Cybersecurity
Cybersecurity Firm CEO Arrested for Allegedly Installing Malware on Hospital Computers

April 28, 2025 – The CEO of a small cybersecurity firm in Oklahoma has been arrested for allegedly installing malware on computers at St. Anthony Hospital in Oklahoma City, raising serious concerns about the security of healthcare systems. Jeffrey Bowie, head of Veritaco, a company that claims to specialize in cybersecurity and digital forensics, faces charges under Oklahoma’s Computer Crimes Act after reportedly accessing hospital computers without authorization. This incident underscores the growing vulnerability of hospitals to cyber threats, even from those who are supposed to protect them.
According to Cybersecurity News, the incident occurred on August 6, 2024, when Bowie allegedly entered St. Anthony Hospital and accessed two computers, one of which was designated for employee use only. Security camera footage captured him wandering through the hospital, attempting to enter multiple offices before installing malware on the devices. The malware was designed to take screenshots every 20 minutes and transmit them to an external IP address, as reported by Bank Info Security. Bowie was arrested on April 14, 2025, following a forensic investigation by the hospital, which confirmed the breach but found no evidence that patient data was accessed.
Bowie’s actions are particularly alarming given his role as the CEO of Veritaco, a firm that touts itself as a provider of “top-class” cybersecurity and private intelligence services. Campus Safety Magazine notes that when confronted by a hospital employee, Bowie claimed he had a family member in surgery and needed to use the computer—a claim that investigators have not substantiated. The incident has sparked outrage, as hospitals like St. Anthony are critical infrastructure, and any breach can have severe consequences for patient care. This case highlights the risks of insider threats, a growing concern in the healthcare sector, as seen in recent ransomware attacks on hospitals that have disrupted operations and endangered lives.
Details of the Incident and Charges
Here’s a breakdown of the incident and its implications:
- Malware Functionality: The malware took screenshots every 20 minutes and sent them to an external IP address.
- Charges: Bowie faces two counts of violating Oklahoma’s Computer Crimes Act, with potential penalties including fines up to $100,000 and/or 1–10 years in prison for felony convictions.
- Hospital Response: St. Anthony confirmed no patient data was accessed, thanks to immediate action to address the breach.
- Broader Context: The incident reflects the growing vulnerability of healthcare systems to cyber threats, including insider attacks.
The breach at St. Anthony Hospital is particularly concerning given the context of hospital cybersecurity. Security Affairs reports that healthcare facilities are prime targets for cybercriminals due to their wealth of sensitive patient data and often outdated infrastructure. The malware installed by Bowie could have been used for espionage, data theft, or even as a precursor to a larger attack, though the exact motive remains unclear. This incident follows a pattern of malicious insider activity in hospitals, with GB Hackers noting recent cases involving a physical therapist accessing patient records and a pharmacist installing spyware on colleagues’ devices. Such breaches underscore the need for robust security measures, a topic also relevant to AI-driven privacy concerns in other sectors.
St. Anthony Hospital issued a statement emphasizing its commitment to data security: “On August 6, 2024, an unauthorized individual was identified accessing a hospital computer in an alleged attempt to install malware. The protection of data and the integrity of our systems are top priorities. Due to precautions in place, the issue was addressed immediately, and no patient information was accessed,” as quoted by Cybernews. While the hospital’s swift response mitigated potential harm, the incident raises questions about how someone like Bowie, who claims expertise in cybersecurity, could exploit vulnerabilities in a healthcare setting.
The case also highlights the broader implications of insider threats in the cybersecurity industry. Veritaco, which employs 2–10 people and offers services like digital forensics and incident response, is now under scrutiny, with its website offline as of this writing. Bowie’s actions betray the trust that hospitals place in cybersecurity firms to protect their systems, a trust that is critical in an era of increasing cyber threats. This incident could prompt healthcare providers to reevaluate their vendor relationships and strengthen internal security protocols, much like how WhatsApp’s recent privacy updates aim to enhance user protection through features like blocking screenshots.
The arrest of a cybersecurity CEO for such a blatant act of malice serves as a wake-up call for the healthcare industry. Hospitals must invest in better employee training, layered security controls, and frequent system audits to prevent both external and insider threats. The incident also underscores the need for stricter oversight of cybersecurity firms, ensuring they adhere to ethical standards. As the case against Bowie unfolds, it will likely spark broader discussions about accountability in the cybersecurity sector and the measures needed to protect critical infrastructure like hospitals. For those interested in cybersecurity trends, exploring AI’s role in digital safety could provide further context on how technology can both help and hinder security efforts.
