Tag: healthcare
-
The “Analog Panic Button”: What The Pitt Gets Right (and Wrong) About Hospital Cyber Resilience
When ransomware hits a hospital, shutting everything down isn’t resilience. Learn how healthcare CISOs prevent hospital-wide outages with identity security, network segmentation validation, and CTEM. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/the-analog-panic-button-what-the-pitt-gets-right-and-wrong-about-hospital-cyber-resilience/
-
UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025.The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor.”Dohdoor utilizes the DNS-over-HTTPS…
-
UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025.The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor.”Dohdoor utilizes the DNS-over-HTTPS…
-
UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025.The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor.”Dohdoor utilizes the DNS-over-HTTPS…
-
UAT-10027 Targets U.S. Education and Healthcare with Dohdoor Backdoor
A previously undocumented threat activity cluster has been attributed to an ongoing malicious campaign targeting education and healthcare sectors in the U.S. since at least December 2025.The campaign is being tracked by Cisco Talos under the moniker UAT-10027. The end goal of the attacks is to deliver a never-before-seen backdoor codenamed Dohdoor.”Dohdoor utilizes the DNS-over-HTTPS…
-
KLAS Research zeichnet Claroty als Top-Performer im Bereich Healthcare-IoT-Sicherheit aus
Claroty wurde vom renommierten Healthcare-Analyseunternehmen KLAS Research als Top-Performer für IoT-Sicherheit im Gesundheitswesen ausgezeichnet. In dem Report ‘2026 Best in KLAS Awards: Software and Services Report” erhielt der Spezialist für die Sicherheit cyberphysischer Systeme eine Gesamtbewertung von 92,5 von 100 Punkten. Diese basiert auf Kundenbewertungen von 35 verschiedenen Gesundheitseinrichtungen und spiegelt so die Erfahrungen im…
-
5 trends that should top CISO’s RSA 2026 agendas
Tags: access, ai, attack, authentication, backup, business, cio, ciso, cloud, conference, control, corporate, cryptography, cyber, cybersecurity, data, defense, detection, edr, finance, framework, governance, group, healthcare, identity, incident response, intelligence, network, okta, resilience, risk, saas, service, skills, software, strategy, tactics, technology, threat, tool, training, update, vulnerability, zero-trustCTEM in the spotlight: In another evolutionary trend, most organizations are moving beyond scanning for software snafus to continuous threat exposure management (CTEM). By doing so, security teams hope to get a full picture of all assets, as well as their configurations, locations, software vulnerabilities, ownership, and business criticality.Armed with this data, CTEM platforms look…
-
Medical Device Maker Reports Data Theft Hack to SEC
Attack Spotlights Threats, Risks Facing Healthcare Supply Chain. UFP Technologies, a Massachusetts-based maker of single-use medical devices and other healthcare supplies, has notified the U.S. Securities and Exchange Commission of a cyber incident discovered on Valentine’s Day that involved the theft or destruction of company data. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/medical-device-maker-reports-data-theft-hack-to-sec-a-30847
-
North Korea’s Lazarus Group targets healthcare orgs with Medusa ransomware
New ransomware of choice, same critical targets First seen on theregister.com Jump to article: www.theregister.com/2026/02/24/north_koreas_lazarus_group_healthcare_medusa_ransomware/
-
North Korean Lazarus Group Expands Ransomware Activity With Medusa
Ransomware Medusa linked to North Korean hackers targets US healthcare amid ongoing attacks First seen on infosecurity-magazine.com Jump to article: www.infosecurity-magazine.com/news/north-korean-lazarus-group-medusa/
-
North Korean Hackers Continue to Target US Healthcare
Tags: attack, extortion, group, hacker, healthcare, intelligence, lazarus, north-korea, ransomware, threatReport: Lazarus Group Pivoting to Medusa Ransomware for Extortion Attacks. North Korean-state backed Lazarus Group hackers are using Medusa ransomware in extortion attacks on U.S. healthcare entities despite a 2024 U.S. indictment of Rim Jong Hyok, an alleged member of the Lazarus subgroup Stonefly, according to a new threat intelligence report. First seen on govinfosecurity.com…
-
Lazarus Group Uses Medusa Ransomware in Middle East and U.S. Healthcare Attacks
Tags: attack, group, healthcare, intelligence, korea, lazarus, middle-east, north-korea, ransomware, threatThe North Korea-linked Lazarus Group (aka Diamond Sleet and Pompilus) has been observed using Medusa ransomware in an attack targeting an unnamed entity in the Middle East, according to a new report by the Symantec and Carbon Black Threat Hunter Team.Broadcom’s threat intelligence division said it also identified the same threat actors mounting an unsuccessful…
-
North Korean state hackers seen using Medusa ransomware in attacks on US, Middle East
Tags: attack, country, cybersecurity, hacker, hacking, healthcare, lazarus, middle-east, military, north-korea, ransomwareCybersecurity researchers said they saw Medusa attacks launched by members of Lazarus, a well-known North Korean hacking operation housed within the country’s military, against a company in the Middle East and a healthcare organization in the U.S. First seen on therecord.media Jump to article: therecord.media/north-korean-hackers-using-medusa-ransomware
-
North Korean Lazarus group linked to Medusa ransomware attacks
North Korean state-backed hackers associated with the Lazarus threat group are targeting U.S. healthcare organizations in extortion attacks using the Medusa ransomware. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/north-korean-lazarus-group-linked-to-medusa-ransomware-attacks/
-
Everest ransomware hits Vikor Scientific ‘s supplier, data of 140,000 patients stolen
Everest ransomware claims an attack on diagnostic firm Vikor Scientific (Vanta Diagnostics), exposing data of nearly 140,000 people. The Everest ransomware group has claimed responsibility for a cyberattack on Vikor Scientific, now operating as Vanta Diagnostics. The healthcare diagnostic firm disclosed a data breach impacting nearly 139,964 individuals, as reported by the US Department of…
-
What makes Agentic AI capable in secrets scanning
