Tag: healthcare
-
Health Sector Braces for Stryker Hack Supply Chain Shock
Medical Device Manufacturer Hack Was Likely Opportunistic. An Iranian cyberattack on medical device maker Stryker’s internal IT environment does not appear to affect connected products used by the company’s healthcare clients. But an outage of Stryker’s electronic ordering system could lead to supply chain issues for its customers. First seen on govinfosecurity.com Jump to article:…
-
Robotics surgical biz Intuitive discloses phishing attack
Operations and hospital networks not affected, we’re told First seen on theregister.com Jump to article: www.theregister.com/2026/03/16/robotics_surgical_biz_intuitive_discloses/
-
Robotics surgical biz Intuitive discloses phishing attack
Operations and hospital networks not affected, we’re told First seen on theregister.com Jump to article: www.theregister.com/2026/03/16/robotics_surgical_biz_intuitive_discloses/
-
Stryker says hospital tools are safe, but digital ordering systems still down after cyberattack
Electronic ordering systems belonging to the medical device company Stryker are still down a week after a cyberattack believed to have wiped thousands of company devices of all information. The company said its digital products are safe for use. First seen on therecord.media Jump to article: therecord.media/stryker-cyberattack-impact-iran
-
How do AI-driven solutions fit upscale budgets
Is Your Organization Ready to Harness the Power of AI Solutions for Budget Management? An often overlooked aspect is the management of Non-Human Identities (NHIs). With industries like financial services, healthcare, and DevOps rely increasingly on cloud-based infrastructures, the need for advanced security management has never been greater. But how does this fit? Understanding the……
-
Payload Ransomware claims the hack of Royal Bahrain Hospital
The Payload Ransomware group claims to have breached the Royal Bahrain Hospital (RBH), a leading healthcare facility in Bahrain. The Payload Ransomware group claims to have hacked the Royal Bahrain Hospital (RBH) and stolen 110 GB of data. The ransomware gang added the healthcare facility to its Tor data leak site and published the images…
-
Are healthcare data systems supported by NHIs effectively
Can Machine Identities Be the Key to Greater Security in Healthcare Data Systems? Where data breaches are alarmingly frequent, the role of Non-Human Identities (NHIs) in safeguarding healthcare data systems has garnered increased attention. Understanding and harnessing the power of NHIs can significantly mitigate risks, enhance compliance, and improve operational efficiency across various industries, including……
-
Conducting a Security Risk Analysis Under Legal Privilege
Attorneys can conduct security risks assessments under the color of client privilege, making it less likely to surface in discovery during litigation. But healthcare firms should consider the cons before they take that route, said attorney Adam Greene, partner at the law firm Davis Wright Tremaine. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/conducting-security-risk-analysis-under-legal-privilege-i-5538
-
Navigating Cybersecurity Obstacles in Rural Healthcare
Real and intense financial pressures on rural and small healthcare clinics mandate making difficult decisions on allocating funds to cybersecurity, said Greg Sieg, CISO at the University of Michigan Regional Health Network. The funding is just not there. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/navigating-cybersecurity-obstacles-in-rural-healthcare-i-5537
-
AI-HealthTech Innovator Humata Health Partners with AccuKnox for Zero Trust CNAPP
Menlo Park, California, USA, March 13th, 2026, CyberNewswire AI-HealthTech innovator Humata Health announced that it is partnering with AccuKnox, a leader in Code to Cognition Security, Zero Trust Cloud-Native Application Protection Platform (CNAPP), to streamline security for its SaaS platform. Healthcare Security Requirements To meetHIPAAmandates, the company adopted an on-prem deployment supported by AccuKnox. By…
-
AI-HealthTech Innovator Humata Health Partners with AccuKnox for Zero Trust CNAPP
Menlo Park, California, USA, March 13th, 2026, CyberNewswire AI-HealthTech innovator Humata Health announced that it is partnering with AccuKnox, a leader in Code to Cognition Security, Zero Trust Cloud-Native Application Protection Platform (CNAPP), to streamline security for its SaaS platform. Healthcare Security Requirements To meetHIPAAmandates, the company adopted an on-prem deployment supported by AccuKnox. By…
-
Inside the Tehran-Linked ‘Faketivist’ Hacking Group Handala
Healthcare Hit Shows Symbols Matter as Iran Shifts Focus to Economic Damage. Cybersecurity experts say that the Handala hacktivist group that claimed credit for attacks against two American firms on Wednesday is run by the Iranian government. The shift to destructive cyberattacks parallels Iran’s attempt to inflict greater economic damage on the United States and…
-
Inside the Tehran-Linked ‘Faketivist’ Hacking Group Handala
Healthcare Hit Shows Symbols Matter as Iran Shifts Focus to Economic Damage. Cybersecurity experts say that the Handala hacktivist group that claimed credit for attacks against two American firms on Wednesday is run by the Iranian government. The shift to destructive cyberattacks parallels Iran’s attempt to inflict greater economic damage on the United States and…
-
How Medical Device Cyber Challenges Could Become Easier
Medical device cyber challenges are among the most complex for manufacturers and healthcare delivery organizations for a variety of reasons, but there are some promising developments underway that could help ease the pain, said Phil Englert of the Health Information Sharing and Analysis Center. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/how-medical-device-cyber-challenges-could-become-easier-i-5536
-
‘Systemic Risk’ Stalks Healthcare Sector
For the U.S. healthcare ecosystem, the 2024 ransomware attack on Change Healthcare proved to be a supply-chain earthquake in showcasing critical third-party risk that entities now must carefully and urgently consider, said Erik Decker, CISO of Intermountain Health and a federal cyber adviser. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/systemic-risk-stalks-healthcare-sector-i-5535
