Cybersecurity

Cyber Threat Intelligence, Alerts and Reports

As part of the AHA’s commitment to helping hospitals and health systems prepare for and prevent cyber threats, we have gathered the latest government cyber threat intelligence and alerts and Health Information Sharing and Analysis Center (H-ISAC) reports.

You may be asked to enter your AHA member credentials to view certain reports and intelligence alerts.

Cybersecurity & Risk Advisory

Learn how AHA can help hospitals and health systems prepare for and mitigate cyber threats through the expertise of John Riggi, AHA’s National Advisor for Cybersecurity and Risk.

Learn More

    From October 2018 to July 2019, the FBI identified unknown cyber actors attempting to exploit multiple US cleared defense contractor (CDC) websites with two types of SQL injection attacks in an effort to steal database data. These methods of attack are likely indicative of…
    The FBI has recently observed brute force attempts against Office 365 accounts of US cleared defense contractors (CDCs). If accounts are successfully compromised, actors can conduct activities such as monitoring traffic, creating other accounts, or moving laterally across a company…
    The FBI has observed cyber actors circumventing multi-factor authentication through common social engineering and technical attacks. This PIN explains these methods and offers mitigation strategies for organizations and entities using multi-factor authentication in their security…
In This Issue: A Word From the Task Group By: Lee Barrett, 405(d) Task Group Member HICP in the Spotlight: Ransomware Happening Around Us HHS Ransomware Resources 405(d) Events and Announcements Coming Soon: Social Media!
In this edition of Hacking Healthcare, we explore insider threats and the various ways they can negatively impact organizations. First, we analyze how the convergence of geopolitics and insider threats have led GitLab to consider banning individuals of certain nationalities from critical positions…
Summary: The FBI has observed cyber actors leveraging commercial databases to obtain victim targeting information to perpetuate Business Email Compromise (BEC) fraud against construction companies and their vendors.
Weekly issue of H-ISAC Report: Hacking Healthcare - TLP White, November 5, 2019.
In this edition of Hacking Healthcare, we breakdown the United Kingdom’s National Cyber Security Centre’s annual review. Next, we examine the U.S. Department of Homeland Security’s push for U.S. federal agencies to implement vulnerability disclosure programs. Finally, we lament the discovery of…