2 min read
Governments expose Android apps used as spyware
Western governments exposed over 100 Android apps used to surveil groups deemed a threat to China’s state interests.
Read More2 min read
Western governments exposed over 100 Android apps used to surveil groups deemed a threat to China’s state interests.
Read More1 min read
Based on our research, Adobe Experience Platform is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of...
2 min read
Based on our research, Looker is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...
2 min read
What happened A hacker breached the GitLab repositories of Europcar Mobility Group, gaining access to application source code and customer...
2 min read
Based on our research, Viva Engage, previously Yammer, is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and...
1 min read
Based on our research, Heroku is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...
2 min read
A New York woman was sentenced to probation after mailing stolen health records as part of an extortion attempt.
2 min read
California Cryobank has reported a data breach that may have exposed sensitive customer and financial information.
5 min read
Early intervention helps children with autism spectrum disorder (ASD) develop communication skills, improve social interactions, and make progress in...
5 min read
An enumeration attack is a method used by hackers to confirm and verify records stored on a web server using brute-force techniques. These attacks...
2 min read
A proposed bipartisan bill, HISAA, tries to enforce mandatory cybersecurity standards in healthcare, replacing HIPAA’s voluntary safeguards to better...
5 min read
The healthcare industry is more digitally connected than ever, handling vast amounts of sensitive patient data while relying on complex systems to...
2 min read
PowerSchool’s long-awaited breach report reveals hackers infiltrated its systems months before the December 2024 attack.