The Cybersecurity and Infrastructure Security Agency has created a webpage to provide the latest public information and vendor-supplied advisories on a critical remote code execution vulnerability affecting Apache Log4j software library versions 2.0-beta9 to 2.14.1. CISA urges organizations to review the webpage and immediately upgrade to Log4j version 2.15.0 or apply the appropriate vendor-recommended mitigations, because an unauthenticated remote actor could exploit this vulnerability to take control of an affected system. CISA and its Joint Cyber Defense Collaborative partners are tracking the vulnerability, and CISA will continue to update the webpage as additional information becomes available. Log4j is broadly used in a variety of consumer and enterprise services, websites, applications and operational technology products to log security and performance information. For more information on this or other cyber and risk issues, contact John Riggi, senior advisor for cybersecurity and risk, at jriggi@aha.org

Headline
Microsoft announced May 19 that it disrupted operations of Fox Tempest, a threat actor operating as a malware-signing-as-a-service used by cybercriminals to…
Headline
An AHA Cyber & Risk Intel blog by John Riggi, AHA national advisor for cybersecurity and risk, explores what health care leaders need to consider to reduce…
AHA Cyber Intel
Cyberattacks against hospitals, health systems and mission-critical health care third-party providers have surged in recent years. While these attacks often…
Headline
Microsoft Threat Intelligence is warning of a large scale, multistage phishing campaign that disproportionately targeted the health care sector, sending “code…
Headline
The Cybersecurity and Infrastructure Security Agency has launched a new initiative for critical infrastructure to defend against cyberattacks through proactive…
Headline
John Riggi, AHA national advisor for cybersecurity and risk, will moderate a webinar May 5 at 1 p.m. ET that will explore how bad actors are leveraging…