Cybersecurity

Cyber Threat Intelligence, Alerts and Reports

As part of the AHA’s commitment to helping hospitals and health systems prepare for and prevent cyber threats, we have gathered the latest government cyber threat intelligence and alerts and Health Information Sharing and Analysis Center (H-ISAC) reports.

You may be asked to enter your AHA member credentials to view certain reports and intelligence alerts.

Cybersecurity & Risk Advisory

Learn how AHA can help hospitals and health systems prepare for and mitigate cyber threats through the expertise of John Riggi, AHA’s National Advisor for Cybersecurity and Risk.

Learn More

H-ISAC TLP Green Daily Physical Security Report - June 29, 2023
The FBI Las Vegas Field Office, in coordination with the Office of Private Sector, prepared this Liaison Information Report (LIR) to inform private sector partners about the risk of malicious cyber threat actors targeting medical offices.
H-ISAC TLP Green Daily Cyber Headlines for June 28, 2023.
A daily ransomware tracker as TLP:GREEN for purposes of increasing ransomware threat awareness.
H-ISAC TLP Green Daily Physical Security Report for June 27, 2023.
H-ISAC TLP Green Daily Cyber Headlines for June 27, 2023.
Search engine optimization (SEO) poisoning, considered a type of malvertising (malicious advertising), is a technique used by threat actors to increase the prominence of their malicious websites.
Search engine optimization (SEO) poisoning, considered a type of malvertising (malicious advertising), is a technique used by threat actors to increase the prominence of their malicious websites.
The Department of Health and Human Services Friday alerted the health sector to a recent ransomware attack on a U.S. cancer center that reduced cancer treatment capability, rendered digital services unavailable and threatened exposure of patient personal health information.
The Cybersecurity and Infrastructure Security Agency yesterday urged organizations to apply Progress Software updates  to the MOVEit Transfer web application to prevent ransomware attackers from exploiting a critical vulnerability used to steal data