Tag: healthcare
-
Iran-linked ransomware operation targeted US healthcare provider
The Pay2Key group may have shifted its aims from extortion to destruction. First seen on cybersecuritydive.com Jump to article: www.cybersecuritydive.com/news/iran-linked-ransomware-operation-targeted-us-healthcare-provider/815652/
-
AI and Medical Device Cybersecurity: The Good and Bad
Is AI Exposing a Growing Vulnerability Risk Mitigation Gap?. AI-fueled tools can help to identify medical device vulnerabilities much faster and at a higher volume than more traditional tools. But can device manufacturers and healthcare delivery organizations keep up with prioritizing and addressing a tidal wave of newly discovered flaws? First seen on govinfosecurity.com Jump…
-
QualDerm Partners December 2025 data breach impacts over 3 Million people
Over 3.1M people affected as QualDerm Partners suffered a December 2025 breach, exposing personal, medical, and health insurance data. Over 3.1 million people are affected by a December 2025 data breach at QualDerm Partners, where hackers stole personal, medical, and health insurance information from the company’s internal systems. QualDerm Partners is a U.S.-based healthcare management…
-
Iran-linked ransomware gang targeted US healthcare org amid military conflict
The incident responders noted that there was no evidence that data was exfiltrated during the intrusion, an unusual development considering U.S. intelligence agencies previously said Pay2Key attacks were largely conducted for information theft. First seen on therecord.media Jump to article: therecord.media/iran-linked-ransomware-gang-targeted-us-healthcare-org
-
OWASP Top 10 Risks for Agentic Applications: Must-Know Risks
The rapid evolution of AI has moved us beyond simple chatbots into the era of agentic applications, systems that can plan, reason, and act autonomously across multiple steps. From finance and healthcare to cybersecurity and DevOps, these agents are no longer passive assistants; they are decision-makers. But with autonomy comes a new class of risks….…
-
Attackers Hide Infostealer in Copyright Infringement Notices
A phishing campaign targeting healthcare, government, hospitality, and education sectors in various countries uses several evasion techniques to avoid detection. First seen on darkreading.com Jump to article: www.darkreading.com/cyberattacks-data-breaches/attackers-hide-infostealer-copyright-infringement-notices
-
Cyberattack on a Car Breathalyzer Firm Leaves Drivers Stuck
Plus: The FBI admits it’s buying phone data to track Americans, Iranian hackers disrupt medical care at Maryland hospitals, and more. First seen on wired.com Jump to article: www.wired.com/story/security-news-this-week-cyberattack-on-a-car-breathalyzer-firm-leaves-drivers-stuck/
-
Copyright Complaint Lures Linked to New PureLog Stealer Credential Theft Wave
Threat actors are actively distributing the PureLog Stealer through a sophisticated, multi-stage attack campaign disguised as legal copyright violation notices. This information-stealing malware is engineered to silently harvest sensitive data, including browser credentials, browser extensions, cryptocurrency wallets, and detailed system information. The campaign selectively targets organizations within the healthcare, government, hospitality, and education sectors across…
-
ISMG Editors: Stryker Attack Hits Healthcare Supply Chain
Also: CISA Protocol Concerns, AI Agents Push Past Cybersecurity Controls. In this week’s panel, four ISMG editors unpacked the cyber dimensions of the Stryker attack amid the escalating Iran-Israel-U.S. tensions, the growing controversy around CISA leadership and alleged protocol breaches, and a new set of concerns related to AI agents bypassing security controls. First seen…
-
Texas Gov. Orders State Review of Chinese-Made Medtech
Contec and Epsimed Monitors Containing ‘Backdoors’ Are at the Center of Order. Texas Gov. Abbott has ordered agencies to review foreign-made connected medical devices – especially those from Chinese manufacturers – used in state-owned facilities for cybersecurity issues that could pose security and privacy risks to patients and healthcare infrastructure. First seen on govinfosecurity.com Jump…
-
Why is proactive NHI lifecycle management important
Are Organizations Truly Harnessing Non-Human Identity Lifecycle Management? The digital frontier is expanding, yet many organizations are still grappling with securing machine identities or Non-Human Identities (NHIs). How crucial is proactive NHI lifecycle management in maintaining robust cybersecurity? Let’s delve into NHIs and uncover their strategic importance across various industries, from finance to healthcare and……
-
Why is proactive NHI lifecycle management important
Are Organizations Truly Harnessing Non-Human Identity Lifecycle Management? The digital frontier is expanding, yet many organizations are still grappling with securing machine identities or Non-Human Identities (NHIs). How crucial is proactive NHI lifecycle management in maintaining robust cybersecurity? Let’s delve into NHIs and uncover their strategic importance across various industries, from finance to healthcare and……
-
Why is proactive NHI lifecycle management important
Are Organizations Truly Harnessing Non-Human Identity Lifecycle Management? The digital frontier is expanding, yet many organizations are still grappling with securing machine identities or Non-Human Identities (NHIs). How crucial is proactive NHI lifecycle management in maintaining robust cybersecurity? Let’s delve into NHIs and uncover their strategic importance across various industries, from finance to healthcare and……
-
Why is proactive NHI lifecycle management important
Are Organizations Truly Harnessing Non-Human Identity Lifecycle Management? The digital frontier is expanding, yet many organizations are still grappling with securing machine identities or Non-Human Identities (NHIs). How crucial is proactive NHI lifecycle management in maintaining robust cybersecurity? Let’s delve into NHIs and uncover their strategic importance across various industries, from finance to healthcare and……
