An advanced persistent threat (APT) group, known as TA402 and supported by pro-Palestinian entities, has been conducting a phishing campaign against Israeli individuals and organizations. The group has been distributing IronWind malware through official-looking email attachments related to the Gulf Cooperation Council’s Economic Cooperation Program. The malware, which allows for the loading of additional malware like trojans or keyloggers to steal data, reportedly began operating in July 2023. Proofpoint suggested organizations undertake cybersecurity training, system upgrading, and continuous supervision of suspicious activities.
Changes Are Likely on the Horizon for the Federal Healthcare Portfolio in Areas Including Cybersecurity and Regulatory Enforcement | Bond Schoeneck & King PLLC
Republican victories in recent US federal elections could affect how the healthcare sector will be regulated. Changes are expected as the focus shifts from a