Image of a phone home screen and a screen with various apps.

2 min read

Governments expose Android apps used as spyware

Western governments exposed over 100 Android apps used to surveil groups deemed a threat to China’s state interests.

Read More
Is Adobe Experience Platform HIPAA compliant? (2025 update)

1 min read

Is Adobe Experience Platform HIPAA compliant? (2025 update)

Based on our research, Adobe Experience Platform is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of...

Read More
Is Looker HIPAA compliant? (2025 update)

2 min read

Is Looker HIPAA compliant? (2025 update)

Based on our research, Looker is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...

Read More
red security lock

2 min read

Europcar GitLab breach exposes up to 200,000 customer records

What happened A hacker breached the GitLab repositories of Europcar Mobility Group, gaining access to application source code and customer...

Read More
Is Viva Engage HIPAA compliant? (2025 update)

2 min read

Is Viva Engage HIPAA compliant? (2025 update)

Based on our research, Viva Engage, previously Yammer, is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and...

Read More
Is Heroku HIPAA compliant? (2025 update)

1 min read

Is Heroku HIPAA compliant? (2025 update)

Based on our research, Heroku is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...

Read More
Image of an empty court room.

2 min read

New York woman sentenced for criminal HIPAA violation

A New York woman was sentenced to probation after mailing stolen health records as part of an extortion attempt.

Read More
Image of female and male symbols.

2 min read

Sensitive info spilled in sperm bank breach

California Cryobank has reported a data breach that may have exposed sensitive customer and financial information.

Read More
Image of child using a toy.

5 min read

HIPAA compliant messaging for early autism intervention programs

Early intervention helps children with autism spectrum disorder (ASD) develop communication skills, improve social interactions, and make progress in...

Read More
Image of a man with a hoody on a laptop.

5 min read

What is an enumeration attack?

An enumeration attack is a method used by hackers to confirm and verify records stored on a web server using brute-force techniques. These attacks...

Read More
Image of a hand hovering over a document with a gavel and hammer nearby.

2 min read

HISAA: A proposed overhaul to healthcare cybersecurity

A proposed bipartisan bill, HISAA, tries to enforce mandatory cybersecurity standards in healthcare, replacing HIPAA’s voluntary safeguards to better...

Read More
Image of lock.

5 min read

Top healthcare cybersecurity concerns for 2025

The healthcare industry is more digitally connected than ever, handling vast amounts of sensitive patient data while relying on complex systems to...

Read More
Image of classroom.

2 min read

PowerSchool data breach investigation reveals earlier hacks

PowerSchool’s long-awaited breach report reveals hackers infiltrated its systems months before the December 2024 attack.

Read More