Public

Jul 20, 2021
The AHA released a series of public service announcements (PSA) and supporting materials that encourage people to seek the answers they need and ask the questions that will help them understand and become confident in the safety and effectiveness of COVID-19 vaccines.
Jul 20, 2021
Health-ISAC and Microsoft have partnered together to deliver a new medium to discuss notable vulnerabilities patched in the recent Patch Tuesday update
Jul 20, 2021
Together, the American Hospital Association (AHA), American Medical Association (AMA) and American Nurses Association (ANA) released a public service announcement (PSA) featuring their leaders urging the American public to ask questions, follow the science and get vaccinated. The PSA stresses that…
Jul 20, 2021
HHS ASPR and the U.S. Cybersecurity and Infrastructure Security Agency (CISA) are hosting a call on mitigation steps for the critical Microsoft PrintNightmare vulnerability from 1:00 - 3:00 PM ET on Thursday, July 22. The PrintNightmare vulnerability is a “critical” exploit that affects the…
Jul 19, 2021
On July 19, the Cybersecurity and Infrastructure Security Agency (CISA) has uploaded the Current Activity regarding the release of an indictment and several advisories detailing Chinese cyber threat activity.
Jul 19, 2021
This Joint Cybersecurity Advisory was written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) to provide information on a Chinese Advanced Persistent Threat (APT) group known in open-source reporting as APT40.
Jul 19, 2021
AHA statement on 2022 OPPS proposed rule from Executive Vice President Stacey Hughes.
Jul 19, 2021
This Joint Cybersecurity Advisory was written by the Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) to provide information on a Chinese Advanced Persistent Threat (APT) group known in open-source reporting as APT40.
Jul 19, 2021
The FBI is warning entities associated with the Tokyo 2020 Summer Olympics that cyber actors who wish to disrupt the event could use distributed denial of service (DDoS) attacks, ransomware, social engineering, phishing campaigns, or insider threats.