Cybersecurity Saturday

Cybersecurity Saturday

From the Iranian war front,

  • The Center for Strategic and International Studies offers an April 27, 2026, FAQ about “The Iranian Cyber Threat to U.S. Critical Infrastructure.”
  • MedTech Dive tells us,
    • “A cyberattack that shut down ordering, shipping and manufacturing at Stryker for weeks cut into the company’s first-quarter results.
    • “CEO Kevin Lobo told investors Thursday that the cyberattack “meaningfully” affected Stryker’s growth.
    • “The cyber incident had a big impact on our results and affected each of our businesses differently given their varied go-to-market models and processes to record revenue,” Lobo said. “This resulted in distortions in our first-quarter results that will normalize over the course of the year.” * * *
    • “Stryker was hit by the cyberattack on March 11. The company’s global Microsoft environment was disrupted, and ordering, shipping and manufacturing were shut down for weeks. Operations were not restored until the first week of April.
    • “The attack has been claimed by an Iran-linked threat actor tracked as Handala, according to Check Point Research. Along with the operational disruption, the group claims to have wiped thousands of servers and mobile devices, and stolen data.
    • “Lobo said the cyberattack wiped 40,000 laptops. He added that the company lost some procedures due to operations shutting down, and some sales reps were unable to get into hospitals. However, Lobo maintained that the company didn’t lose overall business.”
  • SC Media reports on April 27,
    • “Large medical devices maker Medtronic on April 24 said it was hit by a cyberattack that led to unauthorized access to data in some of its corporate IT systems. 
    • “However, in a statement, Medtronic said it had not identified any impact to its products, patient safety, or connections to its customers, manufacturing and distribution operations, financial reporting systems, or the company’s ability to meet patient needs.
    • “The networks that support our corporate IT systems, our products and our manufacturing and distribution operations are separate,” said the company. “Hospital customer networks remain separate from Medtronic IT networks and are secured and managed by customers’ IT teams.”
    • “The attack raised some eyebrows because it was reportedly claimed by Handala, the same group that was behind the attack on Stryker March 11 that led to service disruptions. This was the second publicly reported attack on a large medical device maker since the war with Iran started Feb. 28.”
    • “Handala didn’t target Medtronic by accident,” said Amir Khayat, co-founder and CEO of Vorlon. “Critical infrastructure, complex vendor networks, sensitive data, and known security gaps make healthcare one of the most attractive targets in the world. The teams that find out their exposure after an incident are the ones who never looked before it.”

From the cybersecurity policy and law enforcement front,

  • Cybersecurity Dive reports,
    • “The U.S. government wants to know how major U.S. technology companies are using AI to protect their computer networks and how they’re preparing for the possibility of an AI-driven cybersecurity crisis.
    • “Officials from the White House’s Office of the National Cyber Director (ONCD) have reached out to tech giants in recent weeks with questions about AI, information sharing, vulnerability patching and how the federal government can help, according to an email and a list of questions shared with Cybersecurity Dive.” * * *
    • “ONCD asked the companies to answer 11 questions on a range of cybersecurity topics by May 1.”
  • and
    • “A group of U.S. government agencies on Wednesday [April 29] offered advice for critical infrastructure organizations on applying zero-trust (ZT) principles to their operational technology (OT) environments.
    • “Taking a zero-trust approach to these industrial systems requires careful consideration, the new government publication says, “because OT systems interact with the physical environment and are constrained by availability and safety requirements, as well as legacy technology with long lifespans.”
    • “The document — co-authored by the Cybersecurity and Infrastructure Security Agency (CISA), the FBI and the departments of Defense, Energy and State — describes the unique challenges that OT environments pose, the importance of clear governance frameworks and supply-chain oversight, and the steps that infrastructure operators should take to implement zero trust.”
  • and
    • “The Australian and U.S. governments, along with other international partners, released guidance on Friday [May 1] for safely deploying agentic AI systems.
    • The automation capabilities of AI agents create unique risks that can lead to “productivity losses, service disruption, privacy breaches or cybersecurity incidents,” the guidance document reads. “Organisations must therefore anticipate what could go wrong, assess how agentic AI risk scenarios might affect operations and establish ongoing visibility and assurance to maintain confidence in their agentic AI investments.”
    • “Safely using AI agents means “never granting it broad or unrestricted access, especially to sensitive data or critical systems,” the document warns. Companies, it says, “should only use agentic AI for low-risk and non-sensitive tasks.”
    • “The publication — co-issued by the Australian Signals Directorate, the U.S.’s Cybersecurity and Infrastructure Security Agency and National Security Agency and their British, Canadian and New Zealand counterparts — comes as businesses race to integrate AI tools into their workflows and increasingly embrace agentic AI for its ability to automate repetitive tasks.”
  • HelpNet Security adds,
    • “AI agents need credentials to work. They authenticate with LLM platforms, connect to databases, call SaaS APIs, access cloud resources, and orchestrate across dozens of external services. Every integration point requires an identity. Most organizations are handling this badly, and the evidence is in the code.
    • “GitGuardian’s State of Secrets Sprawl Report found 28,649,024 new secrets exposed in public GitHub commits across 2025, a 34% year-over-year increase and the largest annual jump in the report’s history.
    • “One of the root causes is authentication design: which credential type gets chosen, what scope it carries, how long it lives, and where it gets stored. In the meantime, AI is creating more credentials that need managing and generating more artifacts where those credentials leak.”
  • Per a National Institute of Standards and Technology news release,
    • “The National Institute of Standards and Technology (NIST) is hosting a virtual event titled “Building Your Small Business Cybersecurity Team: From In-House to Outsourcing” on May 5, 2026, from 2:00 to 3:00 p.m. EDT. The webinar, part of National Small Business Week, focuses on helping small businesses develop cybersecurity teams to manage and reduce risks. It will address different team structures based on factors such as budget, staff capabilities, and organizational needs, including in-house roles, full teams, and outsourced support. Speakers will discuss considerations for hiring, outsourcing, and training employees, as well as available resources such as the National Initiative for Cybersecurity Education Workforce Framework for Cybersecurity.  For additional information and to register for the event refer to the official NIST Event page.”
  • Cyberscoop informs us,
    • “Two former cybersecurity professionals who moonlighted as cybercriminals, committing a series of ransomware attacks in 2023, were each sentenced to four years in prison, the Justice Department said Thursday [April 30].
    • “Ryan Clifford Goldberg and Kevin Tyler Martin previously pleaded guilty to one of three charges brought against them in December and faced up to 20 years behind bars. 
    • “Goldberg, who was a manager of incident response at Sygnia, and Martin, a ransomware negotiator at DigitalMint at the time, collaborated with Angelo John Martino III to attack victim computers and networks and use ALPHV, also known as BlackCat, ransomware to extort payments.
    • “These defendants exploited specialized cybersecurity knowledge not to protect victims, but to extort them,” Jason A. Reding Quiñones, U.S. attorney for the Southern District of Florida, said in a statement. “They used ransomware to lock down critical systems, steal sensitive data, and pressure American businesses into paying to regain access to their own information.”

From the cybersecurity breaches and vulnerabilities front,

  • The Washington Post reports on April 30,
    • “The Trump administration inadvertently exposed the Social Security numbers of health care providers in a database powering a new Medicare portal, The Washington Post found.
    • “The Centers for Medicare and Medicaid Services (CMS) last year created a directory to help seniors look up which doctors and medical providers accept which insurance plans, framing it as an overdue improvement and part of the Trump administration’s initiative to modernize health care technology.
    • “But a publicly accessible database used to populate the directory contains some of the providers’ Social Security numbers, linked to their names and other identifying information. For at least several weeks, CMS made the database available for public use as part of its data transparency efforts. The files are not immediately visible to users who visit the provider directory.
    • “The Post downloaded the database and identified at least dozens of Social Security numbers belonging to health care providers while reviewing a sample of rows.
    • “The Post informed health officials on Tuesday that the numbers had been exposed, giving the agency time to take down the database, and contacted some of the affected providers, who said they were confused and concerned.” * * *
    • “CMS officials said they are working to fix the problem that led to the exposure. A spokesperson said the problem “stems from incorrect entries of provider or provider-representative-supplied information in the wrong places” — essentially, that providers entered information in the wrong place and left their own Social Security numbers exposed.
    • “The agency has taken steps to address it promptly and reinforce safeguards around data submission and validation,” CMS said in a statement.”
  • Cyberscoop relates on April 30,
    • “A pair of persistent and problematic threat groups affiliated with The Com are actively targeting organizations across multiple critical infrastructure sectors for rapid data theft and extortion attacks, according to CrowdStrike.
    • “The financially-motivated attackers, which CrowdStrike tracks as Cordial Spider and Snarky Spider, have used voice-phishing and social engineering attacks to break into victims’ identity platforms and traverse SaaS environments since at least October 2025, the company said in a report Thursday, which it shared exclusively with CyberScoop prior to release. 
    • “Adam Meyers, senior vice president of counter adversary operations at CrowdStrike, said the subgroups composed of native English speakers primarily target U.S.-based organizations in the academic, aviation, retail, hospitality, automotive, financial services, legal and technology sectors.
    • “This “new wave of ecrime threat actors” are closely aligned with Scattered Spider and linked to other subsets of The Com, including SLSH and ShinyHunters, Meyers said.” 
  • Cybersecurity Dive tells us,
    • “Phishing attacks using QR codes to direct victims to malicious links surged in the first quarter of 2026, Microsoft said in a threat report published on Thursday [April 30].
    • “Email-based phishing attacks overwhelmingly used malicious links rather than attachments during the first three months of the year, reflecting the greater range of delivery options for externally hosted threats.
    • “A major phishing-as-a-service (PhaaS) platform is significantly diminished after recent attempts to choke off its infrastructure, the company said.”
  • InfoSecurity Magazine points out,
    • “The threat landscape in 2025 was characterized by a surge in compromised credentials, extortion and vulnerability exploitation, according to a new report from KELA.  
    • “The threat intelligence firm tracked nearly 2.9 billion compromised credentials last year globally, it said in its latest report, The State of Cybercrime 2026: Emerging Threats & Predictions.” * * *
    • “Cybercriminals and APT groups have moved from using AI merely as a supportive tool in attacks to making it an essential component in the complexity, enhancement, and escalation of those attacks,” it warned.
    • “Specifically, attacks have moved on from basic jailbreaking of LLMs to vibe hacking for autonomous execution of entire workflows, the report claimed. AI-assisted malware and prompt injection attacks designed to hijack agents are also increasingly common, KELA said.
    • “We’re seeing a fundamental pivot in adversary behavior with the shift from AI-assisted tools to fully autonomous, agentic malicious workflows, where over 80% of operations require minimal human oversight,” said David Carmiel, CEO of KELA.
    • “Attackers no longer need to break in through a backdoor, they can quickly find the key and walk through the front using stolen credentials. Organizations relying on stale intelligence and legacy defenses instead of AI-powered solutions are leaving the door wide open to attacks.”
  • The Cybersecurity and Infrastructure Security Agency, which beginning yesterday is no longer subject to shutdown, added four known exploited vulnerabilities to its catalog this week.

From the ransomware front,

  • Security Week reports,
    • “South Carolina-based healthcare provider Sandhills Medical Foundation has disclosed a data breach affecting nearly 170,000 individuals.
    • “Sandhills Medical said in a data security incident notice on its website that it discovered a ransomware attack on May 8, 2025. 
    • “It has since been working with law enforcement, cybersecurity experts, and a forensics firm to investigate the intrusion and determine its impact.
    • “Now, nearly one year later, the healthcare organization has publicly disclosed the incident and notified affected individuals.
  • Insurance Business Magazine relates
    • “A single ransomware crew exploiting a single brand of firewall is now driving nearly half of all cyber insurance claims, At-Bay has warned, in a finding that recasts how underwriters and brokers should be thinking about risk selection.
    • “The cyber carrier’s 2026 InsurSec Report, drawn from more than 6,500 claims and 100,000 policy years, concluded that ransomware has entered an infrastructure-driven phase.
    • “Attackers, it said, are no longer hunting by industry or company size but by the network appliances their targets happen to run.
    • “Nearly three in four ransomware attacks, or 73%, began with a VPN in 2025 — a share that has almost doubled in two years.
    • “SonicWall topped the list of most-targeted VPNs for the first time, linked to 27% of ransomware claims. Akira alone accounted for more than 40%, the highest concentration of a single strain on At-Bay’s books, with SonicWall appliances present in 86% of its attacks.”
  • Security Affairs tells us,
    • “Symantec researchers report that recent Trigona ransomware attacks used a custom-built data exfiltration tool instead of common utilities like Rclone or MegaSync. This shift, seen in March 2026 incidents, gives attackers more control and helps them evade detection, as standard tools are often flagged by security systems. Researchers believe this move shows a growing investment in proprietary malware to stay stealthy. 
    • “The attacks, which occurred in March 2026, mark a significant shift in tactics for Trigona affiliates. The motivation for moving away from publicly available tools remains unknown.” reads the report published by Symantec. “Many publicly available tools are now so well known that they may be flagged by security solutions.”
    • “Trigona, active since late 2022, operates as a Ransomware-as-a-Service linked to the Rhantus cybercrime group.”
  • Dark Reading informs us,
    • “The latest variant of an emerging ransomware may be far more destructive than its operators intended, acting as a wiper that deletes many of an organization’s captured files instead of encrypting them, as typical ransomware does. This scenario makes recovery impossible for defenders while complicating the possibility of holding files for ransom for the attackers.
    • “The Vect 2.0 variant of the ransomware-as-service (RaaS) operation, which first appeared last December, has a flaw across its versions for Windows, Linux, and VMware ESXi that inadvertently and permanently destroys so-called “large files” rather than encrypting them, according to a report published this week by Check Point Software. 
    • “For all files of only 128KB or higher, “this effectively makes Vect a wiper for virtually any file containing meaningful data, enterprise assets such as VM disks, databases, documents and backups included,” according to the report. Check Point has confirmed that the flaw, which “discards three of four decryption nonces for every file above 131,072 bytes (128 KB),” is identical across all three platform variants.” * * *
    • “For defenders, this makes the situation slightly worse, as they no longer will be able to recover all of their files, even if they agree to pay the ransom to do so, Check Point says. “Victims who pay the ransom cannot receive a working decryptor for their largest files, not through operator deception, but because the information required for decryption was irrecoverably destroyed at the moment of encryption.”
    • “They probably wouldn’t realize they can’t recover files only after the ransom is paid and their decryption key doesn’t work, which is why Check Point found it so important to report the flaw in Vect, Smadja says.”

From the cybersecurity business and defenses front,

  • CRN reports,
    • “Anthropic announced Thursday [April 30] it’s moving Claude Security, formerly known as Claude Code Security, into public beta to enable rapid AI-powered vulnerability discovery and remediation.
    • “The launch follows the widely discussed disclosure about Anthropic’s Claude Mythos Preview earlier this month, though the Claude Security offering does not leverage Mythos.
    • “Today’s models are already highly effective at finding flaws in software code,” Anthropic said in a blog post Thursday. “The next generation will be more capable still, and will be particularly effective at autonomously exploiting these flaws.”
  • Cybersecurity Dive relates,
    • “PwC has launched an AI-driven, unified detection-and-response managed security service, enabled by Google Security Operations.
    • “The recent announcement follows PwC’s three-year, $400 million collaboration investment with Google Cloud to modernize cybersecurity operations, unveiled in January. The offering targets smaller and mid-sized enterprises that wouldn’t typically turn to a big consulting firm for cybersecurity.
    • “This is not an old-school cyber-managed service offering that requires a lot of people, time and infrastructure to set up,” PwC’s Partner, Global and US Managed Services Leader, Tim Canonico told Channel Dive from the Google Cloud Next conference in Las Vegas. “We’re leveraging Google’s SecOps platform and building agents to do a lot of the work that would typically require large-scale teams to operate.” * * *
    • “All this automation has human checkpoints, and Canonico says it helps create an efficient, low-cost cybersecurity service with 24/7 monitoring, detection and response.”
  • Security Week tells us,
    • Cisco on Thursday [April 30] unveiled a new open source tool, named Model Provenance Kit, designed to help organizations address potential issues associated with the use of third-party AI models.
    • Organizations often leverage AI models obtained from model repositories such as HuggingFace, where millions of models are available.
    • While these models can offer many benefits, organizations often don’t track the changes made to them. In addition, although repositories provide guidance on the importance of model cards and metadata, the maintenance work performed by their developers can vary, affecting downstream users. 
  • The Wall Street Journal infoms us
    • “OpenAI and Microsoft MSFT have reached a truce.
    • “The startup and its longtime partner have forged a new deal that offers OpenAI more freedom to partner with Microsoft’s rivals, caps the amount of revenue it must share with the software giant through 2030 and removes a controversial clause in prior agreements. Microsoft, meanwhile, will retain access to the startup’s models and products.”
  • Here is a link to Dark Reading’s CISO Corner.

Monday report

From Washington, DC

  • Beckers Hospital Review reports,
    • “Americans spend more than $1.6 trillion a year on hospital care — roughly one-third of all health spending — and a new paper from the nonprofit think tank Paragon Health Institute argues that government policy is the primary driver of why those costs keep climbing.
    • “The paper, “The Hospital Cost Crisis: How Government Policies Drive Consolidation, Undermine Competition, and Fuel Soaring Prices,” was authored by John Graham, a visiting fellow at Paragon with nearly three decades of health policy experience.” * * *
    • Click here to read the paper in full. FEHBlog note — The article includes ten highlights from the report.
  • and
    • “Johnson & Johnson will begin marketing four prescription drugs on the Trump administration’s TrumpRx website, according to an April 24 report from CBS News.
    • “The drugs include metformin, metformin extended release, Invokana and Xarelto. Pricing on the platform shows Invokana discounted 62% to about $225 from $598.56, Xarelto discounted 68% to about $197 from $611.82, and Invokamet XR — an extended-release combination of canagliflozin and metformin — discounted 62% to about $225 from $598.56, based on listed cash-pay prices.”
  • MedPage Today relates,
    • “Advocates for the LGBTQ+ community claimed a win this week after the Trump administration pledged to reinstate the 988 Suicide and Crisis Lifeline specialized support program tailored to their needs.
    • During a Senate hearing earlier [last] week, HHS Secretary Robert F. Kennedy Jr. was asked whether he would commit to restoring the tailored line for LGBTQ+ callers to 988, as required by law, after the Trump administration removed it last summer.
    • “We are working on getting it up now,” Kennedy said.
    • “While most 988 calls are routed to the nearest call center, callers who press 3 or text PRIDE were once connected to a centralized network of trained crisis counselors who have shared lived experiences or are trained to provide services to LGBTQ+ youth.
    • “Linking callers to local resources is usually best, since support outside of a phone call might be needed. However, for those in states where attacks on LGBTQ+ individuals are widespread, local resources may not be preferred, Hannah Wesolowski, chief advocacy officer for the National Alliance on Mental Illness, told MedPage Today.
  • The American Hospital Association News tells us,
    • “The AHA again is asking the Health Resources and Services Administration to take action after Eli Lilly warned hospitals that they could lose access to discounted drug prices unless they comply with new data submission requirements.
    • “The AHA said Eli Lilly recently issued a letter to hospitals participating in the 340B Drug Pricing Program threatening the “imminent loss” of discounted pricing if claims data are not submitted “without further delay.”
    • “The AHA for months has raised concerns with HRSA about these practices.
    • “Unfortunately, we are not aware of any action that HRSA has taken to address these unlawful drug company claims-data policies, even as more and more companies have announced policies similar to Lilly’s,” the AHA wrote. “HRSA’s inaction here stands in stark contrast to the speed with which it acted in 2024 when the drug companies announced their unlawful rebate policies.”

