hacker at computer with digital code and russian flag

3 min read

Why Russia is often linked to ransomware cases

Russia frequently appears in discussions about cyber attacks, and for good reason. The country’s geopolitical climate, legal policies, and thriving cybercriminal networks have made it a focal point for ransomware activity.

Read More
Image of shield for blog about 8 lessons from the Change Healthcare ransomware attack

3 min read

8 lessons from the Change Healthcare ransomware attack

The recent ransomware attack on Change Healthcare, a subsidiary of UnitedHealth Group (UHG), has shown the vulnerabilities in healthcare...

Read More
Image of Word file for blog about New phishing campaign exploits corrupted Word documents

2 min read

New phishing campaign exploits corrupted Word documents

A new phishing campaign uses corrupted Word documents to evade detection and steal credentials.

Read More
hand filling out form with laptop in background

2 min read

HIPAA attestation form introduced to protect reproductive health care data

A new HIPAA attestation form was introduced to bolster privacy protections for reproductive health care data.

Read More
Image of person using touch screen technology for blog about Why AI could fuel more data breaches in healthcare

5 min read

Why AI could fuel more data breaches in healthcare

Healthcare has seen a big rise in data breaches over the past few years, and it's becoming a concern for security professionals and organizations....

Read More
Image of lock for blog about Generative AI creates security challenges while empowering defenses

2 min read

Generative AI creates security challenges while empowering defenses

Generative AI presents a dual challenge: introducing security risks while enhancing defenses with faster threat detection and response.

Read More
representation of hacker surrounded by floating email icons

2 min read

Russia arrests suspected ransomware actor wanted by FBI

Russian authorities arrest a high-profile ransomware suspect wanted by the FBI, spotlighting international tensions over cybercrime enforcement.

Read More
Image of thumbs up and down for blog about Social media HIPAA violation series: Twitter disclosure

2 min read

Social media HIPAA violation series: Twitter disclosure

A patient’s private medical information was shared on Twitter by an unauthorized hospital employee, raising questions about privacy protections and...

Read More
Image of two people holding hands for blog about HIPAA email for end-of-life care

3 min read

HIPAA email for end-of-life care

End-of-life care conversations are important yet sensitive, allowing patients and their families to make informed decisions during difficult times....

Read More
Image of WiFi symbol for blog about Russian hackers exploit WiFi to breach US firm using nearest-neighbor attack

2 min read

Russian hackers exploit WiFi using nearest-neighbor attack

Russian hackers used a ‘nearest-neighbor attack’ through WiFi to breach a US company, trying to infiltrate Ukraine-related projects.

Read More
Image of vaccine and needle for blog about Social media HIPAA violation series: Texas Children's Hospital - Vaccination controversy

2 min read

Social media HIPAA violations: Texas Hospital vaccination controversy

A nurse’s social media post about a pediatric measles patient led to her termination and showcased the risks of sharing patient information online.

Read More
Image of lock for blog about What is a threat intelligence platform?  

5 min read

What is a threat intelligence platform?

Cyber threat actors are constantly developing new tools and techniques to bypass existing defenses, putting organizations at risk of security...

Read More
Image of cloud for blog about How hackers are using AI to steal healthcare data

4 min read

How hackers are using AI to steal healthcare data

Research on Artificial Intelligence in Healthcare and Education defines AI as computer systems that can perform tasks that usually require human...

Read More