Is Outlook Email Encryption HIPAA Compliant? A Complete Guide for 2026
Key Takeaways Outlook can support HIPAA compliance, but only with Microsoft 365 E3 or higher and proper configuration. Standard...
Key Takeaways Outlook can support HIPAA compliance, but only with Microsoft 365 E3 or higher and proper configuration. Standard...
Ravie LakshmananMar 05, 2026Malware / Threat Intelligence A suspected Iran-nexus threat actor has been attributed to a campaign targeting government...
Organizations typically roll out multi-factor authentication (MFA) and assume stolen passwords are no longer enough to access systems. In Windows...
Ravie LakshmananMar 05, 2026Cyber Espionage / Threat Intelligence Cybersecurity researchers have disclosed details of a new Russian cyber campaign that...
Tycoon 2FA, one of the prominent phishing-as-a-service (PhaaS) toolkits that allowed cybercriminals to stage adversary-in-the-middle (AitM) credential harvesting attacks at...
Ravie LakshmananMar 05, 2026Malware / Dark Web A joint law enforcement operation has dismantled LeakBase, one of the world's largest...
The operations of phishing-as-a-service (PhaaS) platform Tycoon 2FA was taken offline this week by the combined effort of law enforcement that includes Europol and other partner agencies, as well...
This post is a companion piece to our presentation at Real World Crypto (RWC) 2026 in Taipei, Taiwan on...
Google uncovers Coruna iOS Exploit Kit targeting iOS 13–17.2.1 Pierluigi Paganini March 05, 2026 Google warns of the Coruna iOS...
Business Security The education sector is notoriously short on cash, but rich in assets for threat actors to target. How...
Introduction to the 4 Pillars in the Quantum Era Honestly, if you're still relying on basic firewalls to protect...
Cisco fixes maximum-severity Secure FMC bugs threatening firewall security Pierluigi Paganini March 04, 2026 Cisco patched two critical Secure FMC...
Automate or orchestrate? Implementing a streamlined remediation program to shorten MTTR Pierluigi Paganini March 04, 2026 Security teams want lower...
When a top cybersecurity firm discovered it had a leak, you would expect the FBI to be called. Instead, the...
What Does NHI Management Mean for Your Enterprise’s Security? How do organizations ensure their digital assets remain secure amidst...