about Russian hackers exploit WiFi to breach US firm using nearest-neighbor attack

2 min read

Russian hackers exploit WiFi using nearest-neighbor attack

Russian hackers used a ‘nearest-neighbor attack’ through WiFi to breach a US company, trying to infiltrate Ukraine-related projects.

Read More
Image of vaccine and needle for blog about Social media HIPAA violation series: Texas Children's Hospital - Vaccination controversy

2 min read

Social media HIPAA violations: Texas Hospital vaccination controversy

A nurse’s social media post about a pediatric measles patient led to her termination and showcased the risks of sharing patient information online.

Read More
Image of lock for blog about What is a threat intelligence platform?  

5 min read

What is a threat intelligence platform?

Cyber threat actors are constantly developing new tools and techniques to bypass existing defenses, putting organizations at risk of security...

Read More
Image of cloud for blog about How hackers are using AI to steal healthcare data

4 min read

How hackers are using AI to steal healthcare data

Research on Artificial Intelligence in Healthcare and Education defines AI as computer systems that can perform tasks that usually require human...

Read More
Image of elderly person holding hands with younger person for blog about Social media HIPAA violation series: Glenview Nursing Home and videos

2 min read

Social media HIPAA violation series: Glenview Nursing Home and videos

A Snapchat video of employees taunting a dementia patient led to a lawsuit against Glenview Nursing Home for violating patient privacy and abuse...

Read More
Image of stars and person on phone to signal writing a review for a blog about Social media HIPAA violation series: Elite Dental Associates - Yelp review 

2 min read

Social media HIPAA violation series: Elite Dental Associates and Yelp 

A dental practice’s response to a Yelp review led to a $10,000 HIPAA fine and showed the risks of disclosing patient information online.

Read More
bug on keyboard

3 min read

Understanding next-generation antivirus

According to Crowdstrike, “Next-Generation Antivirus (NGAV) uses a combination of artificial intelligence, behavioral detection, machine learning...

Read More
Image of person in a hoody in a computer for blog about Hackers use SVG attachments for phishing and malware delivery

2 min read

Hackers use SVG attachments for phishing and malware delivery

Threat actors exploit SVG attachments to bypass security tools, delivering phishing forms and malware with alarming effectiveness.

Read More
hot topic logo

2 min read

Hot Topic data breach exposes personal information of over 50 million

What happened A data breach affecting Hot Topic and related retailers Torrid and BoxLunch has reportedly exposed the personal information of...

Read More
laptop in a healthcare environment

2 min read

What is healthcare data security?

Healthcare data security safeguards sensitive information, ensuring the privacy and integrity of patient records, and protecting healthcare...

Read More
Image of phone for blog about Social media HIPAA violation series: Citadel Winston-Salem - Tiktok missteps

2 min read

Social media HIPAA violations: Citadel Winston-Salem and Tiktok

A nurse’s TikTok videos joking about mistreating patients led to a suspension and sparked debate about professionalism and social media use in...

Read More
HHS logo

2 min read

Watchdog report finds gaps in HHS cybersecurity policies

GAO report reveals gaps in HHS cybersecurity policies, raising concerns about the healthcare sector's preparedness against cyber threats.

Read More
email icons on red background

1 min read

Study: 80% of organizations faced email breaches in the last year

A recent study reveals that 80% of critical infrastructure organizations fell victim to email-related security breaches last year.

Read More