How Can Organizations Securely Manage Non-Human Identities? Have you ever considered how important it is to manage machine identities within your organization’s cybersecurity framework? Non-Human Identities (NHIs) are becoming increasingly crucial with digital evolves, particularly in industries like financial services, healthcare, and cloud-based services. With the surge in cloud computing, the gap between security teams……
-
The Danger of IT, OT, Medical Device Cyber Turf Wars
What often appears to be turf wars between healthcare technology management, facilities OT staff, IT departments and security teams are often the result of unclear ownership and accountability for device security. And that presents safety risks to patients, says Mohamed Waqas, CTO of Armis. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/interviews/danger-it-ot-medical-device-cyber-turf-wars-i-5526
-
Mississippi Healthcare System Shuts Down Clinics After Ransomware Attack
The University of Mississippi Medical Center shut down operations at its 35 medical clinics around the state following a ransomware attack. Healthcare facilities are top targets for cybercriminals, who look to steal the sensitive data they hold for both money and intelligence gathering. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/mississippi-healthcare-system-shuts-down-clinics-after-ransomware-attack/
-
How does NHI impact innovation in cloud-native security solutions
Are Organizations Fully Realizing the Potential of Non-Human Identities in Cloud-Native Security Solutions? Where businesses continually strive for digital transformation, how do they ensure their security infrastructures evolve at the same swift pace when their innovative endeavors? For sectors like financial services, healthcare, and DevOps, where sensitive data is the currency of trust, the stakes……
-
Hospitals at Risk of BeyondTrust Ransomware Hacks
Critical Vulnerability Could Give Attackers Foothold in Clinical Networks. Federal authorities and industry officials are urging healthcare sector entities to address a critical flaw in BeyondTrust Remote Support and Privileged Remote Access software, which if exploited, could give an attacker a foothold inside a hospital or clinic network. First seen on govinfosecurity.com Jump to article:…
-
Univ. of Mississippi Medical Center Dealing With Cyberattack
Hospital, ER Open but All Clinics, Elective Care Cancelled Statewide; FBI Called In. The University of Mississippi Medical Center on Thursday said a ransomware attack has triggered its emergency operations plan and forced its hospitals to cancel all clinic and elective procedures at all locations statewide. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/univ-mississippi-medical-center-dealing-cyberattack-a-30808
-
Why must healthcare embrace Agentic AI for data protection
Are Non-Human Identities the Key to Unlocking Agentic AI in Data Protection? Organizations across industries are increasingly focusing on the management of Non-Human Identities (NHIs). These machine identities, akin to digital passports, play a pivotal role in cybersecurity by managing encrypted passwords, tokens, and keys. Yet, how can NHIs serve as the cornerstone for Agentic……
-
Are cloud environments truly protected by NHIs?
What Makes Non-Human Identities Critical for Cloud Security? Have you considered how essential Non-Human Identities (NHIs) are when it comes to securing cloud environments? From the financial services industry to healthcare, these machine identities play a pivotal role in bolstering an organization’s cloud security infrastructure. While we delve into their significance, let’s explore the strategic……
-
Are cloud environments truly protected by NHIs?
What Makes Non-Human Identities Critical for Cloud Security? Have you considered how essential Non-Human Identities (NHIs) are when it comes to securing cloud environments? From the financial services industry to healthcare, these machine identities play a pivotal role in bolstering an organization’s cloud security infrastructure. While we delve into their significance, let’s explore the strategic……
-
Norton Healthcare to Pay $11M to Settle BlackCat Lawsuit
Cybercrime Gang Allegedly Stole 4.7 Terabytes of Data, Affecting 2.5M. Norton Healthcare, which operates nine hospitals and other care facilities in Kentucky and Indiana, has agreed to pay $11 million to settle class action litigation stemming from a 2023 data theft attack by ransomware-as-a-service gang Alphv/BlackCat that affected nearly 2.5 million people. First seen on…
-
Why Healthcare Became Ransomware’s Favorite Target: A $4.4M Lesson Every CISO Needs
3 million patients couldn’t access healthcare after PIH Health’s ransomware attack. Here’s why hospitals are ransomware’s favorite target”, and what changes. First seen on securityboulevard.com Jump to article: securityboulevard.com/2026/02/why-healthcare-became-ransomwares-favorite-target-a-4-4m-lesson-every-ciso-needs/
-
CISO Julie Chatman offers insights for you to take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…
-
CISO Julie Chatman offers insights for you to take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…
-
A security flaw at DavaIndia Pharmacy allowed attackers to access customers’ data and more
A security flaw at DavaIndia Pharmacy exposed customer data and gave outsiders full admin control of its systems. DavaIndia is a large Indian pharmacy retail chain focused on selling affordable generic medicines. Operated by Zota Health Care Ltd., the brand promotes low-cost alternatives to branded drugs to make healthcare more accessible across India. DavaIndia runs…
-
CISO Julie Chatman wants to help you take control of your security leadership role
Tags: access, ai, attack, awareness, breach, business, ciso, control, crowdstrike, cyber, cybersecurity, deep-fake, email, finance, firewall, government, healthcare, infrastructure, law, military, office, phishing, risk, service, skills, supply-chain, technology, threat, training, updateFirst, the hopes-and-dreams budget: What would it take to close all the known gaps and operate proactively?Second, the could-live-with-this budget: What’s realistic and gets you to acceptable risk levels?Third, the I-think-I’m-going-to-resign budget: Because you can see a breach coming and you don’t want your name attached to it.You probably won’t end up at that last…

