Member

The information provided in the report is pulled from threat actor data leak sites ‘as is,’ meaning, it is shared as it has been posted by the threat group. They have been known to make mistakes, have typos, mis-name victims, or use other language aside from the victim name.
The information provided in the report is pulled from threat actor data leak sites ‘as is,’ meaning, it is shared as it has been posted by the threat group. They have been known to make mistakes, have typos, mis-name victims, or use other language aside from the victim name.
This month, the Centers for Medicare & Medicaid Services (CMS) will refresh the Overall Hospital Quality Star Ratings (Overall Star Rating) on its Care Compare website, the second update since the agency overhauled the methodology in 2020. This year’s refresh will incorporate data from 2021…
In an abrupt change of heart, Microsoft reverts to its original operational security (OPSEC) policy of disabling Office Macros by default.
We share the report for recipient awareness. Often times, a victim may be a supplier or have another third or fourth party relationship with recipients. We hope that recipients look for those relationships and then are able to inquire directly as may be appropriate with the supposed victim.
The information provided in the report is pulled from threat actor data leak sites ‘as is,’ meaning, it is shared as it has been posted by the threat group. They have been known to make mistakes, have typos, mis-name…
The CMS and ASPE draft unified payment model for the four post-acute care (PAC) settings contains numerous fundamental flaws which render it unworkable for both patients and providers.
The Centers for Medicare & Medicaid Services (CMS) July 7 issued a proposed rule that would update physician fee schedule (PFS) payments for calendar year (CY) 2023. The rule also includes proposals related to the Medicare Shared Savings Program and the Quality Payment Program (QPP), both of…
On July 7, 2022, Microsoft announced that VBA macros will be enabled on default, overturning its previous decision to disable them.
The information provided in the report is pulled from threat actor data leak sites ‘as is,’ meaning, it is shared as it has been posted by the threat group. They have been known to make mistakes, have typos, mis-name victims, or use other language aside from the victim name