<table style="border:1px solid #adadad; background-color: #F3F1EC; color: #666666; padding:8px; -webkit-border-radius:4px; border-radius:4px; -moz-border-radius:4px; line-height:16px; margin-bottom:6px;" width="100%">
<tbody>
<tr>
<td><span style="font-family:Helvetica, sans-serif; font-size:20px;font-weight:bold;">AiToday.io RSS Syndication</span></td>
</tr>
<tr>
<td> </td>
</tr>
</tbody>
</table>
<table style="font:13px Helvetica, sans-serif; border-radius:4px; -moz-border-radius:4px; -webkit-border-radius:4px; background-color:#fff; padding:8px; margin-bottom:6px; border:1px solid #adadad;" width="100%">
<tbody>
<tr>
<td><a href="https://www.aitoday.io/ai-driven-attacks-push-healthcare-beyond-2-factor-auth-a-29627" style="font-family:Helvetica, sans-serif; letter-spacing:-1px;margin:0;padding:0 0 2px;font-weight: bold;font-size: 19px;line-height: 20px;color:#222;">AI-Driven Attacks Push Healthcare Beyond 2-Factor Auth</a>
<div style="font-family:Helvetica, sans-serif; text-align:left;color:#999;font-size:11px;font-weight:bold;line-height:15px;">Oct 4th 2025, 17:03</div>
<div style="font-family:Helvetica, sans-serif; color:#494949;text-align:justify;font-size:13px;">
<p><img src="https://ismg-cdn.nyc3.cdn.digitaloceanspaces.com/articles/ai-driven-attacks-push-healthcare-beyond-two-factor-auth-image_small-7-a-29627.jpg" align="right" hspace="4"><b>GeneDx's Jigar Kadakia on Why Biometrics, Tokens Must Evolve</b><br>Healthcare CISOs must deploy phishing-resistant authentication as threat actors weaponize AI and deepfakes to bypass traditional two-factor methods, creating vulnerabilities across human and non-human identities managing sensitive genomic data, said Jigar Kadakia, CISO at GeneDx.</p>
</div>
<div style="font-family:Helvetica, sans-serif; font-size:13px; text-align: center; color: #666666; padding:4px; margin-bottom:2px;"></div>
</td>
</tr>
</tbody>
</table>
<p><strong>Forwarded by:<br />
Michael Reeder LCPC<br />
Baltimore, MD</strong></p>
<p><strong>This information is taken from free public RSS feeds published by each organization for the purpose of public distribution. Readers are linked back to the article content on each organization's website. This email is an unaffiliated unofficial redistribution of this freely provided content from the publishers. </strong></p>
<p> </p>
<p><s><small><a href="#" style="color:#ffffff;"><a href='https://blogtrottr.com/unsubscribe/565/3vbjFy'>unsubscribe from this feed</a></a></small></s></p>