The Healthcare Cyber Brief
Apr 10 — Apr 16 · Last 7 days · 2 days reporting
Peak Score
7.5
HIGH
Avg Score
7.3
2 days
Unique Threats
120
51 vulns
Ransomware
65
15 healthcare
Threat Level This Week
Top Threats This Week
Fortinet Patches Actively Exploited CVE-2026-35616 in FortiClient EMS
CRITICALA critical vulnerability (CVE-2026-35616) in FortiClient EMS has been actively exploited, allowing pre-authentication API access bypass and privilege escalation. This affects organizations using FortiClient EMS, including those with Microsoft 365 and Azure environments.
CVE-2026-35616
FortiClient EMS zero-day exploited, emergency hotfixes available (CVE-2026-35616)
CRITICALA critical FortiClient EMS zero-day vulnerability (CVE-2026-35616) is being actively exploited in the wild. Fortinet has released emergency hotfixes for versions 7.4.5 and 7.4.6. This affects organizations using FortiClient EMS, including those with Microsoft 365, Azure, and VMware vSphere/vCenter/ESXi environments.
CVE-2026-35616
U.S. CISA adds a flaw in TrueConf Client to its Known Exploited Vulnerabilities catalog
CRITICALA flaw in TrueConf Client (CVE-2026-3502) has been added to CISA's Known Exploited Vulnerabilities catalog, allowing attackers to deliver malicious updates and execute arbitrary code. This vulnerability targets secure networks used by governments and critical sectors, posing a significant risk due to its exploitation by China-aligned threat actors in Operation TrueChaos.
CVE-2026-3502
One-Time Passcodes Are Gateway for Financial Fraud Attacks
CRITICALSMS-based one-time passcodes (OTPs) are being exploited by fraudsters to carry out account takeover and payment fraud schemes, compromising financial institution accountholders' accounts.
Security Affairs newsletter Round 571 by Pierluigi Paganini – INTERNATIONAL EDITION
CRITICALQilin ransomware group claims the hack of German political party Die Linke. The attack exposed sensitive data of 30 EU entities, including personal and financial information. This breach could have significant implications for organizations handling similar types of data.
CVE-2026-3055
Key Vulnerabilities
[CVE] CVE-2018-25254 (CRITICAL 9.8)
CRITICALNICO-FTP 3.0.1.19 contains a critical buffer overflow vulnerability that allows remote attackers to execute arbitrary code by sending crafted FTP commands. This can be exploited via an unpatched Microsoft Exchange or SharePoint server using NICO-FTP for file transfers, leading to potential compromise of the entire network.
[CVE] CVE-2026-5544 (HIGH 8.8)
CRITICALA high-severity stack-based buffer overflow vulnerability (CVE-2026-5544) has been discovered in UTT HiPER 1250GW up to version 3.2.7-210907-180535, affecting the /goform/formRemoteControl file. The manipulation of the Profile argument can lead to remote code execution. This vulnerability is actively exploited and poses a significant risk to organizations using UTT HiPER 1250GW.
[CVE] CVE-2016-20052 (CRITICAL 9.8)
CRITICALSnews CMS 1.7 contains an unrestricted file upload vulnerability allowing unauthenticated attackers to upload and execute arbitrary PHP files, leading to remote code execution. This critical vulnerability poses a significant risk as it can be exploited by attackers to gain full control over affected systems.
[CVE] CVE-2026-20147 (CRITICAL 9.9)
CRITICALA critical vulnerability in Cisco ISE and ISE-PIC could allow an authenticated attacker to execute arbitrary commands on the underlying operating system. This can lead to privilege escalation and denial of service conditions. The severity is CRITICAL due to the high CVSS score and potential for widespread impact.
[CVE] CVE-2026-20180 (CRITICAL 9.9)
CRITICALA critical vulnerability in Cisco Identity Services Engine (ISE) could allow an authenticated attacker to execute arbitrary commands on the underlying operating system, potentially leading to a denial of service condition and root-level access. This affects devices running ISE with Read Only Admin credentials.
Healthcare Ransomware Watch
4
Active Groups
65
Total Victims
15
Healthcare Confirmed
Groups observed: Luminous, Phantom, Qilin, Ransom4
Healthcare-Specific Intelligence
One-Time Passcodes Are Gateway for Financial Fraud Attacks
CRITICALSMS-based one-time passcodes (OTPs) are being exploited by fraudsters to carry out account takeover and payment fraud schemes, compromising financial institution accountholders' accounts.
What Happens When Data Centers Become Military Targets?
CRITICALCIOs must reassess business continuity plans due to military targeting of commercial cloud data centers in the Middle East. This highlights a critical risk for enterprises relying on cloud services and underscores the need for robust resilience strategies.
Your AI Vendor's Worst Enemy Is Its Own Development Pipeline
CRITICALAnthropic accidentally exposed its most powerful unreleased AI model and later shipped its flagship coding tool's full source code without meaning to, highlighting potential security vulnerabilities in AI development pipelines that could impact organizations using such tools.
<a href="https://www.fiercehealthcare.com/health-tech/cortis-new-agentic-model-medical-coding-outperforms-openai-and-others" hreflang="en">Corti releases agentic model for medical coding, says it outperforms OpenAI, Anthropic</a>
CRITICALCorti has released a new agentic model for medical coding that outperforms OpenAI, Anthropic, Amazon, Oracle, and Google by over 25% in clinical accuracy benchmarks. This could pose a significant risk to healthcare organizations relying on external or outdated coding solutions.
Mercor Breach Linked to LiteLLM Supply-Chain Attack
HIGHMercor, a non-healthcare organization, experienced a breach via a LiteLLM supply-chain attack, enabling attackers to harvest credentials and access internal environments at scale. The threat highlights growing AI system exposure and limited visibility, posing significant risks to organizations with similar technology stacks.
Want this delivered daily?
The full portal includes daily executive briefs, IOC tracking, historical analysis, and healthcare-specific intelligence from 50+ sources.
Join the WaitlistThis brief is generated from automated daily threat intelligence collection and analysis. 171 unique items analyzed across 2 reporting days.