admin

admin

Five Eyes Issues Guidance for Securing Edge Devices

Network Firewalls, Network Access Control, Security Operations Guidance Aimed at Enhancing Rapid Compromise Detection for Enterprises Akshaya Asokan (asokan_akshaya) • February 5, 2025 Image: Shutterstock In a significant move to bolster cybersecurity, the Five Eyes intelligence coalition has released a…

Unauthorized Disclosure of PHI by State for Research Purposes

Data Governance, Data Privacy, Data Security Lawsuit Alleges Retaliation Against Whistleblower in Rhode Island Health Information Exchange Case Marianne Kolbasuk McGee (HealthInfoSec) • February 5, 2025 A federal lawsuit filed against Rhode Island Quality Institute claims the Health Information Exchange…

Collection of Bank Trojans Swindles Citizens in East India

Widespread Banking Fraud Targets Indian Consumers Through Malicious Apps A recent wave of fraudulent banking applications has emerged in India, successfully imitating reputable financial institutions to siphon off sensitive user credentials and defraud unsuspecting victims. This orchestrated campaign, which has…