Health care IT workers report increased cyberattacks affecting patient care

More than half of the respondents to a health care cybersecurity survey say their organizations suffered a ransomware attack in the past year.

healthcare news

FBI, CISA, Treasury: North Korean hackers taking aim at health care with Maui ransomware

by Tim Starks

The ransomware has previously received little public scrutiny.

Senators push for more frequent medical device cybersecurity guidance from FDA

by Tonya Riley

Cybersecurity threats against health care have skyrocketed in recent years.

Hospital hallway robots get patches for potentially serious bugs

by Joe Warminsky

Five zero-days found in Aethon TUG robots included one that could allow an attacker to control the machines, Cynerio said.

The Cyberspace Solarium Commission pushed some major policies into law. So what now?

by Tim Starks

It's going to track how its recommendations are implemented, and study some issues where it only scratched the surface.

Forescout acquires medical IoT security company CyberMDX

by Joe Warminsky

Cyber MDX is known for its research into potential cyberthreats against connected health care devices like patient monitors and infusion pumps.

Portuguese media empire struck in the latest cyberattack on news outlets

by Tim Starks

The Impresa Group joins the Jerusalem Post and the largest news organization in Norway among the recent victims.

Industry group sounds alarm over 'Tardigrade' malware targeting biomanufacturing sector

by Tim Starks

The malware shows a "significant level of autonomous decision-making ability."

Ransomware fueled record year for UK cyber response

by Tim Starks

Attacks on health care were among the most predominant.

Canadian health systems recovering from breach that forced thousands of appointment cancellations

by Tim Starks

Attackers caused outages that lasted more than a week, though details have been scant.

Hackers with Chinese links breach defense, energy targets, including one in US

by Tim Starks

The goal, seemingly, was "the gathering and exfiltration of sensitive documents from the compromised organization."