
Akari Saito
Encryption & Privacy ConsultantA recent incident involving electronic health records (EHR) at dozens of Community Health Systems (CHS) facilities exposed a significant vulnerability in healthcare's technological reliance. This series of EHR outages was traced back to an accidental deletion of a database by engineers from Cerner, a service under Oracle Health. The fallout from
Digital tools have revolutionized healthcare by offering groundbreaking ways to enhance patient services and operational efficiencies. However, as healthcare organizations increasingly rely on technology for analytics and marketing, they face a burgeoning challenge: protecting sensitive health data. Recent high-profile data breaches underscore the
In today's digital landscape, a computer's webcam is an indispensable tool for virtual meetings, keeping in touch with loved ones, and more. However, this device can also serve as a gateway for cyber intrusions if not adequately secured. The concern is not merely theoretical; unauthorized access to computer cameras, known as "CamFecting," is a
Mac users often believe their devices are less vulnerable to malware and cyber threats compared to Windows systems, partially due to the historically lower incidence of attacks on Mac. However, the increasing sophistication of cybercriminals, coupled with a growing number of malware and virus strains specifically targeting macOS, makes having
A significant cyberattack on January 13 compromised Conduent Inc., a company specializing in government payment technology for social services and transit systems. This breach resulted in the exfiltration of substantial personal data affecting a considerable number of individuals. Information leaked in an April 14 regulatory filing with the
Hertz, a leading American car rental company, has suffered a substantial data breach impacting customers globally. This breach results from the exploitation of Cleo zero-day vulnerabilities by a ransomware group. These vulnerabilities were exploited in October and December of last year, leading to unauthorized data acquisition confirmed in