From the Food and Drug Administration front,

  • Health Exec reports,
    • “Multiple wound and burn gel products are being removed from where they are used or sold, after it was discovered that a packaging failure was leading to the sterile barrier being breached. Unfortunately, this has led to at least 14 serious injuries. 
    • “The manufacturer of the gels, Integra LifeSciences, issued a letter to distributors of the products,  branded as MediHoney and CVS Wound Gel. The products are sold in retail settings, but also may be found in patient care settings. 
    • “In a statement, the U.S. Food and Drug Administration (FDA) said it’s aware of the issue and provided the known details. The agency said it has determined that using wound gels with the defective packaging may “cause temporary or reversible health problems, or—though unlikely—serious health problems.”
    • “Despite the risk of severe infection and the recorded injuries, there are no known deaths associated with the recalled wound gels.” 
  • The American Hospital Association adds,
    • “The Food and Drug Administration has identified a nationwide recall. Arrow International is recommending dialysis catheter kits containing Merit Medical 16F Dual-Valved Splittable Sheath Introducers be taken out of use due to a design defect where the sheath introducer may not split as intended. In addition, the FDA issued an Early Alert for Omnicell i.v.STATION sterile labels. Omnicell recommends customers do not use affected labels. They should verify the accuracy of labels on filled products.”
  • Fierce Pharma tells us,
    • “AstraZeneca’s systemic lupus erythematosus (SLE) med Saphnelo may have earned a considerable convenience edge in the United States, courtesy of an FDA nod clearing the drug for self-administration via a once-weekly autoinjector. 
    • “As with the drug’s original SLE nod in 2021, the self-administration green light covers the use of Saphnelo on top of standard therapy, AZ said in an April 27 release. In its original formulation, Saphnelo, also known as anifrolumab, is given as an intravenous infusion. 
    • “The FDA signed off on the new administration route after reviewing data from the late-stage TULIP-SC study, in which subcutaneous dosing of Saphnelo triggered statistically significant and clinically meaningful disease activity reductions versus placebo, according to AZ.”
  • and
    • “Johnson & Johnson is bolstering the case for its approved schizophrenia med Caplyta to prevent relapses in the disease. 
    • “On Monday, the FDA approved J&J’s supplemental new drug application for the atypical antipsychotic to include long-term data on the med’s schizophrenia relapse-prevention capabilities.
    • “In a press release, J&J clarified that the “label update builds upon the existing clinical data and postmarketing experience across [Caplyta’s] approved uses.” 
    • “Relapses pose a significant challenge for schizophrenia patients and can disrupt stability, undermine functioning and often trigger episodes of psychosis, hallucinations and other symptoms that have the potential to disrupt daily life, according to J&J. On average, adults living with the condition experience nine relapse episodes within a six-year period, the company added.” 

From the public health and medical / Rx research front,

  • NBC News reports
    • “Deaths from rectal cancer are rising rapidly among younger adults, an alarming trend that is confounding scientists trying to understand why millennials are so hard-hit. 
    • “The rate of rectal cancer seems to be increasing more than two to three times compared to colon cancer,” said Mythili Menon Pathiyil, lead author of a new study and a gastroenterology fellow at SUNY Upstate Medical University in Syracuse, New York. 
    • “If the trend continues, rectal cancer deaths will exceed the number of colon cancer deaths — already the nation’s No. 1 cause of cancer death in people under age 50 — by 2035.”
    • “According to the American Cancer Society, 158,850 new colorectal cancers will be diagnosed in 2026. About 55,230 patients will die from the disease, with nearly a third of those deaths in people under age 65. Colon cancer and rectal cancer are similar but form in different parts of the digestive tract. 
    • “The new research, which hasn’t yet been published in a peer-reviewed journal, is scheduled to be presented at Digestive Disease Week, an annual meeting of gastroenterologists, in May. 
    • “The findings, however, strengthen an American Cancer Society study released in March showing that a rise in rectal cancer rates is driving increases in colorectal cancer diagnoses in people younger than age 65. Colorectal cancer rates have been increasing 3% each year for adults under age 50 since the late 1990s and scientists are scrambling to understand why.”
  • STAT News considers what happened to COVID?
    • “There is an ever-shrinking portion of the population that thinks it’s never been infected — the folks who call themselves Novids. Even among that population, many have all but certainly been exposed to the virus but had only asymptomatic infections.”
    • “This, many experts told STAT, explains why the threat from Covid has subsided.” * * *
    • “Most of the experts STAT consulted believe the virus either now qualifies as, or is on its way to becoming, just another one of the viruses that make people sick with cold or flu-like symptoms — with some caveats. For one, the risk remains high for some people — particularly older people, very young children, and people with medical conditions that weaken their immune systems. For another, cold and flu-like viruses trigger symptoms that range from sniffles and coughs to knock-you-off-your-feet illness. A bad case of flu can take a couple of weeks to recover from, even for a healthy person. Same with Covid.” * * *
    • “Marion Koopmans, scientific director of the Pandemic and Disaster Preparedness Center at Erasmus University in Rotterdam, the Netherlands, said at this point, annual boosting is probably not doing much for people who aren’t at high risk.
    • “What we really would need is data on what the effect is of boosting on variant specific responses AND protection from disease over increasing intervals between boosters. That data is virtually impossible to get,” she wrote in an email. (Pfizer recently announced it had halted a clinical trial the Food and Drug Administration asked it to conduct in healthy adults aged 50 to 64, because it couldn’t recruit enough volunteers.) 
    • “But for high-risk individuals, Covid boosters still offered protection against becoming sick enough to require hospitalization, the latest study in the Netherlands concluded, Koopmans said.”  
  • MedPage Today adds,
    • “Two multicenter trials [(PANORAMIC and CanTreatCOVID)] found no change in hospitalization and death rates when antiviral nirmatrelvir-ritonavir (Paxlovid) was given to COVID-19 patients already mostly vaccinated.” * * *
    • “Now, the PANORAMIC and CanTreatCOVID results reflect a COVID-19 landscape that’s shifted since the pandemic’s early period, said H. Clifford Lane, MD, former deputy director for clinical research and special projects at the National Institute of Allergy and Infectious Diseases (NIAID), and Anthony Fauci, MD, the former NIAID director.
    • “These new data indicate that the 89% relative risk reduction seen in the analysis of hospitalizations or death associated with the use of nirmatrelvir-ritonavir in the EPIC-HR trial does not apply to the current circumstances, in which most adults have varying degrees of preexisting immunity and the circulating variants are different,” Lane and Fauci wrote in an accompanying editorialopens in a new tab or window.
    • “That doesn’t mean nirmatrelvir-ritonavir’s therapeutic time has come and gone, they cautioned. PANORAMIC and CanTreatCOVID participants who took the combination drug saw enhanced recovery and faster viral load reductions, they noted, which points to both clinical efficacy and antiviral activity.”
  • Health Day tells us,
    • “The eyes are the windows not only to the soul, but also to a person’s health, a new study says.
    • Premature aging of the retina could be a red flag for major diseases like diabetes or heart disease, researchers recently reported in the journal Communications Medicine.
    • “They found that people had a higher risk of chronic disease if they had advanced aging of their retinas — the light-sensitive layer of cells that lines the back wall of the eye.”
  • Per a National Institutes of Health news release,
    • “A National Institutes of Health (NIH)-funded clinical study shows that a symptom-based treatment for babies with neonatal opioid withdrawal syndrome (NOWS) — a highly prevalent condition wherein opioid exposure during pregnancy leads to withdrawal after birth — could speed up their recovery.
    • “To treat babies with moderate to severe symptoms of NOWS, doctors often administer opioid medication, lowering the dose over time. Many doctors commonly use this scheduled dosing approach, however, the new study found that providing “as-needed” doses of opioid medications based on each baby’s signs of withdrawal helped them stop the medicine sooner and go home earlier.
    • “Scheduled opioid dosing, which includes a taper, is necessary for some infants with NOWS, however it may overtreat others,” said corresponding author Lori Devlin, D.O., a professor of pediatrics at the University of Louisville and Norton Children’s Neonatology. “The idea is that by matching treatment to disease severity, we can accelerate recovery and minimize exposure.”
  • Genetic Engineering and Biotechnology News informs us,
    • “A cellular-resolution molecular map details how Down syndrome alters human brain development before birth. The study analyzed more than 100,000 nuclei from human prenatal neocortex samples collected across 26 pre-genotyped donors during gestational weeks 13 to 23—the only window during which all the cortical neurons a person will carry for their entire life are generated. The findings suggest that Down syndrome disrupts the developmental sequence of that process, creating shifts that may help explain later differences in cognition, learning, and sensory processing.
    • “This work is published in Science in the paper, “A single-cell multiomic analysis identifies molecular and gene-regulatory mechanisms dysregulated in developing Down syndrome neocortex.
    • “There’s a new level of detail here that had never existed before,” said Luis de la Torre-Ubieta, PhD, an assistant professor of psychiatry and biobehavioral sciences at UCLA and a member of the Eli and Edythe Broad Center of Regenerative Medicine and Stem Cell Research. “For the first time, we can really try to understand systematically what’s going on in the developing brain of individuals with Down syndrome.”
  • STAT News points out,
    • “The drugmaker Erasca said Monday that its RAS-targeting pill shrank tumors in 40% of patients with advanced pancreatic cancer and 62% of patients with advanced non-small cell lung cancer, results that the company said exceeded its expectations. 
    • “The new data, collected from studies done in the U.S. and China, are still preliminary. However, Erasca said the clinical benefit and tolerability of its drug, called ERAS-0015, compared favorably to daraxonrasib, a similar RAS-targeting drug from Revolution Medicines that recently showed a doubling of overall survival in patients with advanced pancreatic cancer.
    • “I’m excited about both datasets, but I think lung is more definitive at this point. The pancreatic results are maturing, but are very, very promising,” Erasca CEO Jonathan Lim told STAT. “All options are on the table.” 
  • and
    • “An oral medicine for hair loss successfully spurred hair growth in a late-stage trial, startup Veradermics announced Monday.
    • “Veradermics assessed the pill in two ways: by how many hairs grew within a square centimeter of the scalp, on average, and by how satisfied participants were with the results. Over the course of six months, men who took the drug, known as VDPHL01, either once or twice daily had between 30 and 33 more hairs per square centimeter of scalp. Men in the placebo group grew approximately seven additional hairs.
    • “Between 79% and 86% of men taking VDPHL01 said they saw improvement, along with between 72% and 84% of the clinical trial investigators — results that pleased Reid Waldman, a dermatologist turned Veradermics’ chief executive.” 
  • BioPharma Dive adds,
    • “An experimental gene editing medicine from Intellia Therapeutics has succeeded in a Phase 3 trial, positioning the company to seek approval of what would be the first treatment of its kind for a rare disorder known as hereditary angioedema.
    • “When compared to a placebo, the therapy, “lonvo-z,” reduced the rate of the disease’s hallmark swelling attacks by 87% over the course of about six months, meeting the study’s primary objective. Lonvo-z also helped rid 62% of recipients of disease attacks or the need for other therapies during that follow-up period, versus 11% of placebo patients.
    • “Intellia said, without specifics, that lonvo-z had a “favorable” safety and tolerability profile. The most common treatment-emergent side effects were infusion-related reactions, headache and fatigue, and all reported by a Feb. 10 data cutoff were mild to moderate in degree. The company has begun a “rolling” U.S. approval submission and, assuming a clearance, intends to launch lonvo-z in the first half of 2027.” 

From the U.S. healthcare and artificial inteliigence front,

  • Beckers Payer Issues reports,
    • “Elevance Health has set aside $935 million to cover potential costs tied to its ongoing risk adjustment data dispute with CMS, which threatens the insurers’ ability to enroll new members into some of its Medicare Advantage plans.
    • “CFO Mark Kaye disclosed the charge during the company’s first quarter earnings call on April 22, saying the figure reflects Elevance’s current best estimate of what the issue could cost as it works toward a resolution with the government.
    • “[Elevance CEO Gail} Boudreaux also characterized the issue as a historical payment dispute rather than a current compliance concern.”
  • and
    • “CenterWell, Humana’s pharmacy branch, is collaborating with Mark Cuban’s Cost Plus Drug Co. for an employer-based program, according to an April 27 news release.
    • “CenterWell will use Cost Plus Drugs’ SwiftyRx, a digital pharmacy software-as-a-service solution, for medication order intake. The platform should enable CenterWell to offer home delivery pharmacy services for the insurer’s eligible workforce in the Humana Associate Benefit Plan.
    • “Along with SwiftyRx, the organizations will harness Cost Plus Drugs’ drug pricing and CenterWell’s distribution strategies. The collaboration aims to ease access and reduce patient cost through smoother onboarding, automated benefit checks, lowered costs to fill prescriptions and operational efficiency.” 
  • Healthcare Dive points out,
    • Nearly three-quarters of U.S. finance leaders rank healthcare among their companies’ five biggest operating expense concerns, consulting firm Mercer found in a recent survey.
    • “The research comes as the rapid rise of GLP-1 weight-loss medications — like Wegovy and Ozempic — is adding to volatility in employer health costs.
    • “The survey results make clear the far-reaching impacts of rising health benefit costs for individual organizations,” Susan Potter, president of Mercer U.S. & Canada, said in an emailed statement. “Only about one in four CFOs said that their organization was able to absorb the cost increases over the past two years without any business impacts, such as slower wage growth, reduced hiring, or higher prices.”
  • Fierce Healthcare relates,
    • “Insurers are putting a growing focus on specialty drugs covered under the medical benefit, and on re-evaluating the efficacy of traditional rebate models, according to a new report.
    • “The Pharmaceutical Strategies Group (PSG) on Monday released its annual Trends in Specialty Drug Benefits report, which offers a look at how payers are responding to rising costs for these products and striking a balance between cost management and access.
    • “PSG surveyed 228 benefits leaders representing employers, health plans and union coverage, and found that 43% ranked managing specialty drug costs as their top goal. By comparison, 37% said their No. 1 goal is to manage total cost of care, per the report.
    • “As more and more of these products come to market and existing drugs gain new indications, managing them across the pharmacy and medical benefits poses significant complexity, the report found. More payers listed this as a top challenge than access to integrated data or member affordability.”
  • The Wall Street Journal reports,
    • “Eli Lilly agreed to acquire Ajax Therapeutics for up to $2.3 billion to bolster its blood-cancer portfolio.
    • “Ajax Therapeutics is developing AJ1-11095, a Type II JAK2 inhibitor for myelofibrosis patients.
    • “Eli Lilly’s deal to buy Ajax adds to a recent spate of pharma acquisitions, including several by Lilly.”
  • and
    • [India’s] Sun Pharmaceutical Industries will acquire U.S.-listed Organon for $11.75 billion, becoming a top three global women’s health player.
    • Organon, a Merck spinoff, has over 70 products in women’s health and general medicines, commercialized across 140 countries.
    • Sun Pharma will fund the all-cash deal through internal cash and bank financing; the acquisition will make it a top seven global biosimilars player.
  • and
    • Ligand Pharmaceuticals LGND said it has reached a deal to acquire Xoma XOMA Royalty, a company that invests in a range of biotech firms, for around $740 million.
    • “Under the terms, Ligand will pay $39 a share in cash for Xoma, a 2.9% premium over the $37.90 closing price on Friday. The deal is expected to close in the third quarter.
    • “Both Ligand and Xoma are known as royalty aggregators for investing in drugs while they are in development and then, if they work out, collecting royalties from their sales.
    • “By absorbing Xoma, Ligand’s total portfolio would more than double in size to more than 200 drugs and experimental treatments, including a handful of medicines on the market and several in late-stage studies.”
  • MedTech Dive adds,
    • “Johnson & Johnson said Friday it has struck a deal to buy Atraverse Medical, an atrial fibrillation ablation device developer founded by the team behind Farapulse.
    • “Atraverse sells a radiofrequency guidewire used to create an atrial septal defect to treat AFib. The Food and Drug Administration cleared the Hotwire device for use in 2024.
    • “Hotwire competes with products including Boston Scientific’s ProTrack RF Anchor Wire, which Atraverse cited as the predicate product in its 510(k) submission.”
  • Beckers Health IT observes,
    • “For years, the conversation about AI in health systems centered on technology adoption: which tools to buy, which pilots to run, which workflows to automate. But as health systems move from isolated AI deployments toward enterprise-wide agentic platforms, the limiting factor is no longer the technology. It’s the people managing it.
    • “That was the central tension running through a panel of health system technology leaders at Becker’s 16th Annual Meeting in Chicago this spring. Across organizations ranging from a large rural integrated delivery network to an urban academic medical center to a national cancer system, the same challenge surfaced: operations leaders have not yet grasped that they are now managing a digital workforce — and the consequences of that gap are starting to show.
    • “The biggest barrier to us moving forward is really getting operations to understand that this fundamentally changes their role in the equation,” said Jeff Gautney, CIO of Rush University Medical Center in Chicago. “They are managing a digital workforce and they need to think that way as opposed to [thinking that] IT is monitoring this, IT is keeping an eye on it, IT is delivering this solution and I don’t really need to think any differently about it.”
  • MedCity News adds,
    • “There are plenty of AI startups on the market promising to bolster hospitals’ finances by increasing revenue. But that’s not the case for San Francisco-based Midstream Health.
    • “For most health systems, the key to unlocking dollars isn’t boosting revenue — it’s decreasing costs, said Venkat Mocherla, Midstream’s co-founder and president.
    • “Midstream, founded in 2023, uses AI to clean up and unify hospitals’ fragmented financial and operational data, which helps leaders spot savings opportunities and make smarter purchasing decisions, he explained. For instance, the platform could help surface insights that help a hospital capture missed rebates or avoid overpaying for supplies and devices.” * * *
    • T”he company’s platform is being used across health systems including Mount SinaiCommonSpirit and Houston Methodist. Midstream primarily makes money by taking a cut of the savings it generates, which Mocherla noted aligns the startup’s incentives directly with hospitals’ financial outcomes.”

