Claroty Team82 reports that 63% of known exploited vulnerabilities identified by the Cybersecurity and Infrastructure Security Agency (CISA) are found on healthcare organization networks, according to Dark Reading.

Outlaw Group Uses SSH Brute-Force to Deploy Cryptojacking Malware on Linux Servers
Cybersecurity researchers have revealed details about Outlaw, an “auto-propagating” cryptocurrency mining botnet that targets SSH servers with weak credentials. The Romanian-origin malware performs SSH brute-force