News (2)

Image of a lock.

1 min read

Linux malware campaign exploits malicious RAR filenames

Linux users are being targeted by a novel phishing campaign that uses malicious filenames in RAR archives to install the open-source VShell backdoor...

Read More
Image of colored pixels floating.

2 min read

Akron Children’s Hospital reaches settlement over meta pixel data sharing claims

A class action lawsuit over unauthorized data sharing through web tracking tools has led to a settlement impacting over 313,000 individuals.

Read More
colorado state capitol

2 min read

Colorado enacts Senate Bill 25-276 with new requirements for healthcare

Colorado has enacted Senate Bill 25-276, establishing new requirements for healthcare facilities that receive state funding, including restrictions...

Read More
aflac logo

2 min read

Senators press Aflac for details after June cyberattack

Aflac is under pressure from U.S. lawmakers to disclose more about a data breach that compromised personal and health information.

Read More
Image of a physical database.

2 min read

Scraping service claims access to 1.8 billion Discord messages

A new Discord-focused scraping tool claims to index billions of user messages, voice chats, and files for sale on a popular leak forum.

Read More
floating digital law icons over laptop

3 min read

Texas enacts Senate Bill 1188, regulating AI

Texas enacted S.B. 1188 on June 20, joining only a handful of states that regulate artificial intelligence and data offshoring restrictions directly....

Read More
Image of a lock.

2 min read

CISA 2015 expiration could leave healthcare facilities exposed

The Cybersecurity Information Sharing Act of 2015expires on September 30, 2025, potentially removing legal protections that enable healthcare...

Read More
Image of a gavel.

2 min read

Federal ruling vacates HIPAA Reproductive Healthcare Rule 

On August 15, 2025, the City of Columbus, Ohio, the City of Madison, Wisconsin, and Doctors for America filed a Notice of Appeal in the case Carmen...

Read More
Image of a hooded person sitting behind a computer.

2 min read

Hackers use innocent-looking shortcuts to deliver stealthy malware

Cybersecurity teams are warning Windows users of a new wave of infections delivered through deceptive LNK files that appear harmless but silently...

Read More
Image of someone typing on a laptop.

2 min read

Hackers turn Cisco Safe Links into a phishing weapon

Attackers are exploiting Cisco’s reputational trust, weaponizing Safe Links to disguise phishing attacks. The result is malicious links passing deep...

Read More
security lock with money symbol

2 min read

Ulster County faces fallout after major employee data breach

In August 2024, the Alera Group, the company responsible for administering healthcare benefits for Ulster County government employees, experienced a...

Read More
Image of someone on a laptop.

2 min read

Study finds cybersecurity training fails to reduce phishing risks

An eight-month study at a U.S. healthcare organization shows that traditional training has little effect on stopping phishing attacks.

Read More
microsoft building exterior

2 min read

Hackers exploit Microsoft ADFS to steal logins through legitimate redirects

Cybercriminals have developed a phishing technique that uses legitimate Microsoft Office.com links combined with Active Directory Federation Services...

Read More