Cybersecurity Government Intelligence Reports

The 黑料正能量 Association (AHA) Cybersecurity and Risk Advisory Service share cybersecurity government intelligence reports that are vital to the security of hospitals and health systems.

Cyber actors routinely exploit poor security configurations (either misconfigured or left unsecured), weak controls, and other poor cyber hygiene practices to gain initial access or as part of other tactics to compromise a victim鈥檚 system.
As of January 2022, unidentified cyber actors unlawfully scraped credit card data from a US business by injecting malicious PHP Hypertext Preprocessor (PHP) code into the business鈥 online checkout page and sending the scraped data to an actor-controlled server that spoofed a legitimate card鈥
The cybersecurity authorities of the United Kingdom (NCSC-UK), Australia (ACSC), Canada (CCCS), New Zealand (NCSC-NZ), and the United States (CISA), (NSA), (FBI) are aware of recent reports that observe an increase in malicious cyber activity targeting managed service providers (MSPs) and expect鈥
In April 2022, vulnerabilities in common information systems relevant to the health sector have been released that require attention.
In April 2022, vulnerabilities in common information systems relevant to the health sector have been released that require attention.
This is a revision of FLASH CP-000165-TT, originally published 18 March 2022 and titled 鈥淐yber Actors Perform Increased Reconnaissance of US Energy Sector Networks from Russia-Based IP Addresses.鈥
Leading up to Russia鈥檚 unprovoked attack against Ukraine, threat actors deployed destructive malware against organizations in Ukraine to destroy computer systems and render them inoperable.
U.S., Australian, Canadian, New Zealand, and UK cybersecurity authorities assess, in 2021, malicious cyber actors aggressively targeted newly disclosed critical software vulnerabilities against broad target sets, including public and private sector organizations worldwide.