Cybersecurity

Cyber Threat Intelligence, Alerts and Reports

As part of the AHA’s commitment to helping hospitals and health systems prepare for and prevent cyber threats, we have gathered the latest government cyber threat intelligence and alerts and Health Information Sharing and Analysis Center (H-ISAC) reports.

You may be asked to enter your AHA member credentials to view certain reports and intelligence alerts.

Cybersecurity & Risk Advisory

Learn how AHA can help hospitals and health systems prepare for and mitigate cyber threats through the expertise of John Riggi, AHA’s National Advisor for Cybersecurity and Risk.

Learn More

This edition of Hacking Healthcare includes an examination of Health and Human Services’ (HHS) Office of Civil Rights’ (OCR) summer cybersecurity newsletter; a brief on the recent charges levied against ex-Uber Chief Security Officer (CSO) Joe Sullivan for his role in covering up a 2016 data breach…
A new phishing campaign is using COVID-19 personal protective equipment (PPE)-themed lures to spread Agent Tesla malware. This difficult-to-detect remote access Trojan (RAT) provides attackers with a dashboard to monitor the malware’s keylogging and information stealing capabilities.
This edition of Hacking Healthcare is devoted to exploring the physical aspects of data security that, while sometimes easy to overlook, are no less important. This issue examines the types of incidents members should consider, various legal and regulatory elements, the applicability of…
Researchers recently revealed an information about a vulnerability affecting the electronic chips that enable mobile communication in millions of internet connected devices.
Fifth generation cellular network technology (Officially called: 5G New Radio) adopted by 3rd Generation Partnership Project (3GPP) - international organization responsible for 3G UMTS and 4G LTE.
This edition of Hacking Healthcare begins by exploring how healthcare organizations should consider establishing an online presence on social media and communication platforms, even if there doesn’t appear to be a business case for it. Next, it briefly details the National Security Agency (NSA) and…
The Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (GTsSS), military unit 26165, is deploying previously undisclosed malware for Linux® systems, called Drovorub, as part of its cyber espionage operations. GTsSS malicious cyber activity has previously been…
Financially-motivated cybercriminals continue to exploit the with targets across a variety of industry verticals including:
The Cybersecurity and Infrastructure Security Agency is tracking an unknown malicious cyber actor who is spoofing the Small Business Administration COVID-19 loan relief webpage via phishing emails, the agency announced.