2 min read
Hackers exploit Microsoft Teams in social engineering attack
Cybercriminals manipulate victims through Microsoft Teams, to gain remote access via AnyDesk and deploy malware.
2 min read
Cybercriminals manipulate victims through Microsoft Teams, to gain remote access via AnyDesk and deploy malware.
1 min read
The HHS and DEA introduced new rules to expand telemedicine prescribing of controlled substances, including a final rule allowing practitioners to...
2 min read
Social engineering attacks targeting the healthcare and public health (HPH) sector are becoming more sophisticated by using psychological...
2 min read
Cybercriminals are exploiting a flaw in iMessage's phishing protection, tricking users into disabling safeguards and falling for smishing attacks.
3 min read
Hospital cyberattacks are no longer just IT threats—they're putting lives at risk. A new report reveals that disruptions from ransomware and other...
2 min read
The Office for Civil Rights (OCR) conducts HIPAA audits as a part of its health information privacy, security, and breach notification compliance...
2 min read
Discrimination in AI is the unfair or unequal treatment of individuals or groups by AI systems, often stemming from biases in data or algorithmic...
1 min read
Apple has quietly rolled out a feature called Enhanced Visual Search, which uses AI to identify landmarks in photos stored on iOS and macOS devices....
3 min read
The HHS Office for Civil Rights reflects on a year of advancing healthcare equity and civil rights through rule updates, enforcement actions, and...
3 min read
According to the American Hospital Association (AHA), healthcare cybersecurity is under unprecedented strain in 2024, with 386 breaches reported so...
1 min read
The attack is estimated to impact hundreds of companies and millions of smartphone users.
2 min read
The Department of Health and Human Services (HHS) enforces HIPAA regulations, with the Office for Civil Rights (OCR) leading these efforts. The OCR...
2 min read
Massive HIPAA settlements reveal common missteps in healthcare cybersecurity and offer valuable lessons for protecting sensitive patient data.