2 min read
Sensitive info spilled in sperm bank breach
California Cryobank has reported a data breach that may have exposed sensitive customer and financial information.
Read More2 min read
California Cryobank has reported a data breach that may have exposed sensitive customer and financial information.
Read More1 min read
In March 2025, College Hospital Costa Mesa revealed that a forensic investigation into a 2024 data breach uncovered that additional patients were...
2 min read
Cybersecurity researchers have exposed a sophisticated phishing-as-a-service platform, Morphing Meerkat. This platform dynamically creates fake login...
1 min read
William F Rinehart, DMD, PA, has disclosed a data breach that compromised the sensitive personal and protected health information (PHI) of 25,000...
1 min read
The hacker allegedly combined data from a 2022 breach with data from a 2025 breach.
1 min read
Based on our research, Wrike is HIPAA compliant because it meets the requirements set by the U.S. Department of Health and Human Services (HHS) to...
5 min read
What is cyberbiosecurity? Cyberbiosecurity addresses security risks at the intersection of biological data, medical sciences, and digital...
1 min read
Based on our research, SalesLoft is not HIPAA compliant because it does not meet the requirements set by the U.S. Department of Health and Human...
2 min read
The mobility equipment provider recently announced they were breached in the fall of 2024.
2 min read
Many personal care providers assume that HIPAA doesn’t apply to their organization because of the relaxed or ad-hoc nature of the services they...
4 min read
HIPAA applies to athletic medical staff when they work for covered entities, like hospitals, health centers, or sports medicine clinics that engage...
4 min read
Decision capacity focuses on an individual’s ability to make decisions for themselves. Determining an individual’s capacity is based on criteria of...
4 min read
MFA bypass kits are tools or techniques designed to bypass Multi-Factor Authentication security measures. These kits exploit vulnerabilities in...