Noteworthy Death

  • Cardiovascular Business reports,
    • “Pioneer cardiologist Eugene Braunwald, MD, often referred to as the “father of modern cardiology,” died April 22. He was 96 years old.
    • “Braunwald was born in Vienna, Austria, and immigrated to the United States as a child to flee Nazi persecution. He went on to hold leadership positions with the National Heart, Lung and Blood Institute; the University of California, San Diego; Brigham and Women’s Hospital and Harvard Medical School. He authored or co-authored more than 1,000 publications over the course of his career and helped shape medical education for many years as the longtime editor of Harrison’s Principles of Internal Medicine, a premier textbook for clinicians. 
    • “Braunwald was also a lifelong contributor to a variety of industry societies, including the American College of Cardiology (ACC)American Heart Association (AHA) and European Society of Cardiology (ESC). He earned the highest honors from all of these groups over the course of his career in medicine, and the AHA even started giving out the Eugene Braunwald Academic Mentorship Award annually in 1999.”
  • RIP

Cybersecurity Saturday

From the Iranian war front,

  • Cybersecurity Dive reports on April 23,
    • “Iran, long considered a steady and persistent cyber threat to the U.S., has raised its game in the months since the two nations went to war in February. 
    • “Iranian-backed cyber threat groups, which range from state-sponsored actors to pro-Iranian hacktivists and financially motivated hackers, appear to have evolved some of their motivations and capabilities in cyber, according to analysts and security researchers. 
    • “What we are seeing are attacks that are aiming to have a more destructive effect,” Annie Fixler, director of the Center on Cyber and Technology Innovation (CCTI) at the Foundation for Defense of Democracies told Cybersecurity Dive. 
    • Specifically, Iran-linked actors have increased the use of data wiping malware in recent attacks against Israel and demonstrated greater capability to evade detection, according to researchers at Palo Alto Networks. 
    • “In another alarming development, Darktrace last week published an analysis of a malware strain called ZionSiphon, to potentially tamper with chlorine levels and pressure controls in Israeli water facilities. The malware was embedded with pro-Iran and Palestinian messaging for additional psychological impact.”
  • Federal News Network commentator shares “what federal leaders need to know about Iran’s cyber campaign.”
    • “To understand the cyber implications of this conflict, federal leaders need to understand how Iran uses cyber as a strategic instrument.”

From the cybersecurity policy and law enforcement front,

  • Cyberscoop reports,
    • “Sean Plankey, the long-sidelined nominee to lead the Cybersecurity and Infrastructure Security Agency, asked President Donald Trump on Wednesday to withdraw his nomination.
    • “At this point in time, I am asking the President to remove my nomination from consideration,” he said in a notification letter seen by CyberScoop. “After thirteen months since my initial nomination, it has become clear that the Senate will not confirm me.”
    • “Plankey’s request comes weeks after the Senate confirmed MarkWayne Mullin to lead the Department of Homeland Security, CISA’s parent agency.”
  • and
    • “House Republicans unveiled on Wednesday Congress’ latest effort to tackle comprehensive digital privacy legislation for Americans.
    • “The Secure Data Act would allow consumers to opt out of data collection for individual businesses for the purposes of targeted advertising, selling to third parties or for use in automated decisionmaking.
    • “It would also require companies to inform consumers when their personal data is being collected or used, provide them with a portable version of that data, and give consent rights to parents over the data collection of teenagers.”
  • Per a NIST news release,
    • “The National Institute of Standards and Technology (NIST), in collaboration with the Department of Health and Human Services Office for Civil Rights (HHS OCR), announced the Safeguarding Health Information: Building Assurance through the Health Insurance Portability and Accountability Act (HIPAA) Security 2026 conference, scheduled for September 2–3, 2026, at the NIST campus in Gaithersburg, Maryland. The event will examine the current healthcare cybersecurity landscape and the HIPPA Security Rule, which establishes federal standards to protect the confidentiality, integrity, and availability of electronic protected health information. The conference will highlight practical strategies, tips, and techniques for implementing the HIPAA Security Rule, including required administrative, physical, and technical safeguards for covered entities and their business associates. Sessions will address best practices for managing risks to electronic health information and ensuring technical assurance, along with topics such as cybersecurity risk management, current threats to the healthcare community, and cybersecurity considerations for Internet of Things technologies in healthcare environments. The event will be offered in both in-person and virtual formats, with separate registration fees and timelines for each option. For additional details, visit the Safeguarding Health Information: Building Assurance through HIPAA Security 2026 event page.”
       
  • Per an April 23, 2026, HHS news release,
    • “Today, the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) announced settlements with four regulated entities following separate ransomware investigations under the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule. Ransomware is malicious software that blocks access to data—typically by encrypting it with a key known only to the attacker—until a ransom is paid. The resolutions announced mark 19 completed investigations from ransomware breaches and 13 completed investigations in OCR’s Risk Analysis Initiative.” * * *
    • “The settlements follow investigations into separate ransomware breaches that collectively affected over 427,000 individuals and involved the exposure of unsecured ePHI. The types of ePHI affected include demographic data, Social Security numbers (SSNs), financial information, lab results, medications, and diagnoses or conditions. Under the settlements, the regulated entities have agreed to implement corrective action plans subject to OCR monitoring for two years and paid a total of $1,165,000 to OCR.”
  • Per an April 20, 2026, Justice Department news release,
    • “A Florida man, formerly employed as a ransomware negotiator, pleaded guilty to conspiring to commit ransomware attacks against U.S. companies in 2023.
    • “According to court documents, Angelo Martino, 41, of Land O’Lakes, Florida, collaborated with the operators of the Blackcat/ALPHV (“BlackCat”) ransomware variant used by cybercriminals to attack and extort institutions and companies. Beginning in April 2023, Martino abused his role at a U.S.-based cyber incident response company to assist BlackCat actors. Working as a negotiator on behalf of five different ransomware victims, Martino provided BlackCat attackers with confidential information about the negotiating position and strategy of his company’s clients without the clients’ or his employer’s knowledge or permission. This confidential information assisted the ransomware actors and maximized the ransoms that the victims were required to pay. The confidential information included the victims’ insurance policy limits and internal negotiation positions. The BlackCat actors paid Martino for this confidential information.” * * *
    • “To date, law enforcement has seized $10 million of assets from Martino, including digital currency, vehicles, a food truck, and a luxury fishing boat that Martino obtained using proceeds of the offense or acquired as a result of the offense.”
  • Cyberscoop adds,
    • “A core leader of the hacker subset of The Com responsible for a series of high-profile phishing attacks and cryptocurrency thefts from September 2021 to April 2023 pleaded guilty to federal charges, the Justice Department said Friday. 
    • “Tyler Robert Buchanan of Dundee, Scotland, pleaded guilty to conspiracy to commit wire fraud and aggravated identity theft. The 24-year-old was arrested by Spanish police in Palma in 2024 as he attempted to board a charter flight to Naples, Italy. 
    • “Buchanan has been in federal custody since April 2025 and faces up to 22 years in federal prison at his sentencing, which is scheduled for August 21. 
    • “The British national and his co-conspirators, including Noah Michael Urban, who was sentenced to a 10-year federal prison sentence last year, harvested thousands of credentials via phishing and stole more than $8 million in cryptocurrency from U.S. residents via SIM-swapping attacks.”

From the cybersecurity breaches and vulnerabilities front,

  • Cybersecurity Dive reports,
    • “The Cybersecurity and Infrastructure Security Agency on Monday [April 20] released guidance related to the axios supply chain compromise originally disclosed in late March. 
    • “A suspected North Korean actor compromised the node package manager account for an axios maintainer last month. Axios is a Javascript library used widely across the software industry with millions of downloads per week. 
    • “CISA is urging security teams to monitor and review code depositories as well as continuous integration/continuous delivery pipelines that ran npm install or npm update on the compromised axios version, according to the guidance released Monday. 
    • “Security teams should search for cached versions of the affected dependencies in artifact repositories along with dependency management tools, according to the guidance. 
    • “If compromised dependencies are found during the search, organizations should revert the environment back to a known safe state, CISA said.” 
  • and
    • “Vercel, a cloud development platform, said that some of its internal systems were accessed after a third-party tool called Context.ai was compromised while being used by one of Vercel’s employees, according to a blog post released Sunday [April 20].
    • “Vercel is widely known as the creator of Next.js, which is the open-source framework for React. 
    • “The attacker was able to take over the employee’s Vercel Google Workspace account and access certain company “environments and environment variables” that were not designated as “sensitive.”
    • “Vercel said that a limited number of customers had their credentials compromised during the attack, and that they have been notified. They were urged to immediately rotate credentials. 
    • “The company said it believes the attacker is highly sophisticated, based on an assessment of their “operational velocity and detailed understanding of Vercel’s systems.”
  • and
    • “Hackers working for the Chinese government are increasingly hiding their attacks behind ready-made networks of hacked routers and other networking equipment, the U.S. and several allies said on Thursday [April 23].
    • “Attackers’ use of these so-called covert networks is not new, the agencies said in a joint advisory, “but China-nexus cyber actors are now using them strategically, and at scale.”
    • “By funneling their activity through compromised networking equipment — mostly small office and home office (SOHO) routers, but also internet of things devices — hackers can obfuscate their origins and make it harder for defenders to spot reconnaissance, malware deployment and data exfiltration.”
  • Cyberscoop adds,
    • “A state-sponsored hacking group has implanted a custom backdoor on Cisco network security devices that can survive firmware updates and standard reboots, U.S. and British cybersecurity authorities disclosed Thursday, marking a significant escalation in a campaign that has targeted government and critical infrastructure networks since at least late 2025.
    • “The Cybersecurity and Infrastructure Security Agency and the United Kingdom’s National Cyber Security Centre jointly published a malware analysis report identifying the backdoor, code-named Firestarter. Cisco’s threat intelligence division, Talos, attributed the malware to a threat actor it tracks as UAT-4356. The company attributed the same group to a 2024 espionage campaign called ArcaneDoor, which focused on compromising network perimeter devices.
    • “CISA confirmed it discovered Firestarter on a U.S. federal civilian agency’s Cisco Firepower device after identifying suspicious connections through continuous network monitoring. The finding prompted an updated emergency directive issued Thursday, requiring all federal civilian agencies to audit their Cisco firewall infrastructure and submit device memory snapshots for analysis by Friday.”
  • CISA added fourteen known exploited vulnerabilities (KVEs) to its catalog this week.
    • April 20, 2026
      • CVE-2023-27351 PaperCut NG/MF Improper Authentication Vulnerability
      • CVE-2024-27199 JetBrains TeamCity Relative Path Traversal Vulnerability
      • CVE-2025-2749 Kentico Xperience Path Traversal Vulnerability
      • CVE-2025-32975 Quest KACE Systems Management Appliance (SMA) Improper Authentication Vulnerability
      • CVE-2025-48700 Synacor Zimbra Collaboration Suite (ZCS) Cross-site Scripting Vulnerability
      • CVE-2026-20122 Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability
      • CVE-2026-20128 Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability
      • CVE-2026-20133 Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability
        • The Cybersecurity Express discusses these KVEs here.
        • Cybersecurity Dive discusses the Cisco KVEs here.
    • April 22, 2026
      • CVE-2026-33825 Microsoft Defender Insufficient Granularity of Access Control Vulnerability
        • Bleeping Computer discusses this KVE here.
    • April 23, 2026
      • CVE-2026-39987 Marimo Remote Code Execution Vulnerability
        • Resecurity discusses this KVE here.
    • April 24, 2026
      • CVE-2024-7399 Samsung MagicINFO 9 Server Path Traversal Vulnerability
      • CVE-2024-57726 SimpleHelp Missing Authorization Vulnerability
      • CVE-2024-57728 SimpleHelp Path Traversal Vulnerability
      • CVE-2025-29635 D-Link DIR-823X Command Injection Vulnerability 
        • The Hackers News discusses these KVEs here.
  • Cybersecurity Dive informs us,
    • “Phishing was the most common way hackers breached their targets in the first quarter of 2026, after nearly a year out of the top spot, Cisco’s Talos threat intelligence team said in a report published on Wednesday.
    • “Nearly 20% of Cisco’s incident-response engagements involved the preliminary stages of a ransomware attack, according to the report — significantly lower than in the first two quarters of 2025, when it was 50%.
    • “Cisco also said it saw hackers using AI to improve phishing attacks.”
  • and
    • “Companies using AI to write code are creating serious security risks that not all organizations feel prepared to handle, according to a reportreleased Wednesday by the security testing firm ProjectDiscovery. 
    • “Security personnel want audit trails and access limitations before they integrate AI into their processes, ProjectDiscovery found. “They are not opposed to the technology, but they need it to earn its place.”
    • “The report highlights one of the most fraught aspects of the AI revolution in the corporate world: the tension between AI-assisted coders and the people responsible for protecting their work.”
  • Dark Reading points out,
    • “AI agents can now carry out end-to-end cloud attacks with minimal human guidance, exploiting known misconfigurations and vulnerabilities at a speed no human attacker can match. 
    • “That’s the central finding of a new proof-of-concept (PoC) study by Palo Alto Networks’ Unit 42, where researchers built an autonomous multi-agent system that carried out a complete cloud attack chain in a live environment, using a single natural-language prompt.
    • “The study suggests an intrusion campaign that Anthropic uncovered last year, when a Chinese state-affiliated cyber-espionage group used the company’s Claude AI to automate large portions of an attack chain, was more a preview of things to come rather than an exception.”
  • Cyberscoop notes,
    • “Attackers rarely exploit an edge-device vulnerability indiscriminately. Typically, they first test how widely the flaw can be used and how much access it can provide, then move on to steal data or disrupt operations.
    • “Pre-attack surveillance and planning leaves a lot of noise in its wake. These signals — particularly spikes in traffic that are hitting specific vendors — can act as an early-warning system, often preceding public vulnerability disclosures, according to research GreyNoise shared exclusively with CyberScoop prior to its release. 
    • “Roughly half of every activity surge GreyNoise detected during a 103-day study last winter was followed by a vulnerability disclosure from the same targeted vendor within three weeks, GreyNoise said in its report.
    • “Researchers determined that the median warning of an impending vulnerability disclosure arrived nine days before the targeted vendor issued a public alert to its customers.”

From the ransomware front,

  • Bleeping Computer reports,
    • “Home security giant ADT has confirmed a data breach after the ShinyHunters extortion group threatened to leak stolen data unless a ransom is paid.
    • “In a statement shared today, the company said it detected unauthorized access to customer and prospective customer data on April 20, after which it terminated the intrusion and launched an investigation.
    • “This investigation determined that personal information was stolen during the breach.”
    • “The investigation confirmed that the information involved was limited to names, phone numbers, and addresses,” ADT told BleepingComputer.
    • “In a small percentage of cases, dates of birth and the last four digits of Social Security numbers or Tax IDs were included. Critically, no payment information — including bank accounts or credit cards — was accessed, and customer security systems were not affected or compromised in any way.”
  • and
    • “Recently observed Trigona ransomware attacks are using a custom, command-line tool to steal data from compromised environments faster and more efficiently.
    • “The utility was emplayed in attacks in March that were attributed to a gang affiliate, likely in an effort to avoid publicly available tools, such as Rclone and MegaSync, that typically trigger security solutions.
    • “Researchers at cybersecurity company Symantec believe that the shift to a custom tool may indicate that the attacker is “investing time and effort in proprietary malware in a bid to maintain a lower profile during a critical phase of their attacks.”
  • and
    • “A new Kyber ransomware operation is targeting Windows systems and VMware ESXi endpoints in recent attacks, with one variant implementing Kyber1024 post-quantum encryption.
    • “Cybersecurity firm Rapid7 retrieved and analyzed two distinct Kyber variants in March 2026 during an incident response. Both variants were deployed on the same network, with one targeting VMware ESXi and the other focusing on Windows file servers.
    • “The ESXi variant is specifically built for VMware environments, with capabilities for datastore encryption, optional virtual machine termination, and defacement of management interfaces,” explains Rapid7.”
  • Dark Reading relates,
    • “A ransomware gang known as “The Gentlemen” has made a name for itself, claiming hundreds of victims in a matter of months.
    • “The Gentlemen is a ransomware-as-a-service (RaaS) outfit that first popped up in mid-2025. While it operates fairly typical double extortion attacks (using both encryption and data leaking as extortion levers), The Gentlemen is known for sophisticated tactics, techniques, and procedures (TTPs), such as antivirus killers and complex infection chains.
    • “Check Point Research this week published its latest findings concerning the gang, noting that it has claimed hundreds of victims and uses malware including something called SystemBC, which researchers described as “a proxy malware frequently leveraged in human‑operated ransomware operations for covert tunneling and payload delivery.”

