This Week Health

Interviews in Action

More
This Week Health is a series of IT podcasts dedicated to healthcare transformation powered by the community

What would you like to learn about today?

Error!
No 'SiteSearch360Widget' widget registered in this installation.

Latest Episodes
View All
Popular Episodes
R25 - Podcasts Category Filter-2
  • All
  • Leadership (729)
  • Emerging Technology (583)
  • Security (334)
  • Patient Experience (311)
  • Interoperability (310)
  • Financial (308)
  • Analytics (185)
  • Telehealth (178)
  • Clinician Burnout (172)
  • Digital (168)
  • AI (167)
  • Legal & Regulatory (146)
  • Cloud (92)
View All
In the News

The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind

April 5, 2024

The article delves into the highly sophisticated supply chain attack involving XZ Utils, a compression utility embedded within numerous Linux distributions. This scheme, years in the making and likely the work of state-sponsored hackers, was orchestrated under the guise of "Jia Tan" – a fabricated persona who ingratiated themselves within the open-source community before implementing a malicious backdoor in the software. The meticulous planning and technical prowess displayed in the attack point to a nation-state’s involvement, with China, Russia, and North Korea being prime suspects. The incident not only highlights the burgeoning threat of supply chain attacks but also raises questions about the true identities and affiliations of contributors to open-source projects, suggesting a need for increased vigilance and scrutiny in the future.

The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind Wired

Read More

Federal government affected by Russian breach of Microsoft

April 5, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive in response to a significant breach of Microsoft by a Russian hacking group known as Midnight Blizzard. This move comes after the discovery that Russian operatives had accessed emails of senior Microsoft executives and, later, its source code. The directive aims to assist federal agencies in mitigating the risks posed by the breach, emphasizing the collaboration with Microsoft to provide necessary guidance. This incident is part of a pattern of security challenges Microsoft faces, with previous breaches by Russian and Chinese hackers prompting criticism of Microsoft's security and risk management practices. Midnight Blizzard, attributed to Russia's foreign intelligence service and known for high-profile cyberespionage activities, underscores ongoing concerns about cybersecurity at major technology firms.

Federal government affected by Russian breach of Microsoft CyberScoop

Read More

Cybercriminals pose as hospital finance employees, divert payments

April 5, 2024

A new cybercriminal tactic targeting hospital IT help desks aims to access computer systems and divert payments by impersonating health system finance employees to request password resets and new device enrollments. The American Hospital Association (AHA) warns that once access is granted, these cybercriminals can bypass multi-factor authentication, access sensitive email accounts, redirect payments to fraudulent accounts, and insert malware. The AHA advises health systems to strengthen IT help desk protocols and employ verification methods like callback procedures, video calls, and ID verification to combat these social engineering attacks. The FBI has assisted in recovering payments if notified promptly, highlighting the ongoing threat this scheme poses.

Cybercriminals pose as hospital finance employees, divert payments Beckers Hospital Review

Read More

DHS blames ‘cascade of security failures at Microsoft’ for China hack on US government

April 5, 2024

A Department of Homeland Security review, conducted by the Cyber Safety Review Board (CSRB), found that Chinese hackers, known as Storm-0558, accessed the emails of senior U.S. officials including U.S. Commerce Secretary and others, exploiting a series of security failures at Microsoft. The report, which scrutinized a 2023 incident affecting 22 organizations and 503 individuals worldwide, criticized Microsoft for a corporate culture that deprioritized security investments and risk management, leading to the breach. The hackers were able to infiltrate Microsoft systems and download approximately 60,000 emails from the State Department by exploiting operational flaws and obtaining a critical signing key, the origin of which Microsoft has yet to identify. The CSRB report, which also linked the hackers to previous significant cyber incidents, emphasized the need for Microsoft to overhaul its security culture and implement the recommended security improvements urgently to protect against nation-state threats.

DHS blames ‘cascade of security failures at Microsoft’ for China hack on US government The Record

Read More

The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind

April 5, 2024

The article delves into the highly sophisticated supply chain attack involving XZ Utils, a compression utility embedded within numerous Linux distributions. This scheme, years in the making and likely the work of state-sponsored hackers, was orchestrated under the guise of "Jia Tan" – a fabricated persona who ingratiated themselves within the open-source community before implementing a malicious backdoor in the software. The meticulous planning and technical prowess displayed in the attack point to a nation-state’s involvement, with China, Russia, and North Korea being prime suspects. The incident not only highlights the burgeoning threat of supply chain attacks but also raises questions about the true identities and affiliations of contributors to open-source projects, suggesting a need for increased vigilance and scrutiny in the future.

The Mystery of ‘Jia Tan,’ the XZ Backdoor Mastermind Wired

Read More

Federal government affected by Russian breach of Microsoft

April 5, 2024

The Cybersecurity and Infrastructure Security Agency (CISA) has issued an emergency directive in response to a significant breach of Microsoft by a Russian hacking group known as Midnight Blizzard. This move comes after the discovery that Russian operatives had accessed emails of senior Microsoft executives and, later, its source code. The directive aims to assist federal agencies in mitigating the risks posed by the breach, emphasizing the collaboration with Microsoft to provide necessary guidance. This incident is part of a pattern of security challenges Microsoft faces, with previous breaches by Russian and Chinese hackers prompting criticism of Microsoft's security and risk management practices. Midnight Blizzard, attributed to Russia's foreign intelligence service and known for high-profile cyberespionage activities, underscores ongoing concerns about cybersecurity at major technology firms.

Federal government affected by Russian breach of Microsoft CyberScoop

Read More

Cybercriminals pose as hospital finance employees, divert payments

April 5, 2024

A new cybercriminal tactic targeting hospital IT help desks aims to access computer systems and divert payments by impersonating health system finance employees to request password resets and new device enrollments. The American Hospital Association (AHA) warns that once access is granted, these cybercriminals can bypass multi-factor authentication, access sensitive email accounts, redirect payments to fraudulent accounts, and insert malware. The AHA advises health systems to strengthen IT help desk protocols and employ verification methods like callback procedures, video calls, and ID verification to combat these social engineering attacks. The FBI has assisted in recovering payments if notified promptly, highlighting the ongoing threat this scheme poses.

Cybercriminals pose as hospital finance employees, divert payments Beckers Hospital Review

Read More

DHS blames ‘cascade of security failures at Microsoft’ for China hack on US government

April 5, 2024

A Department of Homeland Security review, conducted by the Cyber Safety Review Board (CSRB), found that Chinese hackers, known as Storm-0558, accessed the emails of senior U.S. officials including U.S. Commerce Secretary and others, exploiting a series of security failures at Microsoft. The report, which scrutinized a 2023 incident affecting 22 organizations and 503 individuals worldwide, criticized Microsoft for a corporate culture that deprioritized security investments and risk management, leading to the breach. The hackers were able to infiltrate Microsoft systems and download approximately 60,000 emails from the State Department by exploiting operational flaws and obtaining a critical signing key, the origin of which Microsoft has yet to identify. The CSRB report, which also linked the hackers to previous significant cyber incidents, emphasized the need for Microsoft to overhaul its security culture and implement the recommended security improvements urgently to protect against nation-state threats.

DHS blames ‘cascade of security failures at Microsoft’ for China hack on US government The Record

Read More
View All
Insights by Kate Gamble
View All
Our Partners

Premier

Diamond Partners

Platinum Partners

Silver Partners

This Week Health
Healthcare Transformation Powered by Community

Questions about the Podcast?

Contact us with any questions, requests, or comments about the show. We love hearing your feedback.

Hello@ThisWeekHealth.com

Looking to connect or attend events? Visit our sister organization, 229 Project
Click here.

© Copyright 2024 Health Lyrics All rights reserved