H-ISAC: White Reports
From March to November 2024, Health-ISAC held ten workshops as part of the Discussion Based Exercise Series, involving over 100 member organizations, potential members, and strategic partners.
On March 5, 2025, Microsoft released a report identifying the Silk Typhoon’s evolving tactics.
This week, Health-ISAC®'s Hacking Healthcare® examines a new policy shift that will affect how the public is able to interact with new rulemaking efforts coming out of the United States' Department of Health and Human Services. Join us as we breakdown what the new policy statement says and how it…
On March 4, 2025, Broadcom released an advisory (VMSA-2025-0004) prompted by the Microsoft Threat Intelligence Center’s disclosure of multiple, actively exploited, zero-day vulnerabilities affecting VMware ESXi, Workstation, Fusion, Cloud Foundation, and Telco Cloud Platform solutions.
This week, Health-ISAC®'s Hacking Healthcare® examines new draft proposal from the European Commission meant to ensure an effective EU-wide response to a large-scale cyber crisis.
On February 26, 2025, Health-ISAC received information related to insights gathered from leaked chat logs of Black Basta threat actors.
Palo Alto recently disclosed that PAN-OS firewalls vulnerable to CVE-2025-0111 are being used in exploit chain attacks.
The high-severity SSLVPN authentication bypass flaw affecting SonicWall firewalls running vulnerable SonicOS versions is actively being exploited in-the-wild.
A daily ransomware tracker at TLP:GREEN for the purpose of increasing ransomware threat awareness.
The Microsoft Threat Intelligence Center has identified an active device code phishing campaign conducted by a group known as Storm-2372, which has been operational since August 2024.