From the cybersecurity defenses front,

  • TechTarget discusses,
    • “Beyond awareness: Human risk management metrics for CISOs
    • “Traditional security training isn’t keeping threat actors out. As employee awareness programs fall short, Forrester Research suggests a better approach.” * * *
    • “With cybersecurity threats evolving so swiftly, organizations cannot afford to rely on outdated security awareness programs that fail to address the root causes of human vulnerabilities. Human risk management offers a transformative approach, shifting the focus from mere awareness to actionable behavior change.”
  • Dark Reading points out,
    • “When Anthropic announced Project Glasswing this month, most coverage landed on the headline numbers: a 27-year-old OpenBSD vulnerability, a 16-year-old FFmpeg flaw, a Linux kernel exploit chain assembled without human steering. The coalition behind it, including AWS, Apple, Cisco, CrowdStrike, Google, Microsoft, Palo Alto Networks, and others, isn’t there for the optics; they’re there because the model’s capabilities are real, and the coordinated disclosure pipeline matters.
    • “The part worth dwelling on is the FFmpeg result specifically. At least five million automated fuzzer testing passes hit that vulnerable line of code and not one caught it. Mythos Preview read the code, understood what it was doing, and found the flaw.
    • That gap highlights a fundamental security misconception of the past two decades.
    • The industry built enumerators. It needed readers.
    • Automated security tooling has almost always worked the same way at its core: define a pattern, scan to identify the pattern, flag the match. SIEMs ingest event logs and match rules. Static analysis tools check code against known signatures. Vulnerability scanners compare software versions against CVE databases, and so on. These are mostly based on enumeration, and enumeration can only find what you already know to look for.
    • “Five million passes with the industry standard tools, zero catches. These tools knew how to count. But they didn’t know how to read.
    • “Mythos Preview succeeded because it approached the code the way a skilled human analyst would: with an understanding of intent, of relationships between components, of what a sequence of operations does, rather than what it superficially looks like. Security at that depth has been the exclusive domain of rare, expensive human expertise. A model that replicates it at scale is genuinely a different kind of thing, and the industry is right to pay attention.”
  • Here is a link to Dark Reading’s CISO Corner.

Midweek report

From Washington, DC,

  • Per a House of Representatives news release,
    • “Today, the House Appropriations Committee met to consider the Fiscal Year 2027 Financial Services and General Government Appropriations Act. The measure was approved by the Committee with a vote of 34 to 28.” * * *
    • “A summary of the bill is available here.” * * *
  • Federal News Network adds,
    • “The prospects of a civilian federal pay raise next year are continuing to diminish, after House appropriators made no mention of a pay increase in their 2027 spending legislation.
    • “The House Appropriations Committee’s financial services and general government (FSGG) bill for fiscal 2027, which advanced along party lines Wednesday evening, says nothing on funding for a civilian pay raise. Although not yet final, that increases the chances federal employees will miss out on a salary increase next year.”
  •  A House Education and Labor subcommittee shared the testimony presented to its members during its PBM business model hearing today.
  • The Wall Street Journal offers seven takeaways from HHS Secretary Robert F. Kennedy Jr.’s numerous recent appearances before Congressional committees.
  • Healthcare Dive informs us,
    • “Prices for some healthcare services after arbitration under the No Surprises Act were much higher than the same in-network commercial prices before the law was passed, according to new research out this week.
    • “In 2024, prices for imaging after arbitration were 767% higher than average prices in Medicare. For comparison, the same imaging prices were roughly 200% higher than Medicare prices before the No Surprises Act was passed, according to an analysis published by the Brookings Center on Health Policy.
    • “Arbitration decisions in emergency care, imaging and pediatric critical care tended to skew more closely to amounts that providers offered during negotiations, rather than those offered by insurers, according to the analysis.” * * *
    • [This] Brookings research compliments other studies that have found the No Surprises arbitration process raises healthcare costs. One study published in Health Affairs last year found that IDR created an estimated $5 billion in costs between 2022 and 2024, which could eventually result in higher insurance premiums for consumers.”
  • Per an HHS news release,
    • “The Advanced Research Projects Agency for Health (ARPA-H), an agency within the U.S. Department of Health and Human Services (HHS), is today announcing the first set of research teams for its Evidence-Based Validation & Innovation for Rapid Therapeutics in Behavioral Health (EVIDENT) initiative, which will collectively fund up to $139.4 million to help spur new, effective therapies for behavioral health. As part of the Trump Administration’s Executive Order to Accelerate Medical Treatments for Serious Mental Illness, EVIDENT will allocate at least $50 million to match state government investments in psychedelic research for populations with serious mental illness.”
  • MedPage Today adds,
    • “From July 2022 [when the 988 mental health line was launched] through December 2024, 35,529 suicides among individuals ages 15 to 34 were observed compared with 39,901 expected suicides based on trends before the launch of the lifeline, corresponding to an 11% reduction (95% CI 8.7-13.1), reported Anupam B. Jena, MD, PhD, of Harvard Medical School in Boston, and co-authors in a research letter in JAMA.
    • “After replacing the previous 10-digit number for suicide and crisis services with the 3-digit number and investing more than $1.5 billion to expand crisis center capacity and workforce nationwide, “988 appears to be working where it matters most, in reducing suicide deaths among the young people who use it the most … saving lives, at scale, within a few years of launch,” said co-author Vishal R. Patel, MD, MPH, also of Harvard Medical School.
    • “Prior evidence for the lifeline was mostly indirect: higher call volumes, positive caller surveys, reductions in same-day distress,” Patel told MedPage Today. In contrast, this study shows that the lifeline actually affects suicide mortality at the population level, he noted.”
  • HR Dive relates,
    • “The U.S. Department of Labor’s Wage and Hour Division on Wednesday announced a proposed rule to streamline joint employer status under the Fair Labor Standards Act, the Family and Medical Leave Act, and the Migrant and Seasonal Agricultural Worker Protection Act, according to a department press release.
    • “The rule would create “a single nationwide standard that both derives from commonalities in federal court precedent where available and resolves significant differences among the circuit courts where they exist,” DOL said, to “ensure employees and employers have a clear, consistent understanding of when multiple employers are jointly responsible for protecting the wages and other rights of an employee.”

From the Food and Drug Administration front,

  • Fierce Pharma reports
    • ‘Merck is carving out its own place in the evolving HIV treatment space with an FDA approval for its Idvynso, a combination regimen that brings its novel islatravir to market for the first time and serves as the cornerstone of what could be a lucrative HIV franchise for the company. 
    • “Idvynso is a once-daily, two-drug oral pairing of Merck’s doravirine and islatravir. Doravirine is a non-nucleoside reverse transcriptase inhibitor (NNRTI) that has been commercialized since 2018 as part of Merck’s Pifeltro and Delstrigo, while islatravir is a newer nucleoside reverse transcriptase translocation inhibitor (NRTTI) that represents the “anchor medicine” in a number of other HIV combos that the company is advancing.
    • “The doravirine and islatravir combo’s debut is specifically targeted at patients who are switching from other HIV treatments and will be available in pharmacies after May 11, Merck said in its April 21 press release.” 
  • STAT News relates,
    • “The Swiss drugmaker Roche on Tuesday presented the latest data for its experimental multiple sclerosis drug, setting the stage for the company to seek approval for a medicine that it believes can cut relapse rates and slow the progressive disability the disease causes.  
    • “Now the test is whether the drug, called fenebrutinib, can win the regulatory green light.
    • “While three late-stage trials of the drug have shown it to be effective, analysts have homed in on some potentially worrying liver safety signals, an issue that previously prompted the Food and Drug Administration to reject an MS therapy developed by Sanofi. In data released Tuesday, researchers also disclosed that there were two drug-related deaths among patients who took fenebrutinib.  
    • “Roche has touted the potential of fenebrutinib — an oral tablet — noting that it hit its efficacy mark across different types of MS and offers a new approach for treating the disease. It’s also sought to differentiate its therapy from Sanofi’s rejected drug, called tolebrutinib.”

From the public health and medical / Rx research front,

  • BioPharma Dive reports,
    • “Revolution Medicines’ closely watched pancreatic cancer drug helped control tumors when administered early in a patient’s disease course, stimulating a response in at least half of those who got it either as a single treatment or alongside chemotherapy, according to trial results unveiled at a medical meeting Tuesday.
    • “The findings disclosed at the American Association for Cancer Research’s annual convention come from studies testing the therapy, daraxonrasib, in first-line pancreatic cancer. They follow, by a week, Phase 3 data showing the drug nearly doubled survival in people whose disease had progressed after an earlier treatment, sparking a share surge that has launched the company’s valuation past $30 billion.
    • “The Food and Drug Administration gave Revolution a special regulatory fast-pass that could lead to a clearance within weeks of an approval submission.”
  • and
    • “A three-drug combination involving Merck & Co.’s Welireg failed to significantly delay tumor progression or extend survival in a Phase 3 trial of patients newly diagnosed with the most common form of kidney cancer, setting back the big drugmaker’s plans to further expand use of the medication.
    • “The study evaluated Welireg alongside Merck’s immunotherapy Keytruda and Eisai’s Lenvima in first-line clear cell renal cell carcinoma and compared that regimen to the Keytruda-Lenvima tandem alone. Merck didn’t provide specifics but said that drug trio — as well as a separate one also tested in the trial — missed the study’s dual main objectives at an interim analysis.
    • “Merck noted how the findings don’t affect other ongoing studies in “Litespark,” the broad program it’s jointly conducting with Eisai and that includes other Welireg tests. The Food and Drug Administration is reviewing an application based on results from one Litespark study that would expand use of Welireg earlier in kidney cancer.”
  • MedPage Today relates,
    • “In a survey of roughly 45,000 U.S. adults representing more than 257 million people, 9% said they had obesity and drank heavily over the past month, while 3.8% said they had both obesity and met criteria for alcohol use disorder (AUD) over the past year, reported researchers led by Bryant Shuey, MD, MPH, of the University of Pittsburgh.
    • “Overlapping heavy drinking and obesity was most common among men ages 35 to 49 (13.6%), women ages 26 to 34 (11.9%), and Black individuals (11.9%). AUD and obesity overlap was highest for men and women ages 26 to 34 (6.2% and 5.1%), people without insurance, and those on Medicaid, the findings in JAMA Internal Medicine showed.
    • “Shuey and colleagues said the findings on this high-risk population call for public health and clinical interventions tailored to younger and middle-age adults, especially the uninsured and those on Medicaid, to prevent liver disease and liver-associated deaths.” * * *
    • “Given the effectiveness of GLP-1 drugs “for weight loss and metabolic dysfunction–associated steatohepatitis, expanding access for patients with co-occurring risky alcohol use and obesity may reduce liver disease burden,” they argued.”
  • Health Day tells us,
    • “Pregnancy-related deaths in the U.S. increased sharply during the COVID-19 pandemic, particularly among Black women, a new study reports.
    • “Deaths remain significantly higher today for Black mothers, even though they’ve returned to pre-pandemic levels for most other groups, researchers reported in the journal Obstetrics & Gynecology.
    • “We saw a dramatic increase in pregnancy-related deaths during the COVID-19 pandemic, but the recovery has not been equal across all groups,” said senior researcher Dr. Lindsay Admon, an associate professor of obstetrics and gynecology at the University of Michigan Medical School.
    • “We need to better understand what’s driving these differences so we can develop solutions that reduce maternal deaths and improve outcomes for everyone,” she said in a news release.”
    • * * * “Results showed that maternal deaths during or just after pregnancy rose more than 60% during the pandemic, from about 20 deaths per 100,000 live births in 2019 to 33 per 100,000 in 2021.
    • “Most of the pandemic increase was linked to COVID-associated deaths, researchers found. Early pregnancy death rates rose by 7.5 per 100,000 live births, and later pregnancy deaths by 3.7 per 100,000.
    • “By 2023 and 2024, early pregnancy deaths had returned to pre-pandemic levels, but those late in pregnancy and after pregnancy remained elevated.
    • “All death rates remained notably higher for Black mothers, researchers found.”
  • Per an NIH news release,
    • “In a National Institutes of Health (NIH)-funded study, researchers developed a cancer assessment tool that can identify high-risk patients and the tumor cells linked to that risk. The model, called scSurvival, uses a machine learning framework designed to analyze large-scale data at single-cell resolution. 
    • “With NIH support, Oregon Health & Science University (OHSU) tested the model on clinical data from more than 150 cancer patients. The tool predicted survival outcomes and linked specific cell populations to higher risk. 
    • “A risk assessment tool that not only tells you who may be at higher risk, but also provides clues as to why, could really help in these difficult cancers” said Anthony  Letai, M.D., Ph.D., director of NIH’s National Cancer Institute (NCI).”  

From the U.S. healthcare business and artificial intelligence front,

  • Beckers Hospital Review relates,
    • “Franklin, Tenn.-based Community Health Systems reported an operating income of $281 million (9.5% margin) on revenues of $3 billion in the first quarter of 2026, down slightly from a $284 million operating gain (9% margin) in the same period last year. 
    • “However, after interest payments on debt and other expenses, CHS reported a net loss of $58 million in the first quarter, compared to a $13 million loss in the first quarter of 2025. 
    • “We are pleased with the continued, tangible progress on our key priorities, demonstrated by improvements in quality scores, patient experience and physician satisfaction measures, and investments in growth opportunities,” CEO Kevin Hammons said in an April 21 news release. “In the face of a dynamic macroeconomic environment, we remain focused on the variables within our control and believe we are positioning the company for long-term success and value creation.”
  • and
    • “Optum Rx — the pharmacy benefit manager for UnitedHealth Group — claims its “PreCheck” prior authorization tool not only cuts prescription approval times but also reduces denials and appeals.
    • “UnitedHealth Group gave an update on the tool in an April 21 earnings call. Optum CEO Patrick Conway, MD, said denials due to missing information dropped by 68% and appeals were down 88%, thanks to PreCheck. He said PreCheck has been “easing interactions for clients, members and providers.”
    • “Dr. Conway reaffirmed that PreCheck has axed prescription approval time from eight hours to fewer than 30 seconds. 
    • “Optum Rx announced an expansion of PreCheck in November, alongside its decision to eliminate reauthorization requirements for 40 medications. In the November release, UnitedHealth Group said, as of this year, the PreCheck platform covers more than 45 medications and is leveraged across 20 health systems.”
  • Healthcare Dive tells us,
    • “Amazon is launching a weight management program with access to GLP-1s through its One Medical primary care chain, in a bid to help consumers more easily access the popular weight loss drugs alongside supportive care, the retail and technology giant said Tuesday. 
    • “Under the program, users work with a dedicated provider to receive a GLP-1 medication as well as follow-up care, so patients can adjust their treatment and address related health concerns like cardiovascular disease and diabetes. 
    • “Patients can also access prescriptions for “transparent pricing” on Amazon Pharmacy, the company said. New GLP-1 pills start at $25 per month with insurance or through cash-pay options as low as $149 per month.”
  • Fierce Pharma informs us,
    • “As pharma giants slash headcounts and routinely strike billion-dollar M&A deals, another trend is steadily playing out at many of the largest drugmakers: adoption of AI on a corporate scale.
    • “Mark Merck as a participant in this movement. On Wednesday, the company revealed a partnership with Google Cloud as it works to undergo an “agentic AI enterprise transformation.”
    • “As part of an investment in Google Cloud valued at up to $1 billion, Merck will get access to the tech giant’s agentic AI platform across its R&D operations, manufacturing, commercial teams and corporate functions.
    • “Notably, the deal involves Google Cloud engineers working directly with Merck’s teams to onboard the tech, according to the April 22 press release. In a statement, Dave Williams, Merck’s chief information and digital officer, noted that the AI push comes “as we enter one of the most significant launch periods in our company’s history.”
  • Beckers Health IT adds,
    • “UnitedHealth Group is betting big on AI in 2026 — $1.5 billion to be exact. 
    • “During the company’s Q1 earnings call, leaders fleshed out how that investment is materializing.
    • “Think about it this way: A third of this is explicitly invested into software products and platforms, accelerating Optum Insight’s transition of business models into an AI-first software and services firm. The remaining two-thirds is spent across signature end-to-end processes and functions across UnitedHealth Group,” Optum Insight CEO Sandeep Dadlani said. 
    • “Optum Insight, the technology-enabled services business under UnitedHealth, will manage internal AI use cases, which could eventually be translated and commercialized beyond the company. UnitedHealth expects a 2-to-1 return, much of it within the next 12 to 18 months.”
  • and
    • “Michael and Susan Dell have surpassed $1 billion in total giving to the University of Texas at Austin, becoming the university’s first billion-dollar donors, according to an April 21 news release.
    • “The latest investment will support development of the UT Dell Campus for Advanced Research, anchored by an AI-focused UT Dell Medical Center expected to open in 2030. The Dells’ investment will also support expanded supercomputing capabilities, student scholarships and housing.
    • “The medical center will integrate Houston-based University of Texas MD Anderson Cancer Center to provide cancer care as part of the new campus.
    • “The university plans to break ground on the medical center later in 2026.”
  • Fierce Pharma points out,
    • “After AbbVie earlier this year pledged a whopping $100 billion in U.S. R&D and capital investments over the next decade, the company is filling in more details on its expansion plans. And like with many other pharma giants, it’s putting down roots in North Carolina.
    • “The North Chicago-based drugmaker on Wednesday revealed its largest-ever capital investment in a single campus, plotting a 185-acre production hub in Durham. The project will cost some $1.4 billion and add more than 730 roles to the company’s headcount, according to an April 22 press release. The site will produce certain AbbVie medicines in its immunology, neuroscience and oncology portfolios.”

Cybersecurity Saturday

From the Iranian war front,

  • The New York Times reports on April 16,
    • “The exchange of bombs and missiles in the Middle East between Iran and its foes has been paused for more than a week now. Iran’s hackers, however, have remained active on the digital battlefield.
    • “Iran has continued its cyberspace operations since the cease-fire with the United States began on April 8, according to Western cybersecurity experts and former U.S. intelligence officials. In doing so, Tehran is trying to keep up pressure on the United States and Israel but also positioning itself to mount a bigger retaliation if peace talks do not resume.” * * *
    • “This is a time, more than ever, we should worry about Iran,” said Evan Peña, a co-founder of the cybersecurity firm Armadin. “In cyberwarfare there isn’t really a cease-fire.”
    • “Mr. Peña said that if the cease-fire or negotiations collapsed, Iran would want to be in a strong position to retaliate, potentially by attacking critical infrastructure in the United States. Tehran has done so in the past but generally with limited impact. More than a decade ago, Iranian hackers targeted a small dam in upstate New York, but by happenstance the dam’s sluice-gate controls had been taken offline for maintenance, much to the relief of U.S. investigators at the time.
    • “Iran, Mr. Peña said, is going to be more aggressive and devote more resources to trying to get access to American companies as the war rages on.” * * *
    • “Josh Zweig, the chief executive of Zip Security, which secures small and midsize enterprises, said Iran was specifically looking for less well-defended targets, like municipal-run water and energy facilities.
    • “He also said small firms that make investment decisions for wealthy individuals and families have been targeted.”

