2 min read
Understanding thread hijacking for ‘account update’ phishing
Hijacking communications between patients and providers often allows cybercriminals to extract information and solicit payments and other actions...
2 min read
Hijacking communications between patients and providers often allows cybercriminals to extract information and solicit payments and other actions...
2 min read
Access controls are the security protocols and measures that determine who can access specific resources, systems, or information within an...
2 min read
Consent phishing, also known as OAuth Exploits, is a form of cyberattack that exploits the truth recipients place on popular applications. By...
2 min read
During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, Rahul Gaitonde, HHS Cyber Security...
2 min read
On October 23, 2024, the HHS Cyber Security Operations Cyber Threat Intelligence Branch released a list of notable cyber threat actors, including...
2 min read
The rapid development of Artificial Intelligence (AI) opens the way for more sophisticated and focused cyberattacks. On October 23, 2024, at the...
2 min read
An incident response plan is a framework that equips healthcare organizations with the tools and protocols to manage and mitigate the impact of...
2 min read
UnitedHealth has confirmed that the February ransomware attack on Change Healthcare exposed the personal and healthcare data of over 100 million...
2 min read
Boston Children’s Health Physicians (BCHP) fell victim to a ransomware attack involving an IT vendor. The attacker, the BianLian group, is now...
2 min read
Officials from HHS and NIST focused on the importance of collaboration to enhance healthcare cybersecurity during the first day of the Safeguarding...
2 min read
During the recent Safeguarding Health Information: Building Assurance through HIPAA Security conference, the HHS urged healthcare organizations to...
3 min read
Healthcare organizations have faced an unprecedented surge in intrusion attempts, with a 50% increase in attacks compared to the previous year....
4 min read
Phishing attacks have become one of the most common cyber threats today, with hackers continuously refining their techniques to exploit unsuspecting...