CDT, eHI Unveil Draft Consumer Health Data Privacy Framework
The Center for Democracy and Technology (CDT) and eHealth Initiative and Foundation (eHI) released its draft consumer health data privacy framework designed to define data in need...Key Needs for a Resilient Healthcare Information Security Program
The Office of Civil Rights recently shared ways an IT asset inventory can create a more effective risk analysis to close information security gaps and support HIPAA compliance. Given the...OCR: IT Asset Inventory Can Improve HIPAA-Required Risk Analysis
The Office for Civil Rights recently shared a detailed list of IT asset inventory steps, which can help covered entities and their business associates better fulfill the HIPAA Security Rule...Credential Theft Via Spoofed Login Pages Increase, Healthcare Top Target
A new IRONSCALES report found a drastic increase in successful credential theft attempts sent through spoofed login pages and social engineering attacks during the first half of...FBI, CISA Alert of Surge in Vishing Cyberattacks on Remote Workers
Hackers are targeting employees working remotely amid the COVID-19 pandemic with a voice phishing, or “vishing,” campaign to obtain enterprise login credentials for mining...Search Engines May Expose Patient Health Information, ACR warns
New search engine capabilities may inadvertently expose patient identifiers and other protected health information, according to a warning from the American College of Radiology...Ransomware Attack Impacts Medical Debt Collections Firm R1 RCM
Medical debt collections firm R1 RCM recently confirmed its systems were taken down in response to a ransomware attack that lasted for at least a week, according to KrebsOnSecurity. R1...Brute-Force P2P Botnet Targeting SSH Servers of Medical Centers, Banks
Guardicore researchers are warning organizations of a sophisticated peer-to-peer botnet, which has been actively breaching SSH servers since January 2020. Known as FritzFrog,...IBM: Remote Exploit Flaw Found in Millions of Connected IoT Devices
IBM X-Force Red security researchers uncovered a bug in components made by the manufacturer Thales, which are included in millions of connected devices. The IoT...CISA Alerts to Phishing Campaign Deploying KONNI RAT Malware
Hackers are using a phishing campaign to deploy KONNI malware, a remote access trojan (RAT), via Microsoft Word documents containing malicious Visual Basic Application (VBA) macro...Judge Dismisses Heritage Valley Malware Lawsuit Against Nuance
A federal judge for the US District Court of the Western District of Pennsylvania has filed a motion to dismiss the lawsuit against Nuance Communications, filed by Heritage Valley Health System...Blackbaud Ransomware Hack Affects 657K Maine Health System Donors
A ransomware attack on healthcare business associate Blackbaud compromised the data from 657,392 donors, potential donors, and patients who support the Northern Light Health...9 GitHub Repositories Found Leaking Health Data from Over 150K Patients
Improper access controls have left the data of more than 150,000 to 200,000 patients, and likely more, exposed online in at least nine GitHub repositories, shining a light on the need for...Sponsored by Jumio