From the cybersecurity policy and law enforcement front,

  • Cyberscoop reports,
    • “National Cyber Director Sean Cairncross expects more executive orders coming from the White House as part of implementing the national cybersecurity strategy, he said Wednesday [April 15].
    • “Staffers on Capitol Hill and others in the cyber world have been awaiting the implementation guidance the Trump administration had proclaimed would come to accompany the strategy  published last month.
    • “Asked at a Semafor event about whether that would include executive orders, Cairncross answered, “I think that that’s the case.”
    • “Cairncross touted American ingenuity for producing an artificial intelligence model like Anthropic’s Claude Mythos, rather than it developing under U.S. cyber rivals like China or Russia. He acknowledged reports about the administration holding meetings about the cyber risks and benefits of something like Mythos — “the model right now that everyone’s talking about” — adding that the administration is looking to balance the dangers and positive capabilities of AI in cyberspace.”
  • and
    • “The federal agency tasked with analyzing security vulnerabilities is overwhelmed as it and other authorities struggle to keep pace with a flood of defects that grows every year. The National Institute of Standards and Technology announced Wednesday that it has capitulated to that deluge and narrowed the priorities for its National Vulnerability Database.
    • “NIST said it will only prioritize analysis for CVEs that appear in the Cybersecurity and Infrastructure Security Agency’s known exploited vulnerabilities catalog, software used in the federal government and critical software defined under Executive Order 14028.
    • “The federal agency’s goal with the change is to achieve long-term sustainability and stabilize the NVD program, which has encountered previous challenges, notably a funding lapse in early 2024 that forced NIST to temporarily stop providing key metadata for many vulnerabilities in the database.” * * *
    • “NIST said CVEs that don’t fit its more narrow criteria will still be listed in the NVD, but they won’t be automatically enriched with additional details. 
    • “This will allow us to focus on CVEs with the greatest potential for widespread impact,” the agency said. “While CVEs that do not meet these criteria may have a significant impact on affected systems, they generally do not present the same level of systemic risk as those in the prioritized categories.”
  • Dark Reading adds,
    • [C]ybersecurity teams will need to move to make up for the loss of enrichment data, according to Shane Fry, chief technology officer at RunSafe Security. 
    • “Anthropic’s Mythos highlights why NIST is making this move in the first place,” Fry says. “They have already seen a surge in CVE submissions over the past year and have not been able to keep up. Mythos and other tools for AI-assisted vulnerability will only add to the volume of vulnerabilities disclosed. It’s a problem the industry has been aware of for some time.” 
    • “So without the ability to keep up with the sheer volume of CVEs cyber teams need to pivot, Fry adds. 
    • “The way forward will have to emphasize building defenses into software itself to prevent the exploit of bugs and zero-days even before patches are available or the vulnerability is disclosed,” he advises.” 
  • Federal News Network tells us,
    • “The [U.S.] Office of Personnel Management announced this week that it will be expanding its Tech Force hiring program to include opportunities for agencies to hire cybersecurity specialists. That’s on top of the program’s existing recruitment efforts for software engineers, data scientists and product managers.
    • “The newly added cybersecurity roles will focus on “protecting critical systems, strengthening federal cybersecurity capabilities and safeguarding the digital infrastructure relied on by millions of Americans,” OPM said in a press release.
    • “The federal government depends on strong cybersecurity to protect critical systems and maintain public trust,” OPM Director Scott Kupor said Monday. “Through Tech Force, we’re recruiting highly skilled cybersecurity professionals to take on real challenges and strengthen the government’s defenses where it matters most.”
  • Cyberscoop informs us,
    • “Authorities from 21 countries took down 53 domains and arrested four people allegedly involved in distributed denial-of-service operations used by more than 75,000 cybercriminals, Europol said Thursday. 
    • “The globally coordinated effort dubbed “Operation PowerOFF” disrupted booter services and seized and dismantled infrastructure, including servers and databases, that supported the DDoS-for-hire services, officials said.
    • “Law enforcement agencies obtained data on more than 3 million alleged criminal user accounts from the seized databases, and ultimately sent more than 75,000 emails and letters to participants, warning them to halt their activities.”
  • and
    • “Two New Jersey men were sentenced Wednesday for facilitating North Korea’s long-running scheme to plant operatives inside U.S. businesses as employees, generating more than $5 million in illicit revenue for the regime, the Justice Department said. 
    • “The U.S. nationals — Kejia Wang, also known as Tony Wang, and Zhenxing Wang, also known as Danny Wang — were part of a years-long conspiracy that placed operatives in jobs at more than 100 U.S. companies, including many Fortune 500 companies, based in 27 states and the District of Columbia. * * *
    • “Both men previously pleaded guilty to an assortment of crimes. Kejia Wang was sentenced to nine years in prison for conspiracy to commit wire and mail fraud, money laundering and identity theft. Zhenxing Wang was sentenced to 92 months in prison for conspiracy to commit wire and mail fraud and money laundering. 
    • “The pair were also ordered to forfeit a combined $600,000, of which two-thirds has already been paid, officials said.”

From the cybersecurity breaches and vulnerabilities front,

  • Health Exec reports,
    • “Healthcare IT infrastructure and electronic health record company CareCloud confirmed in a regulatory filing that it’s suffered a data breach, said to have impacted one of its six patient record stores, with hackers inside its network for “approximately eight hours.”
    • “The “cybersecurity incident” was disclosed in a filing with the U.S. Securities and Exchange Commission, and said the incident occurred on March 16. The company said that, while intruders did access patient medical records, it wasn’t clear if any data was stolen.
    • “An investigation into the data breach is still ongoing, and CareCloud said it’s working with a third-party cybersecurity organization to gather the details. After some downtime, CareCloud said it believes the invasion has been thwarted and that criminals no longer have a way inside its network.
    • “Systems were taken down and restored the same day. Details such as how the cyberattack was conducted and if any ransomware was deployed was not revealed. It’s also not clear if any notable cybercrime syndicate was behind the data breach, nor whether those responsible made any demands. 
    • “The filing with the SEC was released on March 24, and there hasn’t been any real update from the company since.”
  • The Cybersecurity and Infrastructure Security Agency added ten known exploited vulnerabilities (KVEs) to its catalog this week.
  • Cybersecurity Dive tells us,
    • “Hackers are attempting to exploit a high-severity flaw found in several end-of-life routers from TP-Link, according to a blog post published Friday [April 17] by Palo Alto Networks’ Unit 42. 
    • “Researchers warn the observed payloads share similarities to those found in malware used in Mirai-like botnets. Such activity would involve attempts to download the malware and execute on vulnerable devices, according to researchers. 
    • “The vulnerability was originally disclosed in June 2023, and proof of concept exploits appeared prior to the disclosure, wrote Unit 42 researchers
    • “The Cybersecurity and Infrastructure Security Agency previously added the command injection vulnerability, tracked as CVE-2023-33538, to its Known Exploited Vulnerabilities catalog in July 2025.” 

From the ransomware front,

  • The HIPAA Journal reports,
    • Brockton Hospital in Massachusetts is continuing [as of April 15] to grapple with a cybersecurity incident that took many of its electronic systems offline on April 6, 2026, and forced the hospital to divert ambulances to alternate facilities and cancel scheduled cancer treatments. An investigation into the cyberattack is ongoing, and the hospital is working with federal and state officials. While some systems have been brought back online, the hospital is continuing to use its downtime procedures, with staff members working off paper rather than computers. A Signature Healthcare spokesperson told Boston 25 News that the hospital would continue under downtime procedures for the next two weeks. * * *
    • “The Anubis ransomware-as-a-service group claimed responsibility for the attack. Anubis engages in double extortion, stealing data and encrypting files. A ransom must be paid to prevent the release of stolen data and obtain the keys to recover encrypted files. According to SuspectFile, which was contacted by a member of the Anubis group, files were encrypted in the attack. The Anubis spokesperson told SuspectFile that only non-critical systems were encrypted, and 2TB of data was stolen in the attack, including a large volume of patient data.
    • “Anubis is attempting to pressure Signature Healthcare into paying the ransom by adding the hospital to its data leak site, along with a countdown clock when the stolen data will be published. Signature Healthcare has yet to confirm the extent of data theft, which may not be known for some time. The priority continues to be patient care, remediating the attack, and bringing systems back online when it is safe to do so.”
  • Govtech relates,
    • “Ransomware continues to pose a serious threat to U.S. critical infrastructure, with more than 2,100 related incidents reported to federal authorities in 2025, according to the latest FBI Internet Crime Complaint Center (IC3) report.
    • “To put that number in perspective, IC3 reported roughly 1,100 data breach threats to critical infrastructure, which includes sectors such as health care, critical manufacturing, financial services, energy and agriculture, among others. Ransomware attacks directed at critical infrastructure are serious, possessing as they do the potential to disrupt operations, expose sensitive data and affect the delivery of public services.
    • “Those incidents have implications for state and local government organizations, which operate or support many of these systems. The nation’s critical infrastructure spans 16 sectors whose disruption would have a debilitating effect on the United States. Of these, the health-care and public health services sector reported the highest number of incidents, the report shows.”
  • SC Media adds,
    • “Analysis by Check Point researchers showed that out of the 672 ransomware attacks reported in March 2026, Qilin alone accounted for 20%, followed by Akira, which was responsible for 12% of the attacks, and Dragonforce RaaS, which was responsible for 8% of the incidents, reports Infosecurity News.”
  • and
    • “Suspected former Black Basta ransomware affiliates are ramping up targeting of senior-level executives with social-engineering attacks designed to deploy remote monitoring and management (RMM) software, ReliaQuest reported Tuesday.
    • “Black Basta, a previously notorious Russia-linked ransomware-as-a-service (RaaS), became defunct last year following leaked chats exposing its infrastructure and techniques. However, attacks leveraging the group’s distinct tactics, techniques and procedures (TTPs) have continued into 2026, with ReliaQuest noting an accelerating volume and increased targeting of company leadership.
    • “For example, Microsoft Teams-based phishing — a staple of Black Basta’s playbook — is becoming more prevalent, with 56% of all Teams phishing over the last year occurring within the last quarter, and nearly a third happening in March 2026 alone.”
  • Industrial Cyber notes,
    • “New data from Cyfirma disclosed that ransomware activity in March reflects a continuation of the sector’s shift toward structured, repeatable extortion models, where encryption is paired with data theft to maximize pressure on victims. The findings show that growing fragmentation of extortion groups suggests that smaller or emerging threat actor groups could adopt automation, AI-assisted reconnaissance, and data-driven victim profiling to scale operations efficiently. These campaigns rely heavily on coercive messaging, warning against third-party recovery attempts and reinforcing the risk of permanent data loss, underscoring how psychological pressure remains central to payment conversion strategies. 
    • “At the operational level, ransomware actors in March continue to refine rather than reinvent their tactics, prioritizing efficiency, scalability, and consistency across attacks. Cyfirma assesses that groups are likely to enhance encryption speed, standardize extortion workflows, and expand double extortion practices, while relying on common intrusion vectors such as phishing and exposed services. The broader trajectory points to incremental evolution within a mature ecosystem, where innovation is less about novel techniques and more about optimizing execution and monetization across a globally opportunistic threat landscape.” 
  • Security Boulevard informs us,
    • “Double extortion is bad enough—that’s the current tactic favored by ransomware groups—but the emerging quadruple extortion promises to further complicate mitigation and response by targeted organizations, prompting an escalation in extortion payments.  
    • “Yet that’s just one piece of evidence that ransomware continues to evolve despite high-profile takedowns by law enforcement—they just reincarnate or rebrand as new groups, new research by Akamai shows. Of course, the biggest game-changer is GenAI, as RasS operators like Black Basta and FunkSec press LLMs into service to generate code and greatly improve the social engineering techniques that give bad actors a foot in the door and to scale up attacks, opening the door for even less sophisticated actors to execute damaging attacks. 
    • “Ransomware groups continue to seek additional ways to generate profit, such as by pressuring victims and weaponizing compliance,”  researchers at Akamai note in their Ransomware Report 2025
    • “Noting that ransomware tactics have moved “away from traditional encryption-centric ransomware tactics towards more sophisticated and advanced extortion methods,” Nathaniel Jones, vice president, security and AI strategy and field CISO at Darktrace, says, “rather than relying solely on encrypting a target’s data for ransom, threat actors will increasingly employ double or even triple extortion strategies, encrypting sensitive data but also threatening to leak or sell stolen data unless their ransom demands are met.” 

From the cybersecurity defenses front,

  • The Wall Street Journal reports,
    • “The software bug was capable of crashing an operating system used by firewalls, servers and network appliances. It went undetected for over 27 years.
    • “Last month, it was caught by Mythos, the latest AI model from Anthropic that has spooked the White House, banking executives and cybersecurity professionals around the world.
    • Welcome to the bug armageddon. AI models like Mythos and others are finding bugs in older software at a rate never seen before.
    • “While most of the coding issues may be minor, their sheer volume has amplified the risk that smaller software developers will become overwhelmed with reports of bugs such as the one Mythos found. Thanks to AI, hackers will be able to leverage those bugs more quickly than ever before.
    • “The 1998 bug in the OpenBSD operating system was one of thousands Mythos found last month. Anthropic said last week that it is working with about 50 technology companies and organizations to find and fix bugs and currently has no plans to release Mythos to the general public.
    • “We need to know that we can release it safely, and it’s not exactly clear how we can do that with full confidence,” said Logan Graham, the head of Anthropic’s Frontier Red Team, which evaluates AI for risks.”
  • Security Week relates,
    • “To help security teams prepare for this future, the Cloud Security Alliance has developed and published The ‘AI Vulnerability Storm’: Building a ‘Mythos-ready’ Security Program. The report does not provide a solution, but it will help readers understand what is coming, and what they must do in preparation.
    • “Mythos will not fundamentally change the nature of cybersecurity. It primarily provides a step change in the pace of attacks, and the biggest single change will be the asymmetric advantage to the attacker increasing dramatically. Cybersecurity itself doesn’t change – it just needs to cope with a new ferocious pace. Best practice fundamentally remains the same, but its importance becomes more critical.
    • “Focus on the basics and harden your environment further,” say the CSA report authors. “Segmentation, egress filtering, multifactor authentication, and defense-in-depth/breadth all increase the difficulty for attackers.” Nothing there is new, but many firms have not done it adequately – and must rapidly start doing it effectively”
  • and
    • “OpenAI announced that it’s scaling its Trusted Access for Cyber program to thousands of verified defenders and hundreds of security teams. They will be given access to GPT-5.4-Cyber, a fine-tuned variant of GPT-5.4 that relaxes the usual guardrails for legitimate cybersecurity work. 
    • “GPT-5.4-Cyber also provides new capabilities such as binary reverse engineering, which enables users to analyze compiled executable software for vulnerabilities and malicious behavior.
    • “The new AI model is initially being offered on a limited, iterative basis to vetted security vendors, organizations, and researchers.
    • “Individual defenders who want to enroll into the Trusted Access for Cyber program and test GPT‑5.4‑Cyber can apply through chatgpt.com/cyber via an identity verification process, while enterprise teams must go through their OpenAI account representative.” 
  • Cyberscoop adds,
    • “A joint report from the Cloud Security Alliance (CSA), the SANS Institute and the Open Worldwide Application Security Project (OWASP) concludes that in the near term, organizations are “likely to be overwhelmed” by threat actors using AI to find and exploit vulnerabilities faster than defenders can patch them.
    • “While those organizations can use AI tools to speed up their own defenses, attackers “still face a heavier relative burden due to the inherent limitations of patching. This in turn leads to “asymmetric benefits” for attackers who can afford to adopt the technology without the same caution and bureaucracy as a multi-billion dollar business.
    • “The cost and capability floor to exploit discovery is dropping, the time between disclosure and weaponization is compressing toward zero, and capabilities that previously required nation-state resources are now becoming broadly accessible,” wrote Robert Lee, SANS Institute’s Chief AI Officer, Gadi Evron, CEO of Knostic and Rich Mogull, chief analyst at CSA, who served as the primary authors.”
  • TechTarget tells us, “How CIOs can beat AI challenges: A top researcher’s view.”
    • “CIOs are grappling with moving AI from the pilot stage to genuine implementation, and many are encountering organizational pitfalls that are stalling the delivery of real value.”
  • Healthexec informs us,
    • “Hospitals have always had to rely on multitudes of healthcare vendors to keep operations humming. In recent years the arrangement’s inherent management challenge has only grown more complex. 
    • “That’s largely because myriad AI technologies have changed daily life for provider organizations and industry partners alike. Arguably the biggest single difficulty to emerge from the transformation is the risk of cybersecurity breaches. 
    • “The Health Sector Coordinating Council (HSCC) is taking a crack at helping cybersecurity leaders, teams and stakeholders clear a path through the thicket. The assistance comes in the form of a 109-page document titled Third-Party AI Risk and Supply Chain Transparency Guide.
    • “The guidebook is authored by members of an HSCC working group focused on cybersecurity. The team’s guiding aim for the project was to “address the growing gaps in discovery and disclosure processes that make AI supply chain risk so difficult to manage.”
  • A NIST press release announced
    • “NIST SP 800-133 Rev. 3 (Initial Public Draft) Recommendation for Cryptographic Key Generation
    • “Proposed changes in this revision include the following:
      • “Asymmetric key-pair generation has been expanded to include methods for deriving randomness during key-pair generation.
      • “Key-pair generation now has options for derivation similar to symmetric keys and new methods for “seed expansion,” which allows for the limited use of SHAKE and deterministic random bit generators (DRBGs).
      • “Key-encapsulation mechanisms (KEMs) are discussed as a key-establishment option for symmetric key generation, and post-quantum cryptography (PQC) references have been added throughout (e.g., the new PQC signatures).
      • “Text has been reworded to address random number generation in alignment with SP 800-90C.
    • “Comments are especially requested regarding:
      • “Hardware security module (HSM) design — How do these requirements align with common practice and existing systems using a root seed/secret value?
      • “PQC implementations and protocol — How do these requirements fit with storing keys as seeds (e.g., for ML-KEM) and performing hybrid (i.e., combined classical and post-quantum) implementations?”
  • Here is a link to Dark Reading’s CISO Corner.

