Attackers used adversary-in-the-middle attacks to steal passwords, hijack sign-in sessions and skip authentication and then use victim mailboxes to launch BEC attacks against other targets.
Source: Healthcareitnews.com and Read More
Healthcare IT Faces Disruption and Innovation Challenges as GOP Budget Cuts Loom: Insights From Black Book Weekly Survey
Proposed federal healthcare budget cuts could disrupt the healthcare IT sector, according to a survey from Black Book Research. The study revealed operational challenges, areas