Hims Breach Exposes the Most Sensitive Kinds of PHI
Threat actors breached the telehealth brand, and now they may know who’s bald, overweight, and impotent. What could they do with that information?
Threat actors breached the telehealth brand, and now they may know who’s bald, overweight, and impotent. What could they do with that information?
These are the fundamental detection model shifts cybersecurity teams need to make to keep up with the rising number of credential-based attacks.
The US government warns programmable logic controllers are being targeted, and research turns up 179 vulnerable operational technology (OT) devices.
Victims don’t need to match the cybercrime group’s technical sophistication, experts say. But patching and some form of zero trust are now non-negotiable.
Post Content