Cybersecurity Government Intelligence Reports

The American Hospital Association (AHA) Cybersecurity and Risk Advisory Service share cybersecurity government intelligence reports that are vital to the security of hospitals and health systems.

Administrators are being advised to update their systems following the disclosure of a critical remote code execution vulnerability in PHP. PHP, or Hypertext Preprocessor, is a widely used open-source scripting language that is used to create dynamic web pages and applications on both Windows and…
In January 2024, security teams for two American multinational technology companies detected a nation-state attack on their corporate e-mail systems. The threat actor attributed to the cyberattacks was identified as Midnight Blizzard.
On June 4, 2024, the Health Sector Cybersecurity Coordination Center (HC3) released a sector alert: Baxter Welch Allyn Vulnerabilities.
The U.S. Department of Health and Human Services’ (HHS) Office of the Chief Information Officer (OCIO) Health Sector Cybersecurity Coordination Center (HC3) invites you to join us for our cybersecurity threat briefing in June. The topic will be "Healthcare Cloud Security".
This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors.
This report expands upon the ‘secure deployment’ and ‘secure operation and maintenance’ sections of the Guidelines for secure AI system development and incorporates mitigation considerations from Engaging with Artificial Intelligence (AI).
This report provides high-level insight into the top ten ransomware groups HC3 has seen targeting the healthcare sector.
This report provides high-level insight into the top ten ransomware groups HC3 has seen targeting the healthcare sector.
SQL injection—or SQLi—vulnerabilities remain a persistent class of defect in commercial software products.1 Despite widespread knowledge and documentation of SQLi vulnerabilities over the past two decades, along with the availability of effective mitigations, software manufacturers have continued…