CIS launches Commercial Cloud MDR, Powered by Sophos, to protect SLTT government organizations
Investigate incidents in real time, quickly neutralize active threats, and prevent repeat attacks.
Here’s another whistleblower suit recently filed. Ashley Capoot reports: Alphabet’s health tech subsidiary, Verily, used the health data of more than 25,000 patients without authorization and actively covered up those violations, a former company executive alleges. The executive, Ryan Sloan, claims Verily fired him after he discovered breaches of the Health Insurance Portability and Accountability Act, or……
The GSM Association (GSMA) has formally announced support for end-to-end encryption (E2EE) for securing messages sent via the Rich Communications Services (RCS) protocol, bringing much-needed security protections to cross-platform messages shared between Android and iOS platforms. To that end, the new GSMA specifications for RCS include E2EE based on the Messaging Layer Security (MLS) protocol
Cybersecurity researchers have discovered what they said is the first known malicious Microsoft Outlook add-in detected in the wild. In this unusual supply chain attack detailed by Koi Security, an unknown attacker claimed the domain associated with a now-abandoned legitimate add-in to serve a fake Microsoft login page, stealing over 4,000 credentials in the process….
Canadian organizations have emerged as the focus of a targeted cyber campaign orchestrated by a threat activity cluster known as STAC6565. Cybersecurity company Sophos said it investigated almost 40 intrusions linked to the threat actor between February 2024 and August 2025. The campaign is assessed with high confidence to share overlaps with a hacking group…
Isaac Callan and Colin D’Mello report that Ontario’s health minister is ordering atHome, a provincial agency, to immediately notify approximately 200,000 patients whose data may have been breached in a vendor’s cyberattack in March. There appears to have been a breakdown in what should have happened, as the Health Minister reported that atHome had failed…
The holiday season compresses risk into a short, high-stakes window. Systems run hot, teams run lean, and attackers time automated campaigns to get maximum return. Multiple industry threat reports show that bot-driven fraud, credential stuffing and account takeover attempts intensify around peak shopping events, especially the weeks around Black Friday and Christmas. Why holiday peaks