Russia-linked advanced persistent threat (APT), Midnight Blizzard, has launched a large-scale spear-phishing campaign, targeting over 1,000 users across more than 100 organizations. Noted for its involvement in past high-profile hacks, the group is said to be using signed RDP configuration files to gain access to targeted devices, thereby extending local system resources to their server. Entities in government, defense, academia, NGO, and other sectors have been targeted, with victims being found in the UK, Europe, Australia, and Japan.

How health systems are future-proofing supply chains
Hospital supply chain leaders are calling for strategies to future-proof supply operations, reduce uncertainty and protect patient care amid rising costs. Here are responses from