-
FDA Issues Recall for Some GE Imaging Products Due to Cyber
Vulnerability Affects Certain Centricity Medical Imaging Products. The U.S. Food and Drug Administration has issued a recall notice for certain GE Healthcare Centricity medical imaging products due to a potential cybersecurity vulnerability that could allow a hacker to manipulate data or impact availability of the affected products. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/fda-issues-recall-for-some-ge-imaging-products-due-to-cyber-a-31090
-
Ransomware group exploited Cisco firewall vulnerability as a zero day, weeks before a patch appeared
Tags: attack, cisco, cve, defense, exploit, firewall, government, group, healthcare, infrastructure, malicious, malware, ransom, ransomware, service, software, tool, update, vulnerability, zero-dayCSO that the “week’s head start” he referred to was the gap between the date of the first exploit that Amazon’s later analysis had unearthed and Cisco’s discovery of the bug.Amazon gained insight into the attacker’s infrastructure by using the honeypot to mimic a vulnerable firewall system. This resulted in an attack on the honeypot,…
-
The True Cost of Cyber Downtime: A UK Board-Level Briefing
Tags: attack, backup, business, cloud, communications, compliance, control, cyber, cyberattack, data, finance, GDPR, governance, healthcare, infrastructure, insurance, monitoring, resilience, saas, service, supply-chain, technologyWritten by Sean Tilley, Senior Sales Director EMEA at 11:11 Systems Cyber downtime carries measurable financial consequences, and those consequences are becoming clearer with each major incident. Research from 11:11 Systems shows that 78% of European organisations report losses of up to $500,000 per hour following a cyber-related outage, while 6% face costs exceeding £1 million per…
-
Is your Secrets Management solution scalable
What is at the Heart of Effective Secrets Management for Scalable Solutions? The significance of secrets management in ensuring scalable solutions can’t be overstated. With an increasing reliance on machine identities, especially in cloud environments, the field of cybersecurity faces both challenges and opportunities. Professionals across sectors like financial services, healthcare, travel, and DevOps are……
-
CISOs rethink their data protection strategies
Tags: access, ai, attack, automation, breach, business, cisco, ciso, cloud, compliance, computing, control, cyber, data, defense, framework, governance, healthcare, identity, jobs, LLM, privacy, resilience, risk, service, strategy, technology, tool, zero-trustFactors driving strategy evaluations CISOs, security experts, and data practitioners cite the expanding use of AI in the enterprise as the main reason they’re rethinking their data protection strategies.”AI is exposing more sensitive information as [workers] are taking that information and typing it into LLMs,” says Errol Weiss, CSO at Health-ISAC.AI tools make it easy…
-
How can Agentic AI stay protected against cyber threats
What Is the Impact of Non-Human Identities on Cloud Security? When dealing with cyber threats, how secure is your AI? Non-Human Identities (NHIs) have emerged as pivotal resources, particularly in managing protected AI environments such as Agentic AI. NHIs, essentially machine identities, are integral in safeguarding confidential information across multiple sectors, including financial services, healthcare,……
-
How can Agentic AI stay protected against cyber threats
What Is the Impact of Non-Human Identities on Cloud Security? When dealing with cyber threats, how secure is your AI? Non-Human Identities (NHIs) have emerged as pivotal resources, particularly in managing protected AI environments such as Agentic AI. NHIs, essentially machine identities, are integral in safeguarding confidential information across multiple sectors, including financial services, healthcare,……
-
What makes NHIs crucial for secure cloud environments
How Can Non-Human Identities Revolutionize Cloud Security? Have you ever considered how machine identities play a role in your cloud security strategy? When organizations increasingly rely on cloud environments, the significance of securing Non-Human Identities (NHIs) and Secrets Management has become a priority. Despite the varied organizational structures across industries like financial services, healthcare, or……
-
Medusa ransomware gang claims attacks on prominent Mississippi hospital, New Jersey county
The Medusa ransomware operation has claimed a devastating cyberattack that knocked out systems at the biggest hospital in Mississippi for nine days. First seen on therecord.media Jump to article: therecord.media/medusa-ransomware-mississippi-cyber
-
Health workers call for Palantir to be booted from NHS contracts
Health justice charity Medact warns that Palantir’s involvement in NHS data systems is a threat to patients and healthcare organisations First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640417/Health-workers-call-for-Palantir-to-be-booted-from-NHS-contracts
-
Health workers call for Palantir to be booted from NHS contracts
Health justice charity Medact warns that Palantir’s involvement in NHS data systems is a threat to patients and healthcare organisations First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640417/Health-workers-call-for-Palantir-to-be-booted-from-NHS-contracts
-
Health workers call for Palantir to be booted from NHS contracts
Health justice charity Medact warns that Palantir’s involvement in NHS data systems is a threat to patients and healthcare organisations First seen on computerweekly.com Jump to article: www.computerweekly.com/news/366640417/Health-workers-call-for-Palantir-to-be-booted-from-NHS-contracts

