Hospitals and health systems are tracking vulnerabilities in their network infrastructure, that of their vendors and widely used fourth-party tools. Meanwhile, bad actors are finding ways to target large organizations, regional hospitals and patients themselves.
Stolen Oklahoma patient health…
Source: www.healthcareitnews.com – Read more

Analyzing Threat Actor Infrastructure to Detect Patterns of Cyber Attacks
Hey there, Bay Area pals! How’s it about we sit back, grab a coffee, and dish about something a bit techy but super relevant in