Cybersecurity Government Intelligence Reports
The ºÚÁÏÕýÄÜÁ¿ Association (AHA) Cybersecurity and Risk Advisory Service share cybersecurity government intelligence reports that are vital to the security of hospitals and health systems.
Today’s cyber landscape is threatened by a multitude of malicious actors who have the tools to conduct large-scale fraud schemes, hold our money and data for ransom, and endanger our national security.
This threat briefing examines different examples of fake websites, ways to identify and how to report them, and recommendations for how to avoid becoming an accidental victim.
SUMMARYNote: This joint Cybersecurity Advisory (CSA) is part of an ongoing #StopRansomware effort to publish advisories for network defenders that detail various ransomware variants and ransomware threat actors. These #StopRansomware advisories include recently and historically observed tactics,…
Joint Cybersecurity Advisory Threat Actors Exploit Multiple Vulnerabilities in Ivanti Connect Secure
The Cybersecurity and Infrastructure Security Agency
(CISA) and the following partners (hereafter referred to as the authoring organizations) are releasing this joint Cybersecurity Advisory to warn that cyber threat actors are exploiting previously identified vulnerabilities in Ivanti Connect…
SUMMARYThe Federal Bureau of Investigation (FBI), National Security Agency (NSA), US Cyber Command, and international partners are releasing this joint Cybersecurity Advisory (CSA) to warn of Russian state-sponsored cyber actors’ use of compromised Ubiquiti EdgeRouters (EdgeRouters) to facilitate…
This advisory details recent tactics, techniques and procedures (TTPs) of the group commonly known as APT29, also known as Midnight Blizzard, the Dukes or Cozy Bear.
January 2024 vulnerabilities of interest to the health sector.
Malicious Cyber Actors Exploiting Insecure SOHO RoutersThreat actors—particularly the People’s Republic of China (PRC)—sponsored Volt Typhoon group—are compromising small office/home office (SOHO) routers by exploiting software defects that manufacturers must eliminate through secure software…
Cyber threat actors are aware of—and deliberately target—single points of failure. A compromise or failure of a Water and Wastewater (WWS) Sector organization could cause cascading impacts throughout the Sector and other critical infrastructure sectors.
FBI, DHS, and NCTC are warning the public of ongoing bomb threats by malicious actors targeting synagogues, Jewish community centers, schools, hospitals, airports, government buildings, and other public institutions in the United States.