Cybersecurity

Cyber Threat Intelligence, Alerts and Reports
As part of the AHA鈥檚 commitment to helping hospitals and health systems prepare for and prevent cyber threats, we have gathered the latest government cyber threat intelligence and alerts and Health Information Sharing and Analysis Center (H-ISAC) reports.
You may be asked to enter your AHA member credentials to view certain reports and intelligence alerts.
Cybersecurity & Risk Advisory
Learn how AHA can help hospitals and health systems prepare for and mitigate cyber threats through the expertise of John Riggi, AHA鈥檚 National Advisor for Cybersecurity and Risk.
In this edition of Hacking Healthcare, we begin with a warning about the use of emotiondetecting
technologies and a call for their regulation. Next, we detail how the U.S. National
Institute of Standards and Technology (鈥淣IST鈥) is helping further biometric research. Finally, we
briefly explain鈥
In this edition of Hacking Healthcare, we spotlight the Food and Drug Administration鈥檚 request for nominations to their Medical Devices Advisory Committee. Next, we brief you on Sen. Booker and Sen. Wyden鈥檚 mission to combat bias in healthcare algorithms. Additionally, we highlight a new indictment鈥
On September 5, 2019, the National Security Council tasked the President鈥檚 National Infrastructure Advisory Council (NIAC) to examine how the federal government and private industry can collaborate seamlessly to confront urgent cyber risks in the most critical and highly targeted private鈥
In this edition of Hacking Healthcare, we give you an update on yet another case of cyber
insurance falling short of covering an expected cost. We then explore the possibility of Iran
creating a 鈥渨hite list鈥 for foreign websites. Finally, we discuss the potential impact of China
stepping up鈥
From October 2018 to July 2019, the FBI identified unknown cyber actors attempting to exploit multiple US cleared defense contractor (CDC) websites with two types of SQL injection attacks in an effort to steal database data. These methods of attack are likely indicative of鈥
The FBI has recently observed brute force attempts against Office 365 accounts of US cleared defense contractors (CDCs). If accounts are successfully compromised, actors can conduct activities such as monitoring traffic, creating other accounts, or moving laterally across a company鈥
The FBI has observed cyber actors circumventing multi-factor authentication through common social engineering and technical attacks. This PIN explains these methods and offers mitigation strategies for organizations and entities using multi-factor authentication in their security鈥