Image of a shield.

2 min read

US broadband industry launches strike initiative to combat infrastructure attacks

The US broadband industry launched the Strategic Threat Response and Infrastructure Knowledge Exchange (Strike) to address escalating criminal attacks on broadband infrastructure that leave emergency services offline and disrupt hospitals, law...

Read More
Image of the Congress building.

3 min read

Congress advances Wimwig Act to replace expiring cyber intelligence law

Congress advances the Widespread Information Management for the Welfare of Infrastructure and Government (Wimwig) Act to replace the Obama-era...

Read More
salesforce logo

2 min read

Google suffers data breach in ongoing Salesforce data theft attacks

Google became the latest victim in an ongoing wave of Salesforce CRM data theft attacks conducted by the ShinyHunters extortion group, with one of...

Read More
Image of a brain that is half machine and half normal.

3 min read

Troy Health enters non-prosecution agreement for AI-enabled medicare fraud

Troy Health, Inc., a North Carolina-based Medicare provider, entered a non-prosecution agreement with the Department of Justice after admitting to...

Read More
colorado state capitol

2 min read

Colorado enacts Senate Bill 25-276 with new requirements for healthcare

Colorado has enacted Senate Bill 25-276, establishing new requirements for healthcare facilities that receive state funding, including restrictions...

Read More
floating digital law icons over laptop

3 min read

Texas enacts Senate Bill 1188, regulating AI

Texas enacted S.B. 1188 on June 20, joining only a handful of states that regulate artificial intelligence and data offshoring restrictions directly....

Read More
Image of a lock.

2 min read

CISA 2015 expiration could leave healthcare facilities exposed

The Cybersecurity Information Sharing Act of 2015expires on September 30, 2025, potentially removing legal protections that enable healthcare...

Read More
microsoft building exterior

2 min read

Hackers exploit Microsoft ADFS to steal logins through legitimate redirects

Cybercriminals have developed a phishing technique that uses legitimate Microsoft Office.com links combined with Active Directory Federation Services...

Read More
whatsapp logo on phone

2 min read

WhatsApp adds new security feature to protect against scams

WhatsApp introduces a new security feature that displays a "safety overview" context card to help users identify potential scams when added to group...

Read More
Image of a judge striking a gavel.

2 min read

Jury finds Meta liable in reproductive health data case

A California jury found Meta violated state privacy laws when it collected reproductive health data from the Flo Health period tracking app and used...

Read More
Image of the Google browser opened on a laptop.

7 min read

What is Google's rural healthcare cybersecurity initiative?

Rural hospitals across America face a cybersecurity crisis that may be a threat to operations and patient safety.As noted by Google, "Cyberattacks on...

Read More
Image of a shield with a keyhole in it.

2 min read

HHS issues new HIPAA privacy rule FAQs 

The U.S. Department of Health and Human Services Office for Civil Rights issued new and updated Frequently Asked Questionsinterpreting the HIPAA...

Read More
Image of someone on a laptop.

2 min read

ReVault flaws let hackers bypass Windows login on Dell laptops

Five firmware vulnerabilities dubbed "ReVault" affecting over 100 Dell laptop models allow attackers to bypass Windows login and install persistent...

Read More