Weekly Threat Intelligence

The Healthcare Cyber Brief

Apr 10Apr 16 · Last 7 days · 2 days reporting

Peak Score

7.5

HIGH

Avg Score

7.3

2 days

Unique Threats

120

51 vulns

Ransomware

65

15 healthcare

Threat Level This Week

7.5
Apr 14
7
Apr 16

Top Threats This Week

Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS

CRITICAL

A critical vulnerability (CVE-2026-35616) in FortiClient EMS has been actively exploited, allowing pre-authentication API access bypass and privilege escalation. This affects organizations using FortiClient EMS, including those with Microsoft 365 and Azure environments.

CVE-2026-35616

FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)

CRITICAL

A critical FortiClient EMS zero-day vulnerability (CVE-2026-35616) is being actively exploited in the wild. Fortinet has released emergency hotfixes for versions 7.4.5 and 7.4.6. This affects organizations using FortiClient EMS, including those with Microsoft 365, Azure, and VMware vSphere/vCenter/ESXi environments.

CVE-2026-35616

U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog

CRITICAL

A flaw in TrueConf Client (CVE-2026-3502) has been added to CISA's Known Exploited Vulnerabilities catalog, allowing attackers to deliver malicious updates and execute arbitrary code. This vulnerability targets secure networks used by governments and critical sectors, posing a significant risk due to its exploitation by China-aligned threat actors in Operation TrueChaos.

CVE-2026-3502

One-Time Passcodes Are Gateway for Financial Fraud Attacks

CRITICAL

SMS-based one-time passcodes (OTPs) are being exploited by fraudsters to carry out account takeover and payment fraud schemes, compromising financial institution accountholders' accounts.

Security Affairs newsletter Round 571 by Pierluigi Paganini – INTERNATIONAL EDITION

CRITICAL

Qilin ransomware group claims the hack of German political party Die Linke. The attack exposed sensitive data of 30 EU entities, including personal and financial information. This breach could have significant implications for organizations handling similar types of data.

CVE-2026-3055

Key Vulnerabilities

[CVE] CVE-2018-25254 (CRITICAL 9.8)

CRITICAL

NICO-FTP 3.0.1.19 contains a critical buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending crafted FTP commands. This can be exploited via an unpatched Microsoft Exchange or SharePoint server using NICO-FTP for file transfers, leading to potential compromise of the entire network.

CVE-2018-25254Actively Exploited

[CVE] CVE-2026-5544 (HIGH 8.8)

CRITICAL

A high-severity stack-based buffer overflow vulnerability (CVE-2026-5544) has been discovered in UTT HiPER 1250GW up to version 3.2.7-210907-180535, affecting the /goform/formRemoteControl file. The manipulation of the Profile argument can lead to remote code execution. This vulnerability is actively exploited and poses a significant risk to organizations using UTT HiPER 1250GW.

CVE-2026-5544Actively Exploited

[CVE] CVE-2016-20052 (CRITICAL 9.8)

CRITICAL

Snews CMS 1.7 contains an unrestricted file upload vulnerability allowing unauthenticated attackers to upload and execute arbitrary PHP files, leading to remote code execution. This critical vulnerability poses a significant risk as it can be exploited by attackers to gain full control over affected systems.

CVE-2016-20052Actively Exploited

[CVE] CVE-2026-20147 (CRITICAL 9.9)

CRITICAL

A critical vulnerability in Cisco ISE and ISE-PIC could allow an authenticated attacker to execute arbitrary commands on the underlying operating system. This can lead to privilege escalation and denial of service conditions. The severity is CRITICAL due to the high CVSS score and potential for widespread impact.

CVE-2026-20147Actively Exploited

[CVE] CVE-2026-20180 (CRITICAL 9.9)

CRITICAL

A critical vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to execute arbitrary commands on the underlying operating system, potentially leading to a denial of service condition and root-level access. This affects devices running ISE with Read Only Admin credentials.

CVE-2026-20180Actively Exploited

Healthcare Ransomware Watch

4

Active Groups

65

Total Victims

15

Healthcare Confirmed

Groups observed: Luminous, Phantom, Qilin, Ransom4

Healthcare-Specific Intelligence

One-Time Passcodes Are Gateway for Financial Fraud Attacks

CRITICAL

SMS-based one-time passcodes (OTPs) are being exploited by fraudsters to carry out account takeover and payment fraud schemes, compromising financial institution accountholders' accounts.

What Happens When Data Centers Become Military Targets?

CRITICAL

CIOs must reassess business continuity plans due to military targeting of commercial cloud data centers in the Middle East. This highlights a critical risk for enterprises relying on cloud services and underscores the need for robust resilience strategies.

Your AI Vendor's Worst Enemy Is Its Own Development Pipeline

CRITICAL

Anthropic accidentally exposed its most powerful unreleased AI model and later shipped its flagship coding tool's full source code without meaning to, highlighting potential security vulnerabilities in AI development pipelines that could impact organizations using such tools.

<a href="https://www.fiercehealthcare.com/health-tech/cortis-new-agentic-model-medical-coding-outperforms-openai-and-others" hreflang="en">Corti releases agentic model for medical coding, says it outperforms OpenAI, Anthropic</a>

CRITICAL

Corti has released a new agentic model for medical coding that outperforms OpenAI, Anthropic, Amazon, Oracle, and Google by over 25% in clinical accuracy benchmarks. This could pose a significant risk to healthcare organizations relying on external or outdated coding solutions.

Mercor Breach Linked to LiteLLM Supply-Chain Attack

HIGH

Mercor, a non-healthcare organization, experienced a breach via a LiteLLM supply-chain attack, enabling attackers to harvest credentials and access internal environments at scale. The threat highlights growing AI system exposure and limited visibility, posing significant risks to organizations with similar technology stacks.

Want this delivered daily?

The full portal includes daily executive briefs, IOC tracking, historical analysis, and healthcare-specific intelligence from 50+ sources.

Join the Waitlist

This brief is generated from automated daily threat intelligence collection and analysis. 171 unique items analyzed across 2 reporting days.