Image of lock for blog about Generative AI creates security challenges while empowering defenses

2 min read

Generative AI creates security challenges while empowering defenses

Generative AI presents a dual challenge: introducing security risks while enhancing defenses with faster threat detection and response.

Read More
representation of hacker surrounded by floating email icons

2 min read

Russia arrests suspected ransomware actor wanted by FBI

Russian authorities arrest a high-profile ransomware suspect wanted by the FBI, spotlighting international tensions over cybercrime enforcement.

Read More
Image of thumbs up and down for blog about Social media HIPAA violation series: Twitter disclosure

2 min read

Social media HIPAA violation series: Twitter disclosure

A patient’s private medical information was shared on Twitter by an unauthorized hospital employee, raising questions about privacy protections and...

Read More
Image of two people holding hands for blog about HIPAA email for end-of-life care

3 min read

HIPAA email for end-of-life care

End-of-life care conversations are important yet sensitive, allowing patients and their families to make informed decisions during difficult times....

Read More
Image of WiFi symbol for blog about Russian hackers exploit WiFi to breach US firm using nearest-neighbor attack

2 min read

Russian hackers exploit WiFi using nearest-neighbor attack

Russian hackers used a ‘nearest-neighbor attack’ through WiFi to breach a US company, trying to infiltrate Ukraine-related projects.

Read More
Image of vaccine and needle for blog about Social media HIPAA violation series: Texas Children's Hospital - Vaccination controversy

2 min read

Social media HIPAA violations: Texas Hospital vaccination controversy

A nurse’s social media post about a pediatric measles patient led to her termination and showcased the risks of sharing patient information online.

Read More
Image of lock for blog about What is a threat intelligence platform?  

5 min read

What is a threat intelligence platform?

Cyber threat actors are constantly developing new tools and techniques to bypass existing defenses, putting organizations at risk of security...

Read More
Image of cloud for blog about How hackers are using AI to steal healthcare data

4 min read

How hackers are using AI to steal healthcare data

Research on Artificial Intelligence in Healthcare and Education defines AI as computer systems that can perform tasks that usually require human...

Read More
Image of elderly person holding hands with younger person for blog about Social media HIPAA violation series: Glenview Nursing Home and videos

2 min read

Social media HIPAA violation series: Glenview Nursing Home and videos

A Snapchat video of employees taunting a dementia patient led to a lawsuit against Glenview Nursing Home for violating patient privacy and abuse...

Read More
Image of stars and person on phone to signal writing a review for a blog about Social media HIPAA violation series: Elite Dental Associates - Yelp review 

2 min read

Social media HIPAA violation series: Elite Dental Associates and Yelp 

A dental practice’s response to a Yelp review led to a $10,000 HIPAA fine and showed the risks of disclosing patient information online.

Read More
bug on keyboard

3 min read

Understanding next-generation antivirus

According to Crowdstrike, “Next-Generation Antivirus (NGAV) uses a combination of artificial intelligence, behavioral detection, machine learning...

Read More
Image of person in a hoody in a computer for blog about Hackers use SVG attachments for phishing and malware delivery

2 min read

Hackers use SVG attachments for phishing and malware delivery

Threat actors exploit SVG attachments to bypass security tools, delivering phishing forms and malware with alarming effectiveness.

Read More
hot topic logo

2 min read

Hot Topic data breach exposes personal information of over 50 million

What happened A data breach affecting Hot Topic and related retailers Torrid and BoxLunch has reportedly exposed the personal information of...

Read More