Monday report

From Washington, DC,

  • The Washington Post lets us know,
    • “The White House will make the case Monday to Congress — and to voters — that it has developed a strategy to address frequent frustrations involving U.S. medical care, such as too few physicians and too much paperwork.
    • “The Trump administration casts its physician-focused agenda as a fix for a strained health care system — pointing to a $50 billion funding program for rural health it contends will boost the number of doctors in remote areas, efforts to reduce payment distortions that favor hospitals rather than doctors, and regulatory changes intended to speed insurance approvals for tests and follow-up care.
    • “Together, these reforms will enable faster, more affordable, and higher-quality physician services for Americans,” the White House writes in the Economic Report of the President [WhiteHouse.gov link], an annual document previewed with The Washington Post and set to be transmitted to Congress on Monday.
    • “The economic report, which does not offer new proposals, is best understood as a distillation of White House economists’ thinking ahead of this year’s midterm elections, in which voters’ frustrations regarding health care costs and access are set to play a central role. Past administrations have often used the report, which is written by the president’s Council of Economic Advisers, as a messaging document to rally support for their initiatives. This year’s report addresses health care affordability, a key focus for President Donald Trump and his advisers, and says it is working to “unleash” more competition in health care markets to lower costs and improve quality.”
  • Bloomberg Law informs us,
    • “Senate Republicans aren’t planning to include Medicare and Medicaid changes in the next partisan spending package—instead focusing it largely on ending the partial government shutdown.
    • “Top Republicans plan to use a bill that advances through the simple-majority budget reconciliation process to fund immigration enforcement and US Border Patrol and would not require Democrats’ support.
    • “Though some Republicans have been pushing for including Medicare and Medicaid policies in the package, the narrow focus does not leave room for other priorities, Senate Majority Leader John Thune (R-S.D.) said Monday. He said budget instructions will not be sent to the Senate Finance Committee.” * * *
    • “But he didn’t rule out returning to other health care policies. For instance, he mentioned a provision blocking federal Medicaid payments from going to Planned Parenthood, which was included in the 2025 tax-and-spending law and sunsets in July, as a possible candidate for inclusion.”
  • Beckers Hospital Review reports,
    • “CMS on April 10 proposed a 2.4% pay increase for hospitals under the fiscal 2027 Inpatient Prospective Payment System, but hospitals are concerned that the update does not keep pace with the mounting financial challenges.
    • “CMS has proposed another inadequate update to inpatient payment rates, another extremely high productivity cut, and reductions to disproportionate share payments — in the face of rising need for care and higher uninsured rates,” Ashley Thompson, the American Hospital Association’s vice president of public policy analysis and development, said in an April 10 statement. 
    • “Beth Feldpush, America’s Essential Hospitals’ senior vice president of policy and advocacy told Becker’s in an April 11 statement that the proposed DSH payment cuts “fails to acknowledge the growing number of uninsured individuals due to recent Congressional actions.” 
    • ‘Charlene McDonald, president and CEO of the Federation of American Hospitals, said in an April 10 statement that CMS’ proposal is a step in the right direction, but added it “does not negate the compounding effects of rising inflation, record levels of uncompensated care and a growing uninsured population.”
    • “National hospital group leaders also raised concerns about another aspect of the proposal: the introduction of the first mandatory nationwide episode-based payment model.”
  • Fierce Healthcare informs us,
    • “The Centers for Medicare and Medicaid Services picked 150 digital health companies and healthcare providers to participate in the launch of its tech-enabled chronic care model.
    • “The Center for Medicare and Medicaid Innovation (CMMI) announced in December the Advancing Chronic Care with Effective Scalable Solutions (ACCESS) Model as a 10-year payment program to encourage the use of technology to treat chronic diseases. CMS aims for the ACCESS Model to provide stable, recurring payments for technology used to treat diabetes, hypertension, chronic kidney disease, obesity, depression and anxiety. The model will help pay for telehealth software, wearables and wellness apps that address the conditions.
    • “The CMMI plans to use outcome-aligned payments to cover the cost of technology for Medicare providers if a patient with a qualifying chronic condition achieves clinically significant outcomes, such as lowering their blood pressure.” 
  • Citeline points out,
    • An April 1, 2026, proposal [Federal Register link] from the US Treasury Department would allow whistleblowers who alert the government to certain financial crimes to collect 10%-30% of any monetary penalties collected, creating a new risk for healthcare firms – especially those with overseas business partners. The public comment period ends on June 1, 2026.

From the Food and Drug Administration front,

  • Fierce Pharma reports,
    • “For the first time, the FDA has approved generics for AstraZeneca’s Type 2 diabetes blockbuster Farxiga. The U.S. regulator has given thumbs up to 14 companies, including Teva, Sandoz and a host of Indian drugmakers including Aurobindo, Biocon, Cipla, Lupin and Zydus to produce 5 mg and 10 mg tablets of dapagliflozin.
    • “The treatment is indicated for glycemic control and to reduce the risk of hospitalization for heart failure for those with Type 2 diabetes who also have established cardiovascular disease or multiple cardiovascular risk factors.Farxiga generated sales of $8.5 billion last year, including $1.7 billion in the U.S.
    • “The FDA originally approved the SGLT2 inhibitor in 2014. Generic versions of Farxiga became available (PDF) in the U.K. and Japan in the second half of last year.”
  • and
    • “From a negative phase 3 readout and a seemingly tightening regulatory climate to a grueling three-month review extension, the path for Travere Therapeutics in its first-in-disease bid was anything but certain. Yet, the company has defied the odds, securing Filspari a landmark FDA approval in focal segmental glomerulosclerosis (FSGS) and delivering the first treatment for the rare kidney disease.
    • “Monday’s FDA approval makes Filspari the first therapy specifically indicated for FSGS, a condition that represents a $1 billion-plus sales opportunity, according to Leerink Partners analysts. The drug was originally approved in 2023 for the treatment of IgA nephropathy, another kidney disease.
    • “FSGS is estimated to affect more than 40,000 patients in the U.S. The disorder is characterized by scarring in the kidney’s filtering units as protein keeps leaking into the urine, often leading to further disease progression and kidney failure, sometimes quite rapidly.” 
  • Cardiovascular Business relates,
    • “Anumana, a Massachusetts-based artificial intelligence (AI) company co-founded by nference and Mayo Clinic, has received U.S. Food and Drug Administration (FDA) clearance for a new algorithm designed to detect signs of cardiac amyloidosis (CA). This represents Anumana’s second FDA clearance in just two weeks, highlighting the company’s growing impact in the world of cardiovascular care. 
    • “CA is a life-threatening condition that often leads to heart failure complications, but it remains critically underdiagnosed. Anumana sees this clearance as a way to help care teams identify CA early so patients can receive timely treatment.
    • “The newly cleared algorithm, which previously received the FDA’s breakthrough device designation, was designed to evaluate standard 12-lead electrocardiograms (ECGs) and flag patients at increased risk of CA. 
    • “Each of our FDA-cleared algorithms addresses a specific and frequently missed cardiovascular condition, and cardiac amyloidosis represents an important addition to that portfolio,” Maulik Nanavaty, CEO of Anumana, said in a prepared statement. “The more conditions we can identify from a single ECG, the more valuable the test becomes in clinical practice. That’s what Anumana is working toward with each new clearance as we continue to advance our rigorous clinical evidence approach.”

From the census front,

  • The Wall Street Journal reports,
    • “The first of the youth-obsessed baby boomers turn 80 this year, including President Trump, and they want to shake up old age.
    • “Having reached octogenarian levels, a generation that shaped much of our past is shaping the future of aging for themselves and those who follow. They want better healthcare and housing, cures for dementia and a say in when to die. New professions and products will appear. Their massive spending will shift and innovators will follow.
    • “They are reinventing old age,” says Joseph Coughlin, director of the Massachusetts Institute of Technology AgeLab. Unlike the patient Silent Generation, boomers had high expectations and used their sheer numbers as well as financial and political clout to make them happen, which isn’t necessarily a bad thing.
    • “If you don’t have expectations of getting better, then you simply become satisfied with what is,” says Coughlin.”

From the public health and medical / Rx research front,

  • NBC News reports,
    • “Protein-hungry shoppers are buying more meat with their health top of mind. Health experts, however, wish they’d think beyond the butcher counter.” * * *
    • “Meat is indeed packed with protein, but it comes with some well-established health drawbacks.
    • “Saturated fat we’ve known about for decades,” said Dr. Sarah C. Hull, a cardiologist at Yale Medicine. It’s common in red meat and contributes to increasing LDL cholesterol levels, hardening the blood vessels and, in turn, raising the risk of heart attack or stroke.” * * *
    • “Hull said that many common plant-based proteins are particularly high in fiber, which 95% of Americans don’t get enough of, and they’re generally associated with better overall health outcomes than animal proteins. Her research suggests that increased consumption of certain plant-derived nutrients may help counter some negative effects of red meat and ultra-processed foods.”
  • Health Day relates,
    • “Influenza vaccination may offer cardiovascular protection even when it does not prevent infection, according to a study published online April 2 in Eurosurveillance.” * * *
    • “Hospital admissions for heart attack and stroke were more frequent in the first week after testing positive for influenza than during any other period in the year before and after their test,” the authors write. “This increased risk was about half as high among people who tested positive for influenza but had received the influenza vaccine that season.”
  • and
    • “Children with ADHD are more apt to have a bright future if they’re diagnosed in their early elementary years rather than as high schoolers, a new study says.
    • “Kids diagnosed with ADHD at an earlier age are more likely to have better grades and go on to college, researchers reported April 8 in JAMA Psychiatry. They’re also less likely to drop out of school.
    • “ADHD diagnosis during the first years of school was associated with better school performance, more academic track choices and lower probability of school dropout,” concluded the research team led by Lotta Volotinen, a doctoral researcher at the University of Helsinki in Finland.
    • “The findings support the recommendations for earlier diagnosis, and screening for ADHD before age 12 years should be considered,” the team wrote.”
  • The American Medical Association lets us know “what doctors wish patients knew about managing food allergies.”
    • Once a food allergy is diagnosed, learning how to avoid triggers, recognize warning signs and when to seek medical care are key. Two physicians share more.
  • Per Cardiology Advisor,
    • “Maternal stroke is associated with significantly higher rates of maternal mortality and severe delivery complications, including cardiac arrest and acute renal failure.”
  • Per Pulmonology Advisor,
    • “The increased risk for asthma attacks among those using marijuana was consistent regardless of whether individuals vaped or smoked cannabis or did both.”
  • Per an Oregon State University news release,
    • “Researchers at Oregon Health & Science University have uncovered a key reason why immunotherapy has largely failed in pancreatic cancer — and identified a promising strategy to overcome that resistance. 
    • “The study, published in the journal Immunity, shows that pancreatic tumors actively reshape their immune environment by co‑opting regulatory immune cells that normally shut down tumor-killing cells. By reprogramming those cells, the research reveals a potential pathway to make immunotherapy effective against one of the deadliest and most treatment‑resistant cancers. 
    • “Pancreatic cancer is incredibly resistant to most therapies,” said the study’s senior author, Katelyn Byrne, Ph.D., assistant professor of cell, developmental and cancer biology in the OHSU School of Medicine and member of the OHSU Brenden‑Colson Center for Pancreatic Care. “Even when we know the immune system is capable of long‑lasting protection, it’s been very difficult to get that response to work in this disease.” 
    • “In the new study, Byrne and team tested an experimental immunotherapy in mouse models known as agonistic CD40, which works differently from standard checkpoint inhibitors. Rather than targeting a single immune signal, the therapy broadly activates the immune response upstream. 
    • “Byrne said the researchers were surprised to find out that activating the immune system this way didn’t just stimulate tumor‑killing cells — it also reprogrammed regulatory T cells, converting them from immune suppressors into cells that support anti‑tumor activity. 
    • “We didn’t expect this,” Byrne said. “The therapy doesn’t directly target Tregs, but as a secondary effect of turning on the immune response, those Tregs changed their behavior. Cells that were shutting down the immune reaction suddenly started supporting tumor killing.” 
    • “The team’s findings help explain one reason why many immunotherapies haven’t worked in pancreatic cancer and point to a possible solution: Treatments may need to both turn on the immune system and overcome the tumor’s own ability to shut it down.” 
  • Per an NIH news release,
    • “A National Institutes of Health (NIH)-funded research team has discovered an enhanced CRISPR gene-editing system that could enable targeted delivery inside the human body — a key step toward broader clinical use. Researchers identified a naturally occurring enzyme, Al3Cas12f, that is small enough to fit into adeno-associated virus vectors, a leading targeted delivery method for gene therapies. They then engineered an enhanced version that dramatically improved gene-editing performance in human cells. 
    • “The advance addresses a major limitation in CRISPR technology. Commonly used gene-editing proteins are too large for targeted delivery systems, restricting clinical applications to cells modified outside the body, such as blood and bone marrow. 
    • “Smart delivery of gene editing systems is a powerful notion with broad clinical implications, and this basic science finding takes us a significant step toward that future,” said Erica Brown, Ph.D., acting director of NIH’s National Institute of General Medical Sciences (NIGMS).” 
  • BioPharma Dive adds,
    • “Revolution Medicines said Monday its experimental pancreatic cancer drug hit every goal at an early checkpoint in a Phase 3 trial, helping people who got it live nearly twice as long as those who got standard chemotherapy.
    • “Enrollees who got daraxonrasib lived a median of 13.2 months after treatment, compared with 6.7 months for those who got chemo, a finding that equates to a 60% reduction in the risk of death among those who got the experimental drug. Daraxonrasib achieved its other objectives at an interim look at the results, findings so striking that the company ended the trial early. Revolution enrolled people whose metastatic pancreatic cancer had returned after an earlier treatment.
    • “The Food and Drug Administration has already awarded daraxonrasib a “national priority” voucher that could help Revolution gain an approval within weeks of an official submission. Revolution shares rose nearly 40% in early trading, adding $7 billion to the company’s already hefty valuation.”
  • BioPharma Dive also informs us,
    • “An experimental therapy from Allogene helped eliminate signs of cancer better than standard treatment in a Phase 3 trial in first-line large B-cell lymphoma, results suggesting the biotechnology company may have found a role to use donor-derived cell therapy against the deadly blood cancer.  
    • “After 45 days of treatment, seven of the 12 patients given Allogene’s therapy in the study were negative for “minimal residual disease,” meaning that diagnostic tests could no longer detect signs of cancer. By comparison, only 2 of 12 placebo recipients hit that mark, a roughly 42-percentage-point difference that clears an important bar published literature has suggested is crucial for delaying a relapse. 
    • “The results come from an early “futility” analysis. Allogene is enrolling 220 people in the study and expects to report in 2027 results showing whether treatment staved off cancer’s return.
  • and
    • “In experimental drug from Spyre Therapeutics helped lower signs of disease activity and improve remission rates in a Phase 2 study of people with ulcerative colitis. 
    • After 12 weeks of treatment, patients who received “SPY001” in the trial had a statistically significant, 9.2-point reduction on a scoring system that assesses the severity of their disease, meeting the study’s primary objective. Notably, treatment was also associated with a 40% remission rate and a 51% improvement on endoscopic imaging. One severe adverse event was reported — chest pain in a 68-year-old male with a history of cardiovascular disease — but was deemed unrelated to treatment.
    • Spyre said the findings were “clinically meaningful” and support SPY001’s “best-in-class profile.” The drug is one of multiple therapies the company is evaluating in Phase 2 trials in inflammatory bowel disease. Proof-of-concept data for two other therapies in the trial are expected later this year. Data from a placebo-controlled portion of the study are on track for 2027.” 
  • Per Fierce Pharma,
    • “Eli Lilly has chalked up another victory in the chronic lymphocytic leukemia (CLL) space, as its BTK inhibitor Jaypirca delivered its fourth positive phase 3 readout in the blood cancer. 
    • “Monday, Lilly said its phase 3 Bruin CLL-322 trial in patients with previously treated CLL or small lymphocytic lymphoma (SLL) has met its primary endpoint. In an industry first, the study showed that adding Jaypirca to a fixed-duration regimen of venetoclax and rituximab significantly extended progression-free survival (PFS) compared with the standard combo alone. 
    • “As Lilly pointed out, Bruin CLL-322 is the first phase 3 in CLL to utilize and outperform a venetoclax-based regimen. Roche and AbbVie sell venetoclax, an oral BCL-2 inhibitor, under the brand name Venclexta.” 

