Cybersecurity

 

Cyber Threat Intelligence, Alerts and Reports

As part of the AHA’s commitment to helping hospitals and health systems prepare for and prevent cyber threats, we have gathered the latest government cyber threat intelligence and alerts and Health Information Sharing and Analysis Center (H-ISAC) reports.

You may be asked to enter your AHA member credentials to view certain reports and intelligence alerts.

Cybersecurity & Risk Advisory

Learn how AHA can help hospitals and health systems prepare for and mitigate cyber threats through the expertise of John Riggi, AHA’s National Advisor for Cybersecurity and Risk.

Learn More

Researchers recently revealed an information about a vulnerability affecting the electronic chips that enable mobile communication in millions of internet connected devices.
Fifth generation cellular network technology (Officially called: 5G New Radio) adopted by 3rd Generation Partnership Project (3GPP) - international organization responsible for 3G UMTS and 4G LTE.
This edition of Hacking Healthcare begins by exploring how healthcare organizations should consider establishing an online presence on social media and communication platforms, even if there doesn’t appear to be a business case for it. Next, it briefly details the National Security Agency (NSA) and…
The Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS), military unit 26165, is deploying previously undisclosed malware for Linux® systems, called Drovorub, as part of its cyber espionage operations. GTsSS malicious cyber activity has previously been…
Financially-motivated cybercriminals continue to exploit the with targets across a variety of industry verticals including:
The Cybersecurity and Infrastructure Security Agency is tracking an unknown malicious cyber actor who is spoofing the Small Business Administration COVID-19 loan relief webpage via phishing emails, the agency announced.
The FBI’s Baltimore Field Office, in coordination with Office of Private Sector (OPS), prepared this LIR to inform private sector partners about recent Personal Protective Equipment (PPE) fraud schemes targeting the Healthcare Sector.
Cyber threat modeling is the process of developing and applying a representation of adversarial threats (sources, scenarios, and specific events) in cyberspace.
The XenMobile application is used by many businesses, including those in the HPH sector, and enables businesses to manage employees’ mobile devices and mobile applications by controlling device security settings and updates.
This edition of Hacking Healthcare explores just how significant the Trump Administration’s recent Executive Order targeting WeChat may be for those in the healthcare sector; and breaks down the recent news that China has started to block HTTPS traffic that used TLS 1.3 and ESNI…