Search Results
The default setting for search results displays All Content. If you prefer to see recent content only, please adjust the date filter.
Filter your results:
Types
Topics
4 Results Found
Become an AHA Preferred Cybersecurity and Risk Provider
Gain awareness and credibility with program to help AHA members prepare for and prevent cyberthreats with trusted and proven services and solutions
Guidelines for Secure AI System Development
This document recommends guidelines for providers of any systems that use artificial intelligence (AI), whether those systems have been created from scratch or built on top of tools and services provided by others. Implementing these guidelines will help providers build AI systems that function as intended, are available when needed, and work without revealing sensitive data to unauthorised parties.
Prevent Spear Phishing Scams
Nurses are high-level targets for cybersecurity scams, including spear phishing, impersonations, malware and ransomware attacks. Scammers target the nurses and health care officials because of the highly-sensitive information that is communicated.
HC3 Sector Note TLP White: Remote Access Trojan “Agent Tesla” Targets Organizations with COVID-themed phishing attacks - June 16, 2020
Agent Tesla is an established Remote Access Trojan (RAT) written in .Net.