Cybersecurity

Cyber Threat Intelligence, Alerts and Reports

As part of the AHA’s commitment to helping hospitals and health systems prepare for and prevent cyber threats, we have gathered the latest government cyber threat intelligence and alerts and Health Information Sharing and Analysis Center (H-ISAC) reports.

You may be asked to enter your AHA member credentials to view certain reports and intelligence alerts.

Cybersecurity & Risk Advisory

Learn how AHA can help hospitals and health systems prepare for and mitigate cyber threats through the expertise of John Riggi, AHA’s National Advisor for Cybersecurity and Risk.

Learn More

H-ISAC TLP Green: Daily Cyber Headlines for October 9, 2025.
The Health Sector Coordinating Council Oct. 7 released its Sector Mapping and Risk Toolkit, created to help health care providers and other organizations visualize key services that support essential health care workflows and determine which of them present critical risk of cyberattack disruption…
H-ISAC TLP Green: Daily Cyber Headlines for October 8, 2025.
A daily ransomware tracker at TLP:GREEN to increase awareness of the ransomware threat.
The AHA Oct. 6 released a Cybersecurity Advisory (https://www.aha.org/advisory/2025-10-06-hospitals-are-oracle-customers-urged-take-immediate-action-address-security-vulnerability) urging immediate action against a critical Oracle E-Business Suite vulnerability that is remotely exploitable without…
The AHA has launched an enhanced Cybersecurity and Risk webpage designed to help health care organizations strengthen their defenses against emerging cyber and physical security threats.
On October 4, 2025, Oracle released an advisory to address a critical vulnerability, CVE-2025-61882, affecting E-Business Suite (EBS) systems, versions 12.2.3 through 12.2.14.
A daily ransomware tracker at TLP:GREEN to increase awareness of the ransomware threat.
H-ISAC TLP Green Daily Cyber Headlines for October 3, 2025.
Oracle has published a Security Alert that addresses vulnerability CVE-2025-61882 in the Oracle E-Business Suite (EBS). This vulnerability is remotely exploitable without authentication, i.e., it may be exploited over a network without the need for a username and password. If successfully exploited…