Defending the future: Our commitment to responsible AI in cybersecurity
Combining advanced technologies with human expertise to defend against evolving threats.
Stephen Marcantel reports that Acadian Ambulance is seeking dismissal of a class-action lawsuit stemming from a ransomware attack in 2024 by Daixin Team. Acadian is claiming there is no proof that any patient has experienced any actual harm from the breach. The lawsuit, which was consolidated from 10 other class actions, claims that the July…
Farid Farid reports: A man has been charged with hacking Australia’s largest online court-filing system, but authorities believe the cyber crime hasn’t compromised any personal data. […] “NSW Police Cybercrime Squad detectives have laid charges in relation to last month’s serious data breach involving the Department of Communities and Justice,” Police Minister Yasmin Catley said…
Episource, LLC, is a business associate that provides healthcare technology and solutions, specializing in medical coding, risk adjustment, and data analytics for health plans and providers. On February 6, anomalous activity in their system alerted Episource to a potential attack. In response, they shut down computer systems, initiated an investigation, called in a special team,…
Note: In 2019, when USR Holdings disclosed this breach to affected patients, they did not mention that ePHI had been deleted. So in 2025, we are first learning of this part of the breach? The following is HHS OCR’s press release today. Settlement resolves multiple Security Rule failures Today, the U.S. Department of Health and…
GitGuardian’s State of Secrets Sprawl report for 2025 reveals the alarming scale of secrets exposure in modern software environments. Driving this is the rapid growth of non-human identities (NHIs), which have been outnumbering human users for years. We need to get ahead of it and prepare security measures and governance for these machine identities as…
A dataset used to train large language models (LLMs) has been found to contain nearly 12,000 live secrets, which allow for successful authentication. The findings once again highlight how hard-coded credentials pose a severe security risk to users and organizations alike, not to mention compounding the problem when LLMs end up suggesting insecure coding practices…