What are your thoughts on this alarming breach? How can hospitals better protect themselves from insider threats, especially from those in trusted roles? Share your perspectives in the comments, and let’s discuss the future of cybersecurity in healthcare.
Cybersecurity
Apple Warns iPhone Users to Delete Google Chrome Over Privacy Concerns

April 28, 2025, Cupertino, California – Apple has issued a stark warning to iPhone users, urging them to delete Google Chrome due to significant privacy risks associated with the popular browser. The alert, which highlights Chrome’s tracking practices, comes amid growing tensions between Apple and Google over user data, spotlighting a broader debate about privacy in the tech industry. As consumers become increasingly aware of how their data is handled, Apple’s move could reshape how iPhone users approach online browsing.
According to NY Post, Apple’s warning stems from Chrome’s reliance on third-party cookies, which Google recently decided to retain despite earlier promises to phase them out. These cookies enable advertisers to track users across the web, collecting data on browsing habits, search history, and more. Apple’s advisory specifically targets iPhone users, noting that Chrome’s settings on iOS do not allow users to disable these cookies, leaving them vulnerable to invasive tracking. This issue is particularly concerning given the rise of AI-driven privacy concerns, as companies increasingly use advanced technologies to collect and analyze user data.
Apple has long positioned itself as a champion of user privacy, often contrasting its approach with Google’s ad-driven business model. Forbes reports that Apple’s latest campaign includes a series of videos mimicking Alfred Hitchcock’s The Birds, depicting trackers as birds spying on users. The campaign, titled Flock, is a direct jab at Google’s initial tracking cookie replacement plan, Federated Learning of Cohorts (FLoC), which Apple mocked for its privacy shortcomings. Apple’s message is clear: iPhone users should switch to Safari, which offers more robust privacy controls, including the ability to block third-party cookies by default. This warning comes at a time when privacy features are becoming a key differentiator, as seen with WhatsApp’s advanced privacy controls that block screenshots and exports to protect user data.
The privacy risks associated with Chrome are not new, but Apple’s alert underscores their severity on iOS devices. AL.com notes that Google’s decision to maintain third-party cookies affects Chrome’s 3 billion users, including an estimated 400 million iPhone users. Unlike Android, where users can disable tracking cookies, Chrome on iOS automatically enables them, and disabling them requires clearing cookies entirely—a process that signs users out of websites and deletes saved preferences. This lack of control has fueled Apple’s criticism, especially as Google aims to convert more iPhone users from Safari to Chrome to bolster its search dominance, a strategy that could be disrupted by TikTok’s potential ban and its impact on digital advertising.
What iPhone Users Can Do
Here’s a breakdown of the situation and user options:
- Privacy Risk: Chrome on iOS enables third-party cookies by default, with no option to disable them without clearing all cookies.
- Apple’s Recommendation: Switch to Safari, which blocks third-party cookies and offers enhanced privacy features.
- Alternative Option: Use Chrome’s Incognito Mode, which offers better privacy but comes with trade-offs in functionality.
- Broader Context: The warning reflects ongoing tensions between Apple and Google over user data and privacy practices.
Apple’s warning also highlights the broader implications of in-app browser security risks, a topic that has gained attention in recent years. Colitco points out that Chrome’s tracking practices are part of a larger issue with in-app browsers, which can monitor user activity even within apps like Instagram and Facebook. This aligns with Apple’s App Tracking Transparency (ATT) feature, introduced in 2021, which requires apps to seek permission before tracking users across different platforms. However, ATT does not fully address tracking within in-app browsers, leaving a gap that Chrome exploits on iOS. For users concerned about digital safety, exploring AI-driven privacy solutions could provide additional context on how companies are addressing these challenges.
The tech industry is at a crossroads when it comes to privacy, with Apple and Google representing two opposing philosophies. Apple’s focus on user control and data minimization contrasts sharply with Google’s ad-driven model, which relies on extensive data collection to fuel its advertising business. This clash has been evident in other areas, such as Google’s Veo 2 rollout, which raised questions about data usage in AI-generated content. As privacy becomes a top priority for consumers, Apple’s warning could push more iPhone users to reconsider their browser choices, potentially shifting the balance in the ongoing browser wars.
For iPhone users, the decision to delete Chrome may depend on their priorities. Safari offers a more privacy-focused experience, but Chrome’s integration with Google services like Gmail and Drive remains a draw for many. Those who choose to keep Chrome can mitigate risks by using Incognito Mode or regularly clearing cookies, though these solutions are far from ideal. As the debate over privacy continues, Apple’s warning serves as a reminder of the importance of understanding how apps and browsers handle personal data. What’s your take on Apple’s alert? Are you switching to Safari, or sticking with Chrome? Share your thoughts in the comments, and let’s discuss the future of online privacy.