From the U.S. healthcare business and artificial intelligence front,

  • Beckers Payer Issues reports,
    • “Houston-based Memorial Hermann Health System and BCBS Texas agreed on a contract April 11, bringing the health system back in network.
    • “The agreement ensures “access to quality care at cost-effective prices,” BCBS Texas said in an April 13 statement shared with Becker’s. It covers both commercial and Medicare Advantage members. The previous contract expired April 1, affecting commercial members. The health system had beenout of network for Medicare Advantage plans since Jan. 1.”
  • Fierce Healthcare offers a look at how Evernorth’s new Delaware specialty pharmacy facility highlights a broader care coordination approach.
  • Beckers Hospital Reports ranks 83 health systems by their most recent revenue.
    • “Revenue growth continued across the hospital industry in 2025, with many of the nation’s largest health systems posting mid- to high-single-digit gains fueled by stronger patient volumes, improved payment rates and the expansion of ambulatory and pharmacy operations. 
    • “But the gains were far from uniform. Some systems grew revenue by double digits through mergers, acquisitions and new payer arrangements, while others saw declines as they shed hospitals and restructured their portfolios.”
  • and tells us,
    • “The world’s two main GLP-1 drug manufacturers, Eli Lilly and Novo Nordisk, are taking different approaches with rolling out their recently approved GLP-1 pills for weight loss. 
    • “Two oral GLP-1s, two very different commercial strategies. Health systems operating metabolic programs or making formulary decisions need to understand both.
    • “While both companies offer their recently approved GLP-1 pills through pharmacies and direct-to-consumer platforms that circumvent pharmacy benefit managers, they are diverging in other routes. 
    • “Eli Lilly is betting on retail and digital access, as it’s offering its weight loss GLP-1 pill through GoodRx, telehealth firm Ro and same-day delivery with Amazon Pharmacy
    • “By contrast, Novo Nordisk launched a Wegovy subscription program through WeightWatchers, LifeMD, Ro and Hims & Hers — with which the drugmaker previously had a strained relationship. With the 12-month subscription plan, Novo Nordisk said patients can save up to $600 per year on the Wegovy pill.” 
  • and informs us,
    • “Large language models may help identify drug safety signals in clinical notes, though their performance remains below thresholds required for clinical decision support.
    • “Researchers evaluated three models — GPT-3.5, GPT-4 and GPT-4o — using clinical notes from 100 patients at Nashville, Tenn.-based Vanderbilt Health, 70 patients at the University of California—San Francisco and 272 patients from seven Roche-sponsored trials, according to an April 6 Vanderbilt news release.
    • “For detecting immune-related adverse events at the patient level, GPT-4o achieved F1 scores of 56%, 66% and 62% across the respective datasets. The F1 score reflects how well a model balances correctly identifying real safety issues while avoiding false alarms. At the individual note level, the model reached an average F1 score of 57% across 667 notes.
    • “An F1 score of 90% or more is considered excellent, while 80% or higher may support clinical decision-making.”
  • STAT News points out,
    • “Every day, more than 40 million people ask ChatGPT about health care, according to OpenAI. They’re asking questions about diet, exercise, insurance — and in some cases, serious symptoms that would typically get discussed on a 911 call or in a doctor’s office.
    • “For some health systems, that’s creating an imperative. A small number of hospitals are trying to recapture some of those clinical conversations from commercial large language models like ChatGPT, Claude, and Gemini. They’re implementing their own patient-facing chatbots, ones that draw directly from their existing medical records and can funnel patients toward care in their own system. 
    • “Hartford HealthCare this week will launch PatientGPT, a chatbot engineered by clinical AI company K Health, to its patients in Connecticut. Two health systems — California-based Sutter Health and Reid Health, serving Indiana and Ohio — have announced pilot versions of Emmie, the chatbot built by medical record mammoth Epic. The list is likely to grow rapidly.
    • “Health systems need to do this, either through a vendor or building it themselves,” said Mount Sinai chief AI officer Girish Nadkarni, the senior author of a recent study that found ChatGPT Health missed high-risk emergencies when used to triage patients.”
  • The Wall Street Journal cautions,
    • “The artificial intelligence gold rush is rapidly drying up the supply of computing power, leading to product issues and reliability problems.
    • “Anthropic experiences frequent outages and limits user token usage, while OpenAI scrapped its Sora app to free up compute.
    • “CoreWeave raised prices over 20% and extended contracts, as spot-market Nvidia GPU rental costs rose 48% in two months.” * * *
    • “All of it points to a classic problem that has popped up in technology booms throughout history, from the 19th-century railroad expansion to the telecom and internet explosion of the early 2000s. Demand is growing far faster than companies are able to access resources and build out infrastructure. Historically, price increases have been among the only ways to address a supply crunch, but such a move could be perilous for frontier AI companies, which are in a ferocious competition to gain users.”
  • Per MedTech Dive,
    • “Stryker said Monday that it has agreed to buy intravascular lithotripsy firm Amplitude Vascular Systems. The companies did not disclose the terms of the acquisition. 
    • “Intravascular lithotripsy is a procedure to treat artery disease. Boston-based Amplitude Vascular Systems, or AVS, uses pressure waves generated by carbon dioxide through a balloon catheter to break up calcified plaque.
    • “The acquisition is expected to bolster Stryker’s peripheral vascular portfolio once AVS’ device is cleared in key markets.”
  • and
    • “GE HealthCare has provided an update on the integration of its bkActiv intraoperative ultrasound technology with Medtronic’s Stealth AXiS surgical navigation system.
    • “The integrated product is now available commercially, GE HealthCare said Thursday. Medtronic said it had integrated bkActiv into Stealth AXiS when the surgical system received regulatory clearance last month.
    • “Integrating the technologies gives surgeons real-time ultrasound images, helping them to assess mid-procedure anatomy changes that could affect the preoperative plan.”

Cybersecurity Saturday

From the Iranian War front,

  • Dark Reading reports,
    • With the US and Iran having reached a fragile ceasefire this week, security researchers and executives are left wondering whether there will be a commensurate pause in the cyberwarfare that has ramped up around the war.
    • The day after the temporary truce was announced, Iran’s most high-profile false-flag hacktivist operation, Handala, offered that it would participate in a temporary pause in hostilities. But even if one takes that group at its word, history suggests that ceasefires rarely stop or slow cyberactivity surrounding kinetic wars. In fact, in the absence of more effective ways of fighting, cyberattacks tend to flare significantly.
    • “Historical data and recent intelligence analysis indicate that a military ceasefire rarely equates to a ‘digital stand-down,'” warns Austin Warnick, director of Flashpoint’s National Security Intelligence Team. Instead, he tells Dark Reading, “Cyber operations often remain steady or even flare up as an asymmetric pressure valve while kinetic hostilities are paused.”
  • Cyberscoop adds,
    • “The fallout and potential exposure from Iran’s state-backed targeting of U.S. critical infrastructure extends to more than 5,200 internet-connected devices, researchers at Censys said in a threat intelligence brief Wednesday [April 8]. 
    • “Of the programmable logic controllers manufactured by Rockwell Automation/Allen-Bradley that Censys identified as potentially exposed to Iranian government attackers, nearly 3,900, or about 3 out of every 4, are based in the United States. 
    • “The cybersecurity firm identified the devices based on details multiple federal agencies shared in a joint alert Tuesday, and published additional indicators of compromise, including operator IPs and other threat hunting queries.
    • “Federal authorities earlier this week warned that Iranian government attackers have exploited devices that control industrial automation processes and disrupted multiple sectors during the past month. Some victims also experienced financial losses as a result of the attacks, officials said.” 
  • MedTech Dive tells us,
    • “Stryker is now fully operational after a[n Iranian] cyberattack took down its manufacturing, ordering and shipping operations.
    • “The medtech company’s global manufacturing and commercial, ordering and distribution systems have been fully restored, according to a Thursday [April 9] filing with the Securities and Exchange Commission.
    • “Stryker said that the attack had a material impact on its operations, which will affect the company’s financial results for the first quarter of 2026. However, Stryker does not expect a material impact on its full-year guidance of 8% to 9.5% organic sales growth and adjusted earnings per share of $14.90 to $15.10.
    • “The company did not detail the expected financial impact on the first quarter.”

From the cybersecurity policy and law enforcement front,

  • The Wall Street Journal reports,
    • “Top White House officials are racing to address potential cybersecurity threats posed by the latest artificial-intelligence models, highlighting how AI’s perils are becoming a top priority for the Trump administration.
    • National Cyber Director Sean Cairncross is leading the administration’s response, convening officials across agencies to identify security weaknesses in critical infrastructure and bolster government systems that could be exploited by AI, people familiar with the matter said. The administration is working with the private sector to make sure Americans are safe when new models are released, White House officials said.
    • “In recent days, the administration has held discussions featuring Vice President JD Vance and Treasury Secretary Scott Bessent with leading tech and financial executives about coordinating the private sector’s response to potential cyberattacks and preparing online systems, the people said. 
    • “The moves come during an intensifying race among the top AI companies to release more powerful models that could cause widespread online disruptions if put to work by bad actors. 
    • Anthropic said this week its new AI model Mythos was so good at finding and exploiting software bugs that the company has no plans to release it to the general public. Instead, Anthropic has made a preview version of the model available to roughly 50 companies and organizations that run critical infrastructure, including leading tech companies such as AppleAmazon.com and Google. The aim is to find and fix bugs in hardware and software before the model is publicly released. 
    • ​​”The company has also held discussions with government officials about the model’s cyber capabilities. 
    • “OpenAI and other model developers are also expected to release powerful tools in the weeks ahead.” 
  • and
    • “Over the past six months, cybersecurity researchers have become increasingly worried that AI systems are not only becoming better at finding bugs, but that they are also shrinking the window of time between when a bug is disclosed and when it can be exploited with working attack software.
    • “Late last year, researchers at Stanford University found that AI software was almost as good as humans at finding and exploiting bugs on a real-world network. 
    • “And earlier this year Anthropic’s Claude Opus 4.6 model found more high-severity bugs in the Firefox browser in two weeks than the rest of the world typically reports in two months. 
    • When measuring dollar cost to find a bug, Mythos is about 10 times as efficient as previous AI models, Graham said.  Details of Mythos’s capabilities were previously reported by Fortune.”
  • HIPAA Journal lets us know,
    • “To help HIPAA-regulated entities manage risks and vulnerabilities, OCR has recorded a risk management video. In the video, Nicholas Heesters, OCR’s Senior Advisor for Cybersecurity, explains the HIPAA risk management requirements and provides examples of potential risk management violations identified during OCR’s investigations of data breaches.
    • “In December 2025, OCR requested questions from HIPAA-regulated entities on risk management,and has provided answers to a selection of those questions in the video. The video also shares important resources to help HIPAA-regulated entities comply with this important HIPAA Security Rule requirement. You can view the video on OCR’s YouTube channel.”
  • Cybersecurity Dive relates,
    • “The Justice Department on Tuesday [April 7] announced that it had stopped Russia’s military intelligence agency from using hacked U.S. routers to maliciously redirect internet traffic and steal data from victims that include governments and critical infrastructure operators.
    • “Operatives of the Russian GRU have spent several years breaking into TP-Link small office and home office (SOHO) routers around the world and reconfiguring them to send DNS requests through Kremlin-controlled servers, which allowed Moscow to collect internet traffic and even passwords, emails and other sensitive information from victim networks. In response, the FBI launched “Operation Masquerade,” sending commands to hacked routers that collected forensic data and reset their DNS settings to erase Russia’s foothold in the devices.
    • DOJ announced the operation hours after Microsoft revealed Russia’s abuse of SOHO routers. “For nation-state actors like Forest Blizzard,” Microsoft said, “DNS hijacking enables persistent, passive visibility and reconnaissance at scale.”

From the cybersecurity breaches and vulnerabilities front,

  • Bleeping Computer reports,
    • “Bitcoin Depot, which operates one of the largest Bitcoin ATM networks, says attackers stole $3.665 million worth of Bitcoin from its crypto wallets after breaching its systems last month.
    • “The company manages more than 25,000 Bitcoin ATMs and BDCheckout locations worldwide and reported revenue of $615 million in 2025.
    • “As revealed in a filing with the U.S. Securities and Exchange Commission, the company discovered the attack on March 23 after detecting suspicious activity on some of its IT systems.”
    • “While it took immediate measures to contain the breach, the attackers had time to steal credentials to digital asset settlement accounts and transfer over 50 Bitcoin from Bitcoin Depot’s wallets before their access was blocked.”
  • Dark Reading discusses how “Russia’s ‘Fancy Bear’ APT Continues Its Global Onslaught.”
    • “Victims don’t need to match the cyber espionage group’s technical sophistication, experts say. But patching and some form of zero trust are now non-negotiable.”
  • The Cybersecurity and Infrastructure Security Agency added two known exploited vulnerabilities to its catalog this week.
  • Bleeping Computer advises,
    • “Analysis of CISA’s Known Exploited Vulnerabilities over the past four years shows critical vulnerabilities still open at Day 7 worsened from 56% to 63% despite teams closing 6.5x more tickets. Staffing cannot solve this.
    • “Of the 52 tracked weaponized vulnerabilities in our study, 88% were patched more slowly than they were exploited — half were weaponized before any patch existed.
    • “The problem is not speed. It is the operational model itself.
    • “Cumulative exposure, not CVE counts, is the true risk metric that security teams now need to measure. While dashboards reward the sprint to get patches implemented, breaches exploit the tail. AI is not another attack surface — instead, the transition period where AI-powered attackers face human defenders is the industry’s most dangerous window.
    • “In response, defenders have to implement their own autonomous, closed-loop risk operations.”
  • and tells us,
    • “Attackers have been exploiting a zero-day vulnerability in Adobe Reader using maliciously crafted PDF documents since at least December.
    • “The attacks have been discovered by security researcher Haifei Li (the founder of the sandbox-based exploit-detection platform EXPMON), who warned on Tuesday that the attackers are using what he described as a “highly sophisticated, fingerprinting-style PDF exploit” to target an undisclosed Adobe Reader security flaw.
    • “Li also said that these attacks have been targeting Adobe users for at least 4 months, stealing data from compromised systems using privileged util.readFileIntoStream and RSS.addFeed Acrobat APIs, and deploying additional exploits.
    • “This ‘fingerprinting’ exploit has been confirmed to leverage a zero-day/unpatched vulnerability that works on the latest version of Adobe Reader without requiring any user interaction beyond opening a PDF file,” Li warned.
    • “Even more concerning, this exploit allows the threat actor to not only collect/steal local information but also potentially launch subsequent RCE/SBX attacks, which could lead to full control of the victim’s system.”
  • Cybersecurity Dive informs us,
    • “A cyber threat actor is using the React2Shell vulnerability as the basis for a widespread credential-harvesting campaign that has compromised everything from AI tool API keys to cloud platform passwords.
    • “After identifying internet-facing React Server Components instances that are vulnerable to React2Shell, the hackers upload a malicious payload to the server — without the need for authentication — that lets them execute arbitrary code on the target server, researchers at Cisco’s Talos threat intelligence group said in a recent report.
    • “The payload contains a “multi-phase credential harvesting tool that harvests credentials, SSH keys, cloud tokens, and environment secrets at scale,” Cisco researchers wrote.
    • “The entire process after target identification is automated. “No further manual interaction is required to extract and exfiltrate credentials harvested from the system,” Cisco said.”

From the ransomware front,

  • The American Hospital Association reports,
    • “Health care and public health was the top sector targeted for cyberthreats in 2025, according to the FBI’s latest annual report on internet crimes. There were 460 ransomware attacks and 182 data breaches, totaling 642 cyber events. Financial services was the next highest sector at 447 total events. 
    • “This report quantifies what we already knew anecdotally about the health care sector being the most targeted by ransomware attacks,” said John Riggi, AHA national advisor for cybersecurity and risk. “The vast majority are perpetrated by foreign ransomware gangs, primarily Russian-speaking groups, which specifically target health care hoping for a big payout. They know these attacks cause disruptions and delays to digitally dependent health care delivery, posing a risk to patient and community safety, thereby increasing the exigency and pressure for a potentially large ransom payment. These despicable acts are in fact threat-to-life crimes and remind us to do what we can on defense and prepare for clinical continuity not if, but when, an attack strikes.” 
  • Dark Reading relates,
    • “Storm-1175 actors are running up-tempo campaigns to deliver Medusa ransomware, putting pressure on organizations to patch critical vulnerabilities faster. 
    • “In a blog post on Monday, Microsoft Threat Intelligence detailed how Storm-1175, a financially motivated cybercrime group, is conducting “high velocity ransomware campaigns” that typically exploit known vulnerabilities in the sweet spot for threat actors: the time between a vulnerability’s initial disclosure and the widespread adoption of the patch. Microsoft also tied the exploitation of several zero-day vulnerabilities to the group.”
    • “Storm-1175’s playbook appears to be predicated on speed. Attackers move quickly from vulnerability exploitation to data exfiltration and, finally, delivery of Medusa ransomware, “often within a few days and, in some cases, within 24 hours,” according to Microsoft.
    • “The threat actor’s high operational tempo and proficiency in identifying exposed perimeter assets have proven successful, with recent intrusions heavily impacting healthcare organizations, as well as those in the education, professional services, and finance sectors in Australia, United Kingdom, and United States,” the blog post stated.”
  • SC Media informs us,
    • “In March, more than a dozen CISOs and other security managers gathered online to discuss how best to handle ransomware in today’s AI-powered environments.
    • “Because the CyberRisk Collaborative roundtable discussion, sponsored by Akamai, followed the Chatham House rule, we can’t tell you who said what. But the latest CRC report, “Redefining Ransomware Containment,” summarizes what was said.
    • “The group’s main message: Ransomware is no longer just a cybersecurity issue, but a full-scale business-resilience challenge.
    • “Organizations should focus on ransomware recovery, the participants agreed. While rapid containment remains critical, stopping an attack is only part of the solution. True success against ransomware includes maintaining business operations, minimizing disruption, and lining up technical response with organizational priorities.
    • “Containment speed is important, but even a quickly halted attack can lead to substantial financial loss or reputational damage. Organizations must take a view of incident success that includes recovery timelines and customer impact alongside traditional security metrics. That’s because a ransomware incident affects the entire enterprise, not just IT systems.
    • “Because business continuity is the true benchmark of resilience, CISOs and other security managers in the roundtable discussion stressed that customers and stakeholders often care less about how quickly an attack is contained and more about whether services remain available.
    • “The CISOs said that as a result, leading organizations are folding ransomware response into broader business-continuity and disaster-recovery plans. That way, critical operations can keep going even during an active incident, and downstream impacts on customers, partners, and markets will be lessened.”

From the cybersecurity defenses front,

  • The Wall Street Journal reports,
    • “Artificial intelligence giant Anthropic unveiled a partnership with cybersecurity companies Tuesday [April 7] that raises more questions about how parts of the security industry may be disrupted by the emerging technology.
    • The company said its new Project Glasswing initiative allows select companies access to its Claude Mythos2 Preview frontier model, specifically for defensive cybersecurity work. Participants include CrowdStrikePalo Alto Networks, Microsoft, Apple, Amazon’s AWS cloud business, JPMorgan Chase, Google, Broadcom, Nvidia and the Linux Foundation.
    • Anthropic said its new model already has found thousands of high-severity vulnerabilities, including some in every major operating system and web browser.
    • “AI models have reached a level of coding capability where they can surpass all but the most skilled humans at finding and exploiting software vulnerabilities,” Anthropic said of Project Glasswing.
    • “The project shows how AI is beginning to reshape parts of the cybersecurity industry, with investors trying to anticipate which areas are built to last and which are ripe to be disrupted by automation. Cyber shares rose as some investors were encouraged by the companies’ inclusion in the Anthropic project, but uncertainty remains about how AI’s impact on the industry will play out.”
  • Forrester identifies ten consequences of Project Glasswing nobody’s writing about yet.
  • SC Media offers five ways to mitigate the risks of “cracked” software.
    • “The human element remains one of the top threat vectors within organizations. Well-intentioned employees trying to get their work done quickly and efficiently can sometimes unknowingly introduce new security risks in doing so.
    • “For instance, an employee needs a PDF editor or design tool, but can’t find an IT-approved option or doesn’t want to wait for access. So they download a free or “cracked” version from the web. It feels harmless. In reality, it creates a direct path into the organization’s IT environment.” * * *
    • “Security teams can reduce this risk, but it takes a shift in focus from policy to control. Taking the following five steps won’t eliminate shadow IT, but they will make it much harder for a quick download to turn into a serious incident:
      • Block unauthorized executables at runtime: Stop unknown binaries from running, even if a user downloads them manually.
      • Restrict local admin rights: Limit who can install or modify software so a single download can’t change the system.
      • Apply a zero-trust approach to application control:  Allow only approved applications to run, block everything else.
      • Use advanced endpoint protection to monitor for behavioral indicators, not just signatures:Look for patterns like manual installs, archive extraction, and unusual execution paths.
      • Reinforce acceptable use policies and user awareness: Make expectations clear and explain the risks.”
  • Here’s a link to Dark Reading’s CISO Corner.