-
Phishers hide scam links with IPv6 trick in “free toothbrush” emails
United Healthcare impersonators are using an IPv6 trick to hide the real destination of phishing links in emails promising free Oral-B toothbrushes. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/03/phishers-hide-scam-links-with-ipv6-trick-in-free-toothbrush-emails/
-
Medical Device Concerns for a Post-Quantum World
Long-life medical devices – products typically used for a decade or longer – are among the most post-quantum, cryptographically vulnerable technologies in healthcare, said Joern Lubadel, global head of product security at German-based medical device and healthcare products maker B. Braun. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/medical-device-concerns-for-post-quantum-world-i-5533
-
Stretching Cyber Resources in Rural Healthcare
Rural hospitals and clinics continue to struggle with a lack of cyber resources but a federal grant program set to provide $50 billion worth of funding across all 50 states could hopefully help lessen some of the pain, said Jim Roeder, VP of IT at Lakewood Health System in Minnesota. First seen on govinfosecurity.com Jump…
-
How Healthcare Can Get Started Addressing Post-Quantum Risk
Many healthcare sector organizations are delaying to even begin contemplating – let alone strategizing – how to mitigate post-quantum risk – but procrastination is a major mistake, said Ali Youssef, director of emerging tech security, at Henry Ford Health. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/how-healthcare-get-started-addressing-post-quantum-risk-i-5530
-
Cyberattack Forces Polish Hospital Revert to Paper-Based Operations
The Independent Public Regional Hospital in the western Polish city of Szczecin has been compelled to switch back to a paper-based workflow after suffering a cyberattack over the weekend. Hospital authorities confirmed that the incident, which struck the facility’s IT system on the night of March 7-8, 2026, has temporarily disrupted digital operations, though patients’…
-
Hackers Use Microsoft Teams to Manipulate Employees Into Allowing Remote Access
A newly discovered malware operation is targeting employees at finance and healthcare organizations by posing as internal IT support. Once inside, the attackers deploy a stealthy new tool called the A0Backdoor. Cybersecurity researchers at BlueVoyant have identified a threat group, known as Blitz Brigantine or Storm-1811, using email bombing and Microsoft Teams messages to trick…
-
Microsoft Teams phishing targets employees with A0Backdoor malware
Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece of malware called A0Backdoor. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/
-
Microsoft Teams phishing targets employees with A0Backdoor malware
Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece of malware called A0Backdoor. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/
-
How to feel empowered by your NHIs and AI
How Do Non-Human Identities Navigate the Complexities of Cybersecurity? Where artificial intelligence and cloud technologies are reshaping industries, how can organizations ensure their cybersecurity measures keep pace? For professionals across financial services, healthcare, travel, and tech-heavy fields like DevOps and Security Operations Centers (SOC), the key lies in effective management of Non-Human Identities (NHIs). These……
-
Microsoft Teams phishing targets employees with backdoors
Hackers contacted employees at financial and healthcare organizations over Microsoft Teams to trick them into granting remote access through Quick Assist and deploy a new piece of malware called A0Backdoor. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/microsoft-teams-phishing-targets-employees-with-backdoors/
-
President Trump’s Cyber Strategy for America: What It Means for the U.S. and Why It Matters Globally
Tags: access, ai, awareness, business, ceo, cloud, compliance, computing, cryptography, cyber, cybercrime, cybersecurity, data, defense, exploit, governance, government, healthcare, incident response, infrastructure, intelligence, international, malicious, network, regulation, resilience, risk, skills, startup, strategy, supply-chain, technology, threat, tool, training, usa, vulnerability, zero-trustPresident Trump’s Cyber Strategy for America signals a shift toward risk-based security and cooperation across emerging technologies. While centered on U.S. interests, the strategy provides a blueprint to collectively strengthen global cyber resilience. Key takeaways Cybersecurity as a global security imperative: The strategy signals that cybersecurity has evolved beyond a mere “IT issue” to become…
-
Going Passwordless in Healthcare: Overcoming Hurdles
Healthcare CISOs and their teams often contemplate the benefits of going passwordless in their organizations but face pushback from clinicians concerned that the new tech will slow down their access to critical patient care systems or disrupt their workflow. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/going-passwordless-in-healthcare-overcoming-hurdles-i-5528
-
Cognizant’s TriZetto Provider Solutions data breach impacted over 3.4 million patients
A breach at Cognizant’s TriZetto Provider Solutions exposed sensitive health data belonging to more than 3.4 million patients. A data breach at Cognizant’s TriZetto Provider Solutions exposed sensitive information belonging to more than 3.4 million patients. At this time, no ransomware group has claimed responsibility for the attack yet. TriZetto Provider Solutions is a healthcare…
-
PQC roadmap remains hazy as vendors race for early advantage
Tags: attack, cisco, communications, control, crypto, cryptography, data, encryption, finance, firmware, gartner, google, grc, guide, Hardware, healthcare, identity, infrastructure, monitoring, network, nist, risk, software, technology, threat, tool, vpn, vulnerabilitySome are already ahead as the migration question looms: One of the earliest vendors to operationalize cryptographic discovery specifically for PQC readiness was Sandbox AQ, which emerged from Google’s quantum research efforts. As early as 2022, the company argued that enterprises needed to inventory cryptography assets long before post-quantum algorithms could be deployed at scale.Initially…