Cybersecurity
Sophisticated Gmail Phishing Campaign Exploits Google Infrastructure, Puts Users at Risk

A new phishing campaign is leveraging Google’s own systems to dispatch ultra‑convincing scam emails from genuine “[email protected]” addresses. Security experts warn this technique could ensnare millions of Gmail users before filters catch on.
Google first acknowledged the flaw in mid‑April after multiple reports surfaced of fraudulent messages masquerading as subpoena notices. The attack’s sophistication lies in its exploitation of Google’s OAuth framework and DomainKeys Identified Mail (DKIM) — allowing malicious emails to pass authentication checks that normally mark spoofed mail as spam.
Recently I was targeted by an extremely sophisticated phishing attack, and I want to highlight it here. It exploits a vulnerability in Google’s infrastructure, and given their refusal to fix it, we’re likely to see it a lot more. Here’s the email I got: pic.twitter.com/tScmxj3um6
— nick.eth (@nicksdjohnson) April 16, 2025
Why It Matters:
With over 2 billion active Gmail accounts, a successful breach of trust in Google’s email infrastructure represents one of the largest‑scale phishing threats in recent memory. The campaign illustrates how attackers are escalating beyond basic spoofing to weaponize trusted platforms.
In the most prevalent variant, recipients receive an email seemingly from Google saying their account is under legal scrutiny, complete with a fake court case number and a link to review documents. Clicking the link takes victims to a counterfeit login page hosted on Google Sites, where credentials and two‑factor tokens can be harvested. According to a 9to5Mac security alert, the attackers created a malicious OAuth app that signs outgoing mail with Google’s own DKIM signature, bypassing spam filters altogether.
Several early victims described the email as indistinguishable from genuine Google correspondence. “It even used the correct Google logo and footer,” one cybersecurity researcher told Forbes, underscoring how the scam’s professional polish left users with little reason to doubt its veracity.
How the Scam Evades Defenses
To execute the scheme, attackers register an app through Google’s OAuth developer console. They configure it to send messages from a “[email protected]” address and to request only minimal permissions — just enough to harvest the user’s email and basic profile data. Once a user consents (often without reading the fine print), the app gains tokenized access to send mail on their behalf.
Next, the phishers make use of DKIM authentication, which cryptographically signs outbound mail with Google’s private key. Because the signature matches Google’s published DNS record, anti‑spoofing checks pass and the message lands in the inbox rather than the spam folder.
Worst of all, the landing page URL begins with a legitimate “sites.google.com” domain. Victims who hover over the link see “google.com” and rarely suspect the page’s true intent. Once credentials are entered, attackers can log in to the real Gmail account and install malware, exfiltrate data, or pivot to other internal systems.
Google’s Mitigation Efforts
By late April, Google deployed patches to tighten OAuth app verification and began grandfathering in stricter enforcement of its DMARC policy. A company spokesperson told Newsweek that the loophole “no longer allows unauthorized apps to spoof Google’s no‑reply address” and that “users who have not yet been targeted are automatically protected.”
Google also issued a blog post advising all Gmail users to:
-
Enable Two‑Factor Authentication (2FA). Accounts using SMS or auth‑app codes are significantly harder to hijack.
-
Use Passkeys. Passkeys replace passwords entirely and are immune to credential‑phishing.
-
Review Connected Apps. In Gmail’s security settings, users should revoke any unfamiliar OAuth apps.
Despite these measures, experts warn that variations of the scam could emerge. “We’ve seen threat actors pivot to invite‑based sharing links and even abuse Google Forms,” said the lead analyst at a major security firm.
Broader Implications for Email Security
This incident highlights a troubling trend: attackers are moving from simple display‑name spoofing into deeper technical manipulations of trust frameworks. Last year’s surge in AI‑generated phishing made generic scams easier to craft; now, criminals are weaponizing legitimate developer tools against users.
Organizations must therefore rethink perimeter defenses. Briskfeeds recently published a report on corporate email security that recommends advanced solutions, such as:
-
OAuth Anomaly Detection. Flagging apps that request minimal yet suspicious permissions.
-
Zero‑Trust Email Gateways. Inspecting inbound mail even if it passes DKIM/DMARC.
-
User Education Campaigns. Simulated phishing drills to train employees on spotting unconventional threats.
What Users Should Do Now
Even with Google’s patch, vigilance remains crucial:
-
Verify Unusual Requests. If an email demands urgent action—like reviewing subpoena documents—contact Google support directly rather than clicking links.
