The Department of Health and Human Services’ Health Sector Cybersecurity Coordination Center (HC3) yesterday urged health care organizations to install patches to protect their Microsoft Windows operating systems and servers against two high-risk remote desktop protocol vulnerabilities known collectively as DejaBlue. As with BlueKeep and WannaCry ransomware, the DejaBlue vulnerabilities are “wormable,” meaning they can spread automatically. The health care sector is vulnerable due to widespread use of legacy systems susceptible to this vulnerability, including embedded systems in medical devices. Newer systems vulnerable to DejaBlue further complicate the attack surface. For more information, see the HHS report. John Riggi, AHA senior advisor for cybersecurity and risk, also is available to answer questions on this and other cyber-related issues at jriggi@aha.org

Headline
Microsoft Threat Intelligence is warning of a large scale, multistage phishing campaign that disproportionately targeted the health care sector, sending “code…
Headline
The Cybersecurity and Infrastructure Security Agency has launched a new initiative for critical infrastructure to defend against cyberattacks through proactive…
Headline
John Riggi, AHA national advisor for cybersecurity and risk, will moderate a webinar May 5 at 1 p.m. ET that will explore how bad actors are leveraging…
Headline
The AHA and Joint Commission May 4 announced the launch of the Cyber Resilience Readiness program, an initiative to help hospitals and health systems assess…
Headline
The Cybersecurity and Infrastructure Security Agency, National Security Agency and international partners have released guidance on adopting agentic artificial…
Headline
A joint advisory released April 23 from U.S. and international cybersecurity agencies, including the Cybersecurity and Infrastructure Security Agency, FBI,…