Cybersecurity Government Intelligence Reports
The ºÚÁÏÕýÄÜÁ¿ Association (AHA) Cybersecurity and Risk Advisory Service share cybersecurity government intelligence reports that are vital to the security of hospitals and health systems.
HHS OCIO HC3 TLP White, August 4 threat briefing: The OWASP Top 10.
HHS OCIO HC3 TLP White August 4 Threat Briefing: The OWASP Top 10
This joint Cybersecurity Advisory (CSA) was coauthored by the Cybersecurity and Infrastructure Security Agency (CISA) and the Australian Cyber Security Centre (ACSC).
Agenda
Background on Web Applications
What Are Web Application Attacks?
What Is the Impact to Health Sector?
Mitigations for Common Attacks
Free and Low-Cost Resources
Conclusion and Major Takeaways
What Are Web Applications?
A web application (or web app) is an application program…
Summary
The FBI is warning financial institutions and investors about cyber criminals creating fraudulent cryptocurrency investment applications (apps) to defraud cryptocurrency investors.
The FBI, Cybersecurity and Infrastructure Security Agency, and the Department of the Treasury are releasing this joint Cybersecurity Advisory (CSA) to provide information on Maui ransomware, which has been used by North Korean state-sponsored cyber actors since at least May 2021 to target…
Note: this joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors.
HHS OCIO HC3 - Threat Briefing: Strengthening Your Cyber Posture in Healthcare for June 16, 2022.
Executive Summary
In May 2022, vulnerabilities to the health sector have been released that require attention. This includes the monthly Patch Tuesday vulnerabilities released by several vendors on the second Tuesday of each month, along with mitigation steps and patches. Vulnerabilities for…
This joint Cybersecurity Advisory describes the ways in which People’s Republic of China (PRC) state-sponsored cyber actors continue to exploit publicly known vulnerabilities in order to establish a broad network of compromised infrastructure.