Cybersecurity

Cyber Threat Intelligence, Alerts and Reports
As part of the AHA’s commitment to helping hospitals and health systems prepare for and prevent cyber threats, we have gathered the latest government cyber threat intelligence and alerts and Health Information Sharing and Analysis Center (H-ISAC) reports.
You may be asked to enter your AHA member credentials to view certain reports and intelligence alerts.
Cybersecurity & Risk Advisory
Learn how AHA can help hospitals and health systems prepare for and mitigate cyber threats through the expertise of John Riggi, AHA’s National Advisor for Cybersecurity and Risk.
In recent days, a significant number of vulnerabilities in common information systems relevant to the healthcare sector have been disclosed to the public. These vulnerabilities are from Microsoft, Adobe, Oracle, Cisco and Google, as well as others.
This edition of Hacking Healthcare explores the full scope of China’s intelligence gathering
operations against healthcare entities in the United States and its allies in the wake of COVID-19 and outlines some practical and inexpensive ways to boost security.
The U.S. Department of Health and Human Services’ (HHS) Health Sector Cybersecurity Coordination Center (HC3) invites you to join its monthly webinar on July 23rd. This initiative will provide actionable information on health sector cybersecurity threats and mitigations. HC3 analysts will…
The attack traffic originates from many sources, not from a single one that could easily be blocked. Frequently leverages botnets.
The HC3 website is the next step in reaching our mission of supporting the defense of the healthcare and public health sector’s information technology infrastructure, by strengthening coordination and information sharing within the sector and by cultivating cybersecurity resilience, regardless of…
The Department of Homeland Security’s Cybersecurity and Infrastructure Security Agency yesterday alerted organizations to a critical vulnerability affecting the SAP NetWeaver Application Server, which an attacker could exploit through the Hypertext Transfer Protocol (HTTP) to take control of…
Top malware detections for the month of May 2020 by the EINSTEIN national IDS included NetSupport Manager RAT, Kovter, and XMRig.
Business email compromise can go by different names - be aware of them all.
This edition of Hacking Healthcare begins by providing a brief overview of how a major European
law enforcement operation, made possible by cracked encryption, is likely to further fuel the
long simmering encryption debate within the United States, and wraps up by exploring the
FCC’s decision…