Tag: healthcare
-
Driving Innovation with Secure NHIs
How Are Non-Human Identities Shaping the Future of Cybersecurity? What happens when machines need their own form of identification? This question is increasingly relevant as we dive deeper of Non-Human Identities (NHIs), which are revolutionizing the way organizations handle cybersecurity. In industries ranging from financial services to healthcare, and even in areas like travel and……
-
ALN, Octapharma Plasma Agree to Settle Breach Lawsuits
2 Firms Hit by Separate 2024 Attacks to Pay Total of $6.5M in Class Action Claims. A Nebraska-based revenue cycle management firm and a Swiss-based blood products manufacturer with plasma collection centers in the United States are the latest healthcare sector companies agreeing to pay multimillion dollar lawsuit settlements for two separate 2024 hacks affecting…
-
ISMG Editors: How the US Federal Shutdown Exposes Cyber Gaps
Also: Shutdown’s Ripple Effects on Healthcare, Mounting Threats to Aging OT Systems. In this week’s update, four ISMG editors discussed the fallout from the U.S. federal shutdown and the impact on state and regional cyber offices, the knock-on effects for healthcare, and the growing cyberthreats facing aging operational technology environments. First seen on govinfosecurity.com Jump…
-
USENIX 2025: PEPR ’25 Breaking Barriers, Not Privacy: Real-World Split Learning Across Healthcare Systems
Creator, Author and Presenter: Sravan Kumar Elineni Our thanks to USENIX for publishing their Presenter’s outstanding USENIX Enigma ’23 Conference content on the organization’s’ YouTube channel. Permalink First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/10/usenix-2025-pepr-25-breaking-barriers-not-privacy-real-world-split-learning-across-healthcare-systems/
-
Free Healthcare ‘Toolkit’ Ranks and Maps Third-Party Risk
Guide Helps Teams Prioritize, Recognizing Not All Vendors Pose Same Level of Risk. Third-party security risk is among the most complicated challenges facing the healthcare sector because of the wide variety of vendors involved and the critical products and services they provide. A new Health Sector Coordinating Council toolkit aims to help entities navigate those…
-
Free Healthcare ‘Toolkit’ Ranks and Maps Third-Party Risk
Guide Helps Teams Prioritize, Recognizing Not All Vendors Pose Same Level of Risk. Third-party security risk is among the most complicated challenges facing the healthcare sector because of the wide variety of vendors involved and the critical products and services they provide. A new Health Sector Coordinating Council toolkit aims to help entities navigate those…
-
Hospital Insider Breach Lasted 10 Years, Led to FBI Inquiry
Texas-Based Harris Health Says FBI Just Gave Green Light to Notify 5,000 Patients. Harris Health is contacting 5,000 patients about a breach involving a former employee who improperly accessed electronic health records for over a decade. The Texas health entity said it discovered and reported the incident four years ago to the FBI, which just…
-
Staying Ahead with Proactive NHI Security
How Do Non-Human Identities Impact Cybersecurity? With organizations increasingly adopt sophisticated technologies, the importance of securing Non-Human Identities (NHIs) grows ever more critical. But how can businesses ensure the safety of these machine identities? Understanding and managing these identities can provide considerable security leverage across various sectors, including financial services, healthcare, and more. Understanding Non-Human……
-
Are Your NHIs Capable Enough for New Threats?
Are Your Cybersecurity Measures Equipped to Handle the Unique Challenges of Non-Human Identities? Where cybersecurity threats evolve by the minute, are your cybersecurity measures truly robust enough to handle the increasing complexity of Non-Human Identities (NHIs)? The advent of cloud environments has redefined how organizations across financial services, healthcare, DevOps, and other industries manage their……
-
Stronger Oversight Needed as Healthcare Risks Multiply
The Edmund Group’s Adler on Managing Third- and Fourth-Party Risk in Healthcare. Healthcare organizations face growing risks from data distribution, vendor dependencies and global instability. Steven Adler, partner at The Edmund Group, discusses practical steps to strengthen vendor oversight and resilience. First seen on govinfosecurity.com Jump to article: www.govinfosecurity.com/stronger-oversight-needed-as-healthcare-risks-multiply-a-29651
-
Radiant Group won’t touch kids’ data now, but apparently hospitals are fair game
Ransomware crooks utterly fail to find moral compass First seen on theregister.com Jump to article: www.theregister.com/2025/10/06/radiant_group_hospital/
-
Meet ARGUS, the robot built to catch hackers and physical intruders
Hospitals, airports, and campuses are no longer dealing with separate security problems. Someone can slip past a checkpoint while another actor launches a network scan, and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/06/argus-robotic-security-system/
-
Meet ARGUS, the robot built to catch hackers and physical intruders
Hospitals, airports, and campuses are no longer dealing with separate security problems. Someone can slip past a checkpoint while another actor launches a network scan, and … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/10/06/argus-robotic-security-system/
-
Keeping Your Cloud Environment Safe
Why Is Non-Human Identity Management Crucial for Cloud Safety? How can organizations effectively manage Non-Human Identities (NHIs) to maintain cloud safety? For industries that heavily rely on digital infrastructure, such as financial services, healthcare, and even travel, managing NHIs can significantly enhance their cyber protection strategies. The key lies in understanding the role of NHIs……
-
Hospital Chain to Pay $7.6M to Settle Breach Litigation
Hospital Sisters Health System’s 2023 Hack Affected Nearly 900,000 People. A network of 13 Catholic hospitals, community health centers and clinics in the Midwest will pay $7.6 million and implement improvements to its data security practices to settle consolidated class action litigation filed in the aftermath of a 2023 hacking incident affecting nearly 900,000 people.…
-
Empower Your SOC Teams with Efficient NHIDR
How Can Non-Human Identities Revolutionize Cybersecurity? Where cyber threats increasingly target machine identities, how can organizations adapt their security strategies to manage these Non-Human Identities (NHIs) effectively? NHIs serve as the backbone for robust cybersecurity, enhancing the security posture of diverse sectors like financial services, healthcare, travel, and DevOps. For organizations utilizing cloud environments, effective……
-
OneBlood Agrees to Pay $1M Settlement in Ransomware Hack
2024 Cyberattack Was One of Several on Other Blood Suppliers in US, UK. OneBlood, which provides blood supplies to 250 hospitals in Florida, Georgia and the Carolinas, will pay $1 million to settle proposed class action litigation filed against the non-profit entity in the wake of a 2024 ransomware attack that compromised the information of…
-
Are Your Secrets Management Practices Up to Par?
