News

Image of a physical database.

2 min read

Scraping service claims access to 1.8 billion Discord messages

A new Discord-focused scraping tool claims to index billions of user messages, voice chats, and files for sale on a popular leak forum.

Read More
floating digital law icons over laptop

3 min read

Texas enacts Senate Bill 1188, regulating AI

Texas enacted S.B. 1188 on June 20, joining only a handful of states that regulate artificial intelligence and data offshoring restrictions directly....

Read More
Image of a lock.

2 min read

CISA 2015 expiration could leave healthcare facilities exposed

The Cybersecurity Information Sharing Act of 2015expires on September 30, 2025, potentially removing legal protections that enable healthcare...

Read More
Image of a gavel.

2 min read

Federal ruling vacates HIPAA Reproductive Healthcare Rule 

On August 15, 2025, the City of Columbus, Ohio, the City of Madison, Wisconsin, and Doctors for America filed a Notice of Appeal in the case Carmen...

Read More
Image of a hooded person sitting behind a computer.

2 min read

Hackers use innocent-looking shortcuts to deliver stealthy malware

Cybersecurity teams are warning Windows users of a new wave of infections delivered through deceptive LNK files that appear harmless but silently...

Read More
Image of someone typing on a laptop.

2 min read

Hackers turn Cisco Safe Links into a phishing weapon

Attackers are exploiting Cisco’s reputational trust, weaponizing Safe Links to disguise phishing attacks. The result is malicious links passing deep...

Read More
security lock with money symbol

2 min read

Ulster County faces fallout after major employee data breach

In August 2024, the Alera Group, the company responsible for administering healthcare benefits for Ulster County government employees, experienced a...

Read More
Image of someone on a laptop.

2 min read

Study finds cybersecurity training fails to reduce phishing risks

An eight-month study at a U.S. healthcare organization shows that traditional training has little effect on stopping phishing attacks.

Read More
microsoft building exterior

2 min read

Hackers exploit Microsoft ADFS to steal logins through legitimate redirects

Cybercriminals have developed a phishing technique that uses legitimate Microsoft Office.com links combined with Active Directory Federation Services...

Read More
Image of a judge striking a gavel.

2 min read

Jury finds Meta liable in reproductive health data case

A California jury found Meta violated state privacy laws when it collected reproductive health data from the Flo Health period tracking app and used...

Read More
Image of the Google browser opened on a laptop.

7 min read

What is Google's rural healthcare cybersecurity initiative?

Rural hospitals across America face a cybersecurity crisis that may be a threat to operations and patient safety.As noted by Google, "Cyberattacks on...

Read More
cvs caremark logo

2 min read

CVS Caremark hit with $290 million Medicare fraud penalty

In August 2025, Chief Judge Mitchell Goldberg of the U.S. District Court for the Eastern District of Pennsylvania issued a decisive ruling against...

Read More
Image of a shield with a keyhole in it.

2 min read

HHS issues new HIPAA privacy rule FAQs 

The U.S. Department of Health and Human Services Office for Civil Rights issued new and updated Frequently Asked Questionsinterpreting the HIPAA...

Read More