CISA Seeks Comment on National Cyber Incident Response Plan Update
The Cybersecurity and Infrastructure Security Agency (CISA) is seeking comment on the draft National Cyber Incident Response Plan (NCIRP) Update, published in the Federal Register on December 16, 2024. Comments will be accepted on the draft update until January 15, 2025. The NCIRP is a national strategic framework for coordinated response to cyber incidents and was first published in 2016. The update was issued in response to the changing cyber threat landscape, and addresses significant changes in policy and federal law, and the new organizational capabilities since the NCIRP was released 8 years ago. The NCIRP concerns cyber incidents of severity Level 2 or above per the Cyber Incident Severity Scheme, which means the incidents may impact public health or safety, national security, economic security, foreign relations, civil liberties, or public confidence. The NCIRP covers four main areas of effort: Asset Response, Threat Response, Intelligence Support, and Affected Entity Response, and includes coordination mechanisms, key decision points, and priority activities. The NCIRP...
BD Identifies High Severity Vulnerability in its Diagnostic Solutions Products
Becton, Dickinson, and Company (BD) has discovered a high-severity vulnerability affecting several of its BD Diagnostic Solutions Products. The vulnerability, tracked as CVE-2024-10476 (CVSS v3, 8.0), is due to the use of default credentials, which were intended for use only by BD technical support teams within the clinical setting. Exploitation of the vulnerability could potentially allow a threat actor to access, modify, or delete data, including personally identifiable information (PII) and protected health information (PHI). The vulnerability could be exploited in a low-complexity attack, which could cause a system shutdown or impact the availability of the system. The vulnerability affects all versions of the following products: BD BACTEC Blood Culture System BD COR System BD EpiCenter Microbiology Data Management System BD MAX System BD Phoenix M50 Automated Microbiology System BD Synapsys Informatics Solution Exploitation of the vulnerability would require a threat actor to have direct access (logical or physical) to the affected product, so a threat actor would need to...
226,000 Individuals Affected by Regional Care, Inc. Cyberattack
Regional Care, Inc., a Scottsbluff, NE-based health insurance agency, has notified 225,728 individuals about a cybersecurity incident that involved some of their personal and protected health information. Suspicious activity was identified within its network on September 18, 2024. The investigation confirmed on or around November 8, 2024, that there had been unauthorized access to its network, and the threat actor viewed or acquired information such as names, birth dates, Social Security numbers, medical information, and health insurance information. Notification letters were mailed to the affected individuals on December 16, 2024, and individuals whose Social Security numbers were involved were offered complimentary credit monitoring services. Regional Care said it had taken many precautions to safeguard personal information and continually evaluates and modifies its practices and internal controls to enhance data security. Email Breach at Amergis Healthcare Staffing Affects 11,000 Individuals Columbia, MD-based Amergis Healthcare Staffing, Inc., formerly Maxim Healthcare...
Brockton Neighborhood Health Center Suffers Interlock Ransomware Attack
Brockton Neighborhood Health Center in Massachusetts has suffered an Interlock ransomware attack and data breaches have been announced by Kitsap Mental Health Services in Washington state and Continental Cafe Holdings in Michigan. Brockton Neighborhood Health Center Suffers Interlock Ransomware Attack Brockton Neighborhood Health Center in Massachusetts is alerting patients about a cyberattack detected on November 3, 2024. Suspicious activity was identified within its computer network, and an investigation was launched to determine the nature and scope of the incident. On November 18, 2024, Brockton Neighborhood Health Center learned that a threat actor had access to its network from November 1 through November 3, 2024, and viewed or copied certain files from its systems. The file review confirmed on November 29, 2024, that the data related to patients who received treatment between 2017 and 2022, and included names, addresses, dates of birth, diagnoses/conditions, lab test results, medications, other treatment information, medical record numbers, and health insurance information....
Texas Tech University Health Sciences Center Ransomware Attack Affects 1.46 Million Patients
Texas Tech University Health Sciences Center, an academic health institution and medical school of Texas Tech University, has confirmed that a large volume of patient data was exfiltrated in a September ransomware attack involving systems shared by Texas Tech University Health Sciences Center in El Paso, Texas Tech Physicians, and UMC Health System. Two breach reports have been submitted to the HHS’ Office for Civil Rights confirming the electronic protected health information (ePHI) of 1,465,000 patients was compromised in the attack, 650,000 of whom were patients of Texas Tech University Health Sciences Center and 815,000 were patients of its El Paso center. UMC Health previously reported the breach as affecting at least 501 individuals. The Health Sciences Centers (HSCs) explained that the ransomware attack was detected in September 2024 when some of their computer systems and applications were disrupted. Immediate action was taken to secure its systems, and an investigation was launched to identify the cause of the disruption. The HSCs confirmed that the disruption was caused...



