floating digital law icons over laptop

3 min read

Texas enacts Senate Bill 1188, regulating AI

Texas enacted S.B. 1188 on June 20, joining only a handful of states that regulate artificial intelligence and data offshoring restrictions directly. The law applies to most healthcare providers, all health insurers, and businesses that collect,...

Read More
Image of a lock.

2 min read

CISA 2015 expiration could leave healthcare facilities exposed

The Cybersecurity Information Sharing Act of 2015expires on September 30, 2025, potentially removing legal protections that enable healthcare...

Read More
microsoft building exterior

2 min read

Hackers exploit Microsoft ADFS to steal logins through legitimate redirects

Cybercriminals have developed a phishing technique that uses legitimate Microsoft Office.com links combined with Active Directory Federation Services...

Read More
whatsapp logo on phone

2 min read

WhatsApp adds new security feature to protect against scams

WhatsApp introduces a new security feature that displays a "safety overview" context card to help users identify potential scams when added to group...

Read More
Image of a judge striking a gavel.

2 min read

Jury finds Meta liable in reproductive health data case

A California jury found Meta violated state privacy laws when it collected reproductive health data from the Flo Health period tracking app and used...

Read More
Image of the Google browser opened on a laptop.

7 min read

What is Google's rural healthcare cybersecurity initiative?

Rural hospitals across America face a cybersecurity crisis that may be a threat to operations and patient safety.As noted by Google, "Cyberattacks on...

Read More
Image of a shield with a keyhole in it.

2 min read

HHS issues new HIPAA privacy rule FAQs 

The U.S. Department of Health and Human Services Office for Civil Rights issued new and updated Frequently Asked Questionsinterpreting the HIPAA...

Read More
Image of someone on a laptop.

2 min read

ReVault flaws let hackers bypass Windows login on Dell laptops

Five firmware vulnerabilities dubbed "ReVault" affecting over 100 Dell laptop models allow attackers to bypass Windows login and install persistent...

Read More
Image of an Apple laptop on a desk.

2 min read

Apple fixes new zero-day flaw exploited in targeted attacks

Apple released emergency updates to patch a zero-day vulnerability exploited in what the company described as an "extremely sophisticated attack"...

Read More
computer data with bug text

2 min read

Microsoft pays record $17 million in bug bounties

Microsoft paid a record $17 million to 344 security researchers across 59 countries through its bug bounty program between July 2024 and June 2025,...

Read More
Image of someone on a stretcher near a hospital.

2 min read

EMTALA case highlights emergency care obligations for hospitals

A recent medical malpractice case against Orange County Global Medical Center demonstrates how EMTALA violations can devastate patients and expose...

Read More
Image of congressional chambers.

3 min read

Senators criticize UnitedHealth Group's cybersecurity after Episource breach

U.S. Senators Bill Cassidy and Maggie Hassan sent a letter to UnitedHealth Group CEO Stephen Hemsley expressing concern over a cyberattack targeting...

Read More