Cybersecurity Saturday

From the Iranian war front,

  • Industrial Cyber reports,
    • “New data from KELA recognizes that Iranian state-sponsored threat actors have moved well beyond traditional espionage, increasingly blurring the line between nation-state operations and financially motivated cybercrime. Rather than running large-scale ransomware cartels of their own, these groups have embedded themselves into the existing criminal ecosystem, acting as initial access brokers, collaborating with ransomware affiliates, and deploying pseudo-ransomware to mask destructive attacks as extortion campaigns.
    • “A key example is Pay2Key, an Iran-linked ransomware operation that has resurfaced as a professionalized RaaS platform operating on the anonymous I2P network, actively recruiting affiliates from Russian cybercrime forums and offering an elevated profit share, bumping the affiliate cut from 70% to 80%, for attacks on U.S. and Israeli targets. The model creates a significant compliance risk for victim organizations: paying what appears to be a routine ransom demand could unknowingly funnel money to OFAC-sanctioned Iranian entities, exposing companies to severe legal and financial penalties.
    • “The KELA Cyber Intelligence Center identified in its Monday [March 30] post that one of the more concerning developments is the growing collaboration between Iranian state-linked actors and the broader ransomware ecosystem.”
  • Security Week relates,
    • The FBI has confirmed that threat actors have gained access to an email account belonging to FBI Director Kash Patel, but said no government information has been compromised. 
    • “The Iran-linked hacker group Handala on Friday [March 27] claimed to have hacked Patel’s email account, releasing files allegedly representing photos, emails, and classified documents taken from the FBI director’s inbox.
    • “The so-called ‘impenetrable’ systems of the FBI were brought to their knees within hours by our team,” the hackers wrote. 
    • However, the account does not appear to be hosted on FBI systems; it is a personal Gmail account. In addition, the stolen information does not seem to be recent.
    • It’s unclear when the account was hacked, but it may have been one of the many targeted by Iranian hackers back in 2024 as part of an operation targeting Donald Trump’s presidential campaign.” 
  • Cyberscoop tells us,
    • “Medtech company Stryker says it’s back to being “fully operational,” three weeks after it became the most prominent victim to date of Iranian hackers, who said they attacked the Michigan-based company in retaliation over the conflict with the United States and Israel.
    • “A March 11 wiper attack from the pro-Palestinian, Iranian government-connected group Handala damaged the company’s order processing, manufacturing and shipping.” * * *
    • “Production is moving rapidly toward peak capacity with discipline and stability, supported by restored commercial, ordering and distribution systems,” the company wrote in an update on its website Wednesday. “Overall product supply remains healthy, with strong availability across most product lines, as we continue to meet customer demand and support patient care.”
    • “Stryker said it continues to work with outside cyber experts, government agencies and industry partners on its investigation and recovery.” * * *
    • “Iranian hackers have been busy since the U.S.-Israel strikes began, but have claimed few successes in the United States. Handala boasted this week about an attack on St. Joseph County, Indiana, where officials said they were investigating a hack of its external fax service.”

From the cybersecurity policy front,

  • Cybersecurity Dive reports,
    • “President Donald Trump on Friday [April 3] proposed significantly slashing the Cybersecurity and Infrastructure Security Agency’s budget.
    • The White House’s fiscal year 2027 budget would reduce CISA’s funding by $707 million, roughly 30% of its FY2025 budget of $2.4 billion.
    • “The administration said its proposal “refocuses CISA on its core mission” of protecting federal networks and helping critical infrastructure operators defend themselves from cyberattacks and physical threats.”
  • Per a March 31 HHS news release,
    • “The U.S. Department of Health and Human Services (HHS) today announced that it is reversing a 2024 reorganization that: (1) dually titled the Office of the National Coordinator for Health Information Technology (ONC) as the Office of the Assistant Secretary for Technology Policy/Office of the National Coordinator for Health IT (ASTP/ONC), headed by the Assistant Secretary for Technology Policy, dually titled as the National Coordinator for Health IT; (2) moved three HHS-wide technology roles to ONC from the Office of the Chief Information Officer (OCIO); and (3) shifted specific cybersecurity functions out of OCIO.
    • “Today’s action restores a unified, Department‑wide technology leadership model by returning these enterprise responsibilities to OCIO while sharpening ONC’s mission focus on nationwide health IT interoperability and data liquidity.
    • “Under this alignment, HHS has ended the Biden administration’s dual management title for the Assistant Secretary for Technology Policy, restored ONC as a singularly titled office, and shifted the roles, responsibilities, and offices of the HHS Chief Technology Officer (CTO), HHS Chief Artificial Intelligence Officer (CAIO), and HHS Chief Data Officer (CDO) back under the HHS Chief Information Officer’s leadership. This structure reinforces OCIO’s statutory responsibility for enterprise IT, cybersecurity, and data operations, while enabling ONC to concentrate on health IT policy, standards, and certification that support better care and lower costs.
    • “To better integrate policy and operations, OCIO will organize enterprise roles around three core functions: (1) strategic technology leadership and innovation, led by the CTO; (2) responsible, trustworthy artificial intelligence, led by the CAIO; and (3) enterprise data governance and analytics, led by the CDO. These leaders will work as a unified team under the CIO to deliver secure, scalable platforms and common services that support ONC’s policy work and the Department’s mission programs.
    • “This structure allows OCIO to provide an integrated backbone for cloud, cybersecurity, data, and AI that every HHS component can rely on,” said HHS Chief Information Officer Clark Minor. “By bringing CTO, CAIO, and CDO functions together under one roof, we can move faster on shared platforms, protect our systems more effectively, and support ONC and the operating divisions with the technology capabilities they need to innovate for patients.”
  • Cybersecurity Dive informs us,
    • “Federal government leaders are prioritizing cybersecurity improvements as they sketch out their technology-modernization agendas for the year, consulting firm EY said in a survey released this week.
    • “Roughly half of survey respondents (56%) said cybersecurity was one of their top modernization priorities, with roughly a third saying that growing cybersecurity threats “are a barrier for their agencies to achieve their modernization goals,” the survey found.
    • “EY also presented data on government leaders’ impressions of their agencies’ current security postures and their hopes for AI.”
  • Bleeping Computer points out,
    • “The U.S. Federal Bureau of Investigation (FBI) warned Americans against using foreign-developed mobile applications, particularly those created by Chinese developers.
    • “In a public service announcement (PSA) issued via its Internet Crime Complaint Center (IC3) platform this Tuesday [March 31], the FBI warned of privacy and data security risks associated with these apps.
    • “As of early 2026, many of the most downloaded and top-grossing apps in the United States are developed and maintained by foreign companies, particularly those based in China,” the bureau warned.”

From the cybersecurity breaches and vulnerabilities front,

  • Health Exec reports on April 2,
    • “A hospital in Texas revealed that it’s fallen victim to a data breach that exposed the personal information of more than 257,000 patients to hackers.
    • “Nacogdoches Memorial Hospital—an independent health system in Texas consisting of one emergency-capable facility, several affiliated provider practices, and a rehabilitation center—made the breach public this week.
    • “The incident occurred on Jan. 31—or at least, that’s when Nacogdoches Memorial staff became aware of an ongoing cyberattack.
    • “At that time, the hospital said it notified law enforcement, initiated an “incident response plan” and began an investigation to find out what happened. As for details such as the nature of the breach and who was responsible, neither a statement from Nacogdoches Memorial nor a report filed with the Office of the Maine Attorney General contain those details.
    • “To date, no known listing of the data trove on the dark web exists, and no hacker group has claimed responsibility for the cyberattack. Whether or not the data will eventually end up leaked onto the Internet or put up for sale remains unknown—but given the scope of the breach and the black market value of the stolen information, it’s not out of the realm of possibility.”
  • Bleeping Computer relates,
    • “Telehealth giant Hims & Hers Health is warning that it suffered a data breach after support tickets were stolen from a third-party customer service platform.” * * *
    • “It is one of the most successful U.S. brands in the online pharmacy and telehealth space, with strong marketing presence, and annual revenues close to $1 billion.” * * *
    • “BleepingComputer learned last month that the ShinyHunters extortion gang conducted the breach.
    • “The data was stolen as part of a widespread campaign in which threat actors compromised Okta SSO accounts to gain access to third-party cloud storage services and SaaS platforms to steal data.
    • “In this particular attack, BleepingComputer was told that the threat actors used the Okta SSO account to access the His and Hers Zendesk instance, where they stole millions of support tickets.”
  • Dark Reading notes,
    • “The impact of TeamPCP’s high-profile supply chain attacks is rapidly expanding — in more ways than one.
    • “Following last month’s spree of compromised open source projects, two victim organizations disclosed breaches related to the attacks this week. On Tuesday, AI startup Mercor said on social media platform X that it was “one of thousands of companies impacted by a supply chain attack involving LiteLLM.”
    • “And on Thursday, the EU’s Computer Emergency Response Team (CERT-EU) disclosed that a recent attack on the European Commission’s cloud and Web infrastructure stemmed from the previously reported Trivy supply chain attack,also attributed to TeamPCP. According to CERT-EU, the EC inadvertently installed a compromised version of the Trivy code-scanning security tool, which allowed threat actors to harvest credentials and secrets that they later used to access the organization’s Amazon Web Services (AWS) cloud environment.”
  • The American Hospital Association News tells us,
    • “The Cybersecurity and Infrastructure Security Agency released an alert March 27 on a vulnerability in F5 BIG-IP Access Policy Manager software that is being exploited for malicious cyber activity. F5 devices and software, used widely by health care and other critical infrastructure, provide app security and management services. The vulnerability was previously disclosed in October 2025 as a denial-of-service issue but was reclassified this month due to new information that found the vulnerability allows malicious actors to perform remote code execution, according to an alert from F5. 
    • “F5 has determined that this issue is much more severe than previously thought,” said Scott Gee, AHA deputy national advisor for cybersecurity and risk. “The original patch released last year fixes the larger issue, so if you are using F5’s BIG-IP software, a very common app delivery and security service, ensure that you patch the system as soon as possible.” 
       
  • Cybersecurity Dive informs us,
    • “Security researchers warn that chaining two critical vulnerabilities in Progress Software’s ShareFile service could allow an attacker to achieve remote code execution.
    • “The flaws exist in ShareFile Storage Zones Controller, which helps users manage files while they are using the ShareFile software-as-a-service interface, according to researchers at watchTowr Labs.
    • “The vulnerabilities include an authentication bypass flaw, tracked as CVE-2026-2699, and a remote code execution flaw, CVE-2026-2701. The vulnerabilities have severity scores of 9.8 and 9.1, respectively.
    • “Progress Software warned in a security bulletin released Thursday [April 2] that an attacker could access on-premises Storage Zones Controller configuration pages, allowing them to make changes in system configuration or achieve remote code execution.
    • “There is no immediate evidence of exploitation, but researchers urged users to immediately apply security updates.”
  • and
    • “A North Korean threat actor is suspected to be behind a major supply chain attack against a
      Axios, a JavaScript library that is downloaded more than 100 million times per week, according to security researchers. 
    • “Earlier this week, an attacker compromised the node package manager account for an axios maintainer and introduced a malicious dependency plain-crypto-js. The malicious versions were deleted within a few hours, but, with the widespread use of axios, there was a risk that a large number of users could have downloaded the poisoned version.
    • “Researchers from Google Threat Intelligence Group said the malicious dependency is an obfuscated dropper that deploys a backdoor called Waveshaper.v2 across Windows, Linux and Mac environments.” 
  • Bleeping Computer notes,
    • “Threat actors are exploiting the recent Claude Code source code leak by using fake GitHub repositories to deliver Vidar information-stealing malware.
    • “Claude Code is a terminal-based AI agent from Anthropic, designed to execute coding tasks directly in the terminal and act as an autonomous agent, capable of direct system interaction, LLM API call handling, MCP integration, and persistent memory.
    • “On March 31, Anthropic accidentally exposed the full client-side source code of the new tool via a 59.8 MB JavaScript source map included by accident in the published npm package.”
  • and
    • “Device code phishing attacks that abuse the OAuth 2.0 Device Authorization Grant flow to hijack accounts have surged more than 37 times this year.
    • “In this type of attack, the threat actor sends a device authorization request to a service provider and receives a code, which is sent to the victim under various pretexts.
    • “Next, the victim is tricked into entering the code on the legitimate login page, thus authorizing the attacker’s device to access the account through valid access and refresh tokens.
  • Per Cyberscoop,
    • “A new malware-based credential-stealing campaign, which researchers are calling “DeepLoad,” has been infecting enterprise business IT environments.
    • “In a report released Monday, ReliaQuest AI researchers Thassanai McCabe and Andrew Currie say the most relevant feature of this attack is the way it uses artificial intelligence and other engineering “to defeat the controls most organizations rely on, turning one user action into persistent, credential-stealing access.”
    • “DeepLoad is delivered to victims via “QuickFix” social-engineering techniques, such as fake browser prompts or error pages. If the user falls for the scheme, the malware developers — or more likely their AI tools — put a lot of work into building evasion of security technology “at every stage” of the attack chain.
    • “The loader “buries functional code under thousands of meaningless variable assignments,” and the payload runs behind a Windows lock screen process that is “overlooked by security tools” monitoring for threats. ReliaQuest said “the sheer volume” of code padding likely rules out human-only involvement.”
  • Info Security discusses,
    • “A new malware-as-a-service (MaaS) platform dubbed Venom Stealer that automates credential theft and continuous data exfiltration has been identified by cybersecurity researchers.
    • “The platform is being sold on cybercrime networks and is designed to go beyond traditional credential harvesting tools by maintaining ongoing access to stolen data even after the initial infection.”

From the ransomware front,

  • Cisco Talos reflects on ransomware trends in 2025.
  • Cyberscoop reports,
    • “The Akira ransomware group has compromised hundreds of victims over the past year with a well-honed attack lifecycle that has whittled down the time from initial access to encryption of data in less than four hours, according tocybersecurity firm Halcyon.”
  • Security Week relates,
    • “Like an inverted pyramid, the range of different attack modes are now built on top of the single point of identity abuse.
    • “Stolen credentials are a major threat. Legitimate credentials illegitimately acquired provide legitimate access to illegitimate actors. Once inside the network, these bad actors have greater ability to move and act in stealth. The continuing rise in ransomware attacks bears testament.
    • “The theft and resale of credentials operates on an industrial scale. Fueled by the rise of increasingly more sophisticated infostealers, stolen credentials are packaged into ‘logs’ and sold to criminals on the black market. Ontinue reports, “Listings tied to LummaC2 alone surged by 72%, with high-privilege cloud console credentials selling for $1,000–$15,000+.”
    • “Ransomware has been one of the primary beneficiaries of stolen credentials. More than 7,000 incidents and 129 active groups were tracked through 2025. At the same time, ransom payments decreased slightly from $892M in 2024 to $820M in 2025. This apparent contradiction is actually logical.
    • “Larger targets, with larger payout potential, will have seen the most aggressive corporate investment (process and technology) mitigating exposure to this attack pattern,” explains Trey Ford, chief strategy and trust officer at Bugcrowd. These larger targets are also more susceptible to government pressure to not pay ransoms, and ransomware income has consequently declined. The ransomware groups have responded with more attacks demanding smaller payments from more but smaller companies.” 

From the cybersecurity defenses front,

  • Dark Reading reports,
    • “After some delay, Apple has patched the vulnerabilities associated with the DarkSword exploit chain for all affected customers, even those who aren’t updated to iOS 26 — a boon for organizations trying to get users updated to a new version all at once, and for those with patch management policies that preclude such updates.”
  • and
    • “Joseph Izzo, chief medical information officer for San Joaquin General Hospital, received ransomware training during a downtime period. He practiced responding and maintaining patient care in the event that the facility is forced to operate offline. But when the hospital where he was working was actually hit with ransomware, he realized very quickly how “different it was under pressure.” 
    • “Izzo shared his story at RSAC 2026 Conference and provided key incident response (IR) recommendations for healthcare organizations, a sector frequently targeted by ransomware gangs due to highly sensitive information. Ransomware doesn’t always cripple hospitals, but partial attacks happen frequently, Izzo explained. Either way, a rapid response is necessary when serving a vulnerable population.
    • “Recommendations ranged from identity protection to being prepared to operate with pen and paper in a digital world. Preparation is what really “makes the difference” when healthcare facilities are trying to get past a ransomware incident, Izzo emphasized.” 
  • Cybersecurity Dive tells us,
    • “Cybersecurity is one of the leading risks influencing corporate executives’ decisions about AI adoption, the consulting firm KPMG said in a quarterly AI pulse survey released on Tuesday.
    • “Three-quarters of senior leaders at large corporations told KPMG that they were worried about the cybersecurity and privacy risk associated with AI tools, according to the report.
    • “The survey also asked questions about governance approaches and agentic AI, offering a window into how businesses around the world are wrestling with new security challenges.”
  • Here is a link to Dark Reading’s CISO Corner.

Monday report

  • Happy National Doctors’ Day!
    • “National Doctors’ Day is a nationwide observance dedicated to honoring physicians for their expertise, responsibility, and continued commitment to patient care. Observed annually on March 30, it creates a natural point of recognition for the role doctors play in the health and well-being of individuals, families, and communities, often during critical and life-changing moments.”

From Washington, DC.

  • Roll Call reports,
    • “President Donald Trump wants Congress to nix a two-week recess and return to the Capitol to address the ongoing Department of Homeland Security shutdown, his top spokesperson said Monday.
    • “The president is also encouraging Congress to come back to Washington to permanently fix this problem and to fund and reopen the Department of Homeland Security entirely,” White House press secretary Karoline Leavitt told reporters.”
  • Govexec adds,
    • “Most Transportation Security Administration