Why Are Non-Human Identities Crucial in Cybersecurity? How often do we consider machine identities when contemplating cybersecurity measures? It’s clear that non-human identities (NHIs) are essential players in maintaining robust security frameworks. These identities, often overlooked, are vital in fortifying enterprises, particularly across industries such as healthcare, financial services, and beyond. Machine identities, while lacking……
-
Unveiling LummaStealer’s Technical Details Through ML-Based Detection Approach
In early 2025, LummaStealer was in widespread use by cybercriminals targeting victims throughout the world in multiple industry verticals, including telecom, healthcare, banking, and marketing. A sweeping law enforcement operation in May brought this all to an abrupt halt. After a quiet period, we are now seeing new variants of LummaStealer emerge. In light of…
-
150,000 Records of Home Health Care Firm Exposed on Web
Researcher Finds Database of Sensitive Patient Info With No Password Protection. An unencrypted database containing nearly 150,000 patient records of a California provider of home health and palliative care services was left exposed on the internet, said a cybersecurity researcher who discovered the unsecured data cache. Why does this keep happening in the healthcare sector?…
-
CISO Spotlight: AJ Debole on the Business-Tech Divide, Breach Readiness, and AI Risks
Tags: ai, breach, business, ciso, corporate, cyber, defense, government, healthcare, law, oracle, ransomware, riskAJ Debole is Field CISO at Oracle, but her journey began far from the corporate boardroom. After starting out in law and government, she moved into healthcare and cyber defense, where she led teams through ransomware crises. In this spotlight, she explores the next wave of challenges aligning security with business incentives, taming AI […]…
-
North Korean IT Worker Gains Access to Organization’s Network Through Innocent Job Application
In today’s complex threat landscape, adversaries increasingly favor “malware-less” intrusion methods that slip past traditional defenses. One particularly insidious scheme involves North Korean operatives posing as legitimate remote IT professionals to infiltrate corporate networks. Trellix researchers recently uncovered a campaign in which a fake applicant seamlessly advanced through hiring stages at a major U.S. healthcare…
-
North Korean IT Worker Gains Access to Organization’s Network Through Innocent Job Application
In today’s complex threat landscape, adversaries increasingly favor “malware-less” intrusion methods that slip past traditional defenses. One particularly insidious scheme involves North Korean operatives posing as legitimate remote IT professionals to infiltrate corporate networks. Trellix researchers recently uncovered a campaign in which a fake applicant seamlessly advanced through hiring stages at a major U.S. healthcare…
-
Delaware Health System Plans to Settle Rhysida Hack Lawsuit
Bayhealth Medical Center Was Among Cybercrime Group’s Many 2024 Healthcare Victims. Bayhealth Medical Center in Delaware – an alleged victim of a 2024 hack by the notorious and prolific ransomware gang Rhysida that resulted in a breach affecting nearly a half-million people – has agreed to a preliminary settlement in a proposed class action lawsuit…
-
Microsoft DCU’s Takedown of RaccoonO365
When I saw the name of the Microsoft Digital Crime Unit’s latest target, “RaccoonO365” I probably reacted to it differently than most. With the help of a friend in Lagos, we’ve been watching the money launderers and things have reached a point that they now refer to what we previously called “Business Email Compromise” or…
-
Data Trust Takes Center Stage at Healthcare Security Summit
CISOs, Regulators and Innovators Unite in New York to Safeguard Healthcare’s Future. From discussions on health data explosion to the keynote on AI deployment, the Healthcare Security Summit: New York offered practical strategies to manage data risks, ensure continuity of patient care and prepare for a regulatory landscape that is rapidly reshaping cybersecurity priorities. First…
-
Ambient AI Voice Agents in Healthcare: The Secret Weapon to Crush Clinician Burnout
Nearly half of U.S. clinicians report feeling burnt out and it’s not because they suddenly forgot how to love medicine. It’s because they’re drowning in…Read More First seen on securityboulevard.com Jump to article: https://securityboulevard.com/2025/09/ambient-ai-voice-agents-in-healthcare-the-secret-weapon-to-crush-clinician-burnout/
-
What Makes an AI Governance Framework Effective?
Key Takeaways Artificial intelligence is being adopted at a remarkable pace. Enterprises now use AI in customer service, fraud detection, logistics, healthcare diagnostics, and dozens of other areas. With this adoption comes a new category of risk. AI can improve efficiency and accuracy, but it can also introduce bias, expose sensitive data, create regulatory compliance……
-
Scattered Spider Sting: 2 English Teens Charged With Attacks
UK and US Charge Suspects With Hitting Transport for London, Healthcare, Others. Two English teenagers have been charged with disrupting London’s transport network as part of a Scattered Spider cyberattack. One of the suspects has also been accused by the U.S. of helping to attack 120 other victims, generating $115 million in ransom payments. First…