-
Check the App Permissions Page. Navigate to Gmail’s Settings → Security → Third‑Party Apps to revoke dubious entries.
-
Keep Software Updated. Ensure your browser and OS have the latest security fixes to block drive‑by downloads.
-
Report Phishing Attempts. Use Gmail’s “Report phishing” feature to help improve Google’s filters.
Conclusion
As phishing tactics evolve, the line between legitimate and malicious email continues to blur. This latest campaign underscores the need for layered defenses, from technical controls to user awareness. For a deeper dive into enterprise‑grade email protections, see our Briskfeeds report on corporate email security. Stay informed—your inbox depends on it.
Cybersecurity
China Accuses U.S. of Cyberattacks During Asian Winter Games

The allegations come amid a deepening trade war and ongoing mutual accusations of cyber espionage between the U.S. and China. As the world’s two largest economies continue to clash over technology and security, this incident highlights the growing role of cyber warfare in international relations.
According to the Harbin police, the cyberattacks targeted systems managing the Asian Winter Games, including registration, competition entry, and travel logistics, which stored sensitive personal data of participants. The attacks reportedly peaked during the first ice hockey game on February 3, 2025, with the intent to cause social disorder and steal confidential information. Chinese authorities also claim the NSA targeted critical infrastructure in Heilongjiang province, such as energy, transportation, and telecommunications, as well as the Chinese tech giant Huawei.
The Harbin police identified the alleged operatives as Katheryn A. Wilson, Robert J. Snelling, and Stephen W. Johnson, accusing them of working through the NSA to carry out the attacks. China’s Foreign Ministry spokesperson, Lin Jian, stated that the cyberattacks caused significant harm to national defense, finance, and personal information security, describing the actions as “extremely malicious.” Chinese officials further alleged that the NSA used advanced techniques, such as purchasing IP addresses in various countries and renting servers in Europe and Asia, to conceal its activities. They also claimed the NSA activated pre-installed backdoors in Microsoft Windows systems to transmit encrypted data packets within Heilongjiang province.
The U.S. has not officially responded to the allegations, with the U.S. Embassy in Beijing declining immediate comment. However, this is not the first time the two nations have accused each other of cyber misconduct. Last month, the U.S. Justice Department announced efforts to disrupt malicious cyber activities by 12 Chinese nationals, including two law enforcement officers, as reported by AP News. In March, the U.S. and UK accused Beijing of a cyberespionage campaign targeting government officials and critics, further straining relations. China, in turn, denies involvement in overseas cyber espionage and has called on the U.S. to stop what it describes as “unwarranted smears.”
The timing of the alleged attacks raises questions about their motivation. Some speculate that the U.S. may have targeted the Asian Winter Games to exploit a period when China might have relaxed its strict internet controls to accommodate international visitors. Others suggest the attacks were part of a broader strategy to undermine China’s technological advancements, particularly given the targeting of Huawei, which has faced U.S. sanctions since 2019 due to national security concerns. The South China Morning Post also noted that the Harbin police accused two U.S. universities, the University of California and Virginia Tech, of involvement, though no specific evidence was provided.
China has announced a reward for information leading to the capture of the three alleged operatives and stated it will take necessary measures to protect its cybersecurity. This incident underscores the escalating cyber conflict between the U.S. and China, with both sides accusing each other of malicious activities while offering little concrete evidence. As geopolitical tensions continue to rise, the role of cyber warfare in international disputes is likely to grow, posing challenges for global security and cooperation. What do you think about these allegations? Share your thoughts in the comments, and stay updated on global news at briskfeeds.com.
-
AI3 months ago
DeepSeek AI Faces U.S. Government Ban Over National Security Concerns
-
Technology2 months ago
COVID-Like Bat Virus Found in China Raises Fears of Future Pandemics
-
AI2 months ago
Google Gemini Now Available on iPhone Lock Screens – A Game Changer for AI Assistants
-
Technology2 months ago
Pokémon Day 2025 Celebrations Set for February 27 With Special Pokémon Presents Livestream
-
Technology2 months ago
Bybit Suffers Record-Breaking $1.5 Billion Crypto Hack, Shaking Industry Confidence
-
Technology2 months ago
iPhone 17 Air and Pro Mockups Hint at Ultra-Thin Future, Per Leaked Apple Docs
-
Technology2 months ago
Apple Unveils New iPad Air with M3 Chip and Enhanced Magic Keyboard
-
Technology2 months ago
Yale Study Identifies Possible Links Between COVID Vaccine and Post-Vaccination Syndrome