Cybersecurity

Cyber Threat Intelligence, Alerts and Reports

As part of the AHA’s commitment to helping hospitals and health systems prepare for and prevent cyber threats, we have gathered the latest government cyber threat intelligence and alerts and Health Information Sharing and Analysis Center (H-ISAC) reports.

You may be asked to enter your AHA member credentials to view certain reports and intelligence alerts.

Cybersecurity & Risk Advisory

Learn how AHA can help hospitals and health systems prepare for and mitigate cyber threats through the expertise of John Riggi, AHA’s National Advisor for Cybersecurity and Risk.

Learn More

In This Issue: A Word From the Task Group By: Lee Barrett, 405(d) Task Group Member HICP in the Spotlight: Ransomware Happening Around Us HHS Ransomware Resources 405(d) Events and Announcements Coming Soon: Social Media!
In this edition of Hacking Healthcare, we explore insider threats and the various ways they can negatively impact organizations. First, we analyze how the convergence of geopolitics and insider threats have led GitLab to consider banning individuals of certain nationalities from critical positions…
Summary: The FBI has observed cyber actors leveraging commercial databases to obtain victim targeting information to perpetuate Business Email Compromise (BEC) fraud against construction companies and their vendors.
Weekly issue of H-ISAC Report: Hacking Healthcare - TLP White, November 5, 2019.
In this edition of Hacking Healthcare, we breakdown the United Kingdom’s National Cyber Security Centre’s annual review. Next, we examine the U.S. Department of Homeland Security’s push for U.S. federal agencies to implement vulnerability disclosure programs. Finally, we lament the discovery of…
This edition of Hacking Healthcare is dedicated to giving you a primer on some of the impacts geopolitical tensions can have on healthcare organizations, particularly in relation to technology and cybersecurity considerations. By outlining how geopolitics can lead to sanctions, impact third-party…
In this edition of Hacking Healthcare, we begin by exploring major proposed changes to the Domain Name System—an Internet mainstay that maps IP addresses to website names.
In early June 2019, Emotet, an advanced modular banking Trojan, attempted to communicate with 214 command and control (C2) IP addresses for initial instructions, indicating cyber actors recently made modifications or updates to Emotet malware or infrastructure. Immediately following, the Emotet…
The AHA is proud to be your partner in keeping your data — and your patients — safe.