Intel Hub

Healthcare Security Intelligence Hub

Resources for healthcare IT and security teams — from small practices to regional health systems. Ransomware defense, BEC response, HIPAA security monitoring, and what modern healthcare cybersecurity actually looks like.

Why Healthcare Security Is Different

Healthcare cybersecurity isn't just IT security with HIPAA checkboxes added. The threat model is different: ransomware in a hospital isn't a business continuity problem, it's a patient safety problem. Business email compromise targeting healthcare billing workflows has led to multi-million dollar fraud cases. Unauthorized EHR access can run undetected for months.

The security tools and practices that protect a retail business don't map cleanly onto a medical practice or health system. EHR systems, clinical devices, and the 24/7 operational requirements of patient care require a different approach to monitoring and response.

This hub covers the tactics, techniques, and procedures (TTPs) used against healthcare organizations — plus the detection and response approaches that actually work. We publish here because the threat landscape doesn't stop evolving, and annual security reviews don't keep pace.

If you manage security for a healthcare organization and want to discuss what coverage looks like for your environment, book an assessment.

Latest Healthcare Security Articles

Decoding PHALT#BLYX: How ClickFix Malware Targets the Hospitality Sector

A new PHALT#BLYX campaign is targeting the hospitality sector using ClickFix tactics and MSBuild abuse. Learn how to detect and stop this multi-stage malware.

Mar 5, 2026

SloppyLemming: Dissecting the Dual Malware Assault on South Asian Governments

New threat cluster SloppyLemming targets Pakistan and Bangladesh using BurrowShell and Rust-based payloads. Learn IOCs and defense.

Mar 4, 2026

California’s CPPA Cracks Down on Illegal Health Data Resales: A Compliance Wake-Up Call

California regulators are aggressively targeting unregistered brokers selling health data. Learn how this enforcement action impacts your data privacy strategy.

Mar 4, 2026

Beyond the Headlines: Analyzing UMMC’s Nine-Day Ransomware Ordeal and Recovery Roadmap

The University of Mississippi Medical Center restores operations after a crippling nine-day ransomware outage. We analyze the tactical implications for healthcare security.

Mar 4, 2026

Bypassing Security Gates: How OAuth Redirect Abuse Targets Government Agencies

Microsoft warns attackers are exploiting OAuth redirects to bypass email defenses and deliver malware to government sectors.

Mar 4, 2026

Lazarus Group Deploys Medusa Ransomware to Strike US Healthcare Sector

North Korean APT38 expands operations with Medusa ransomware, aggressively targeting US healthcare providers with double-extortion tactics.

Mar 4, 2026

Defend Against Havoc: Detecting Fake Tech Support's C2 Framework Deployment

Discover how scammers are using fake IT support to deploy Havoc C2 framework and learn detection strategies to protect your organization.

Mar 3, 2026

Lazarus Group Targets Healthcare with Medusa Ransomware: Analysis and Detection

North Korea’s Lazarus Group is actively deploying Medusa ransomware against Middle Eastern and U.S. healthcare entities. Learn detection strategies.

Mar 3, 2026

Frequently Asked Questions

Protect Your Healthcare Organization

Book a security assessment to review your current posture and identify the gaps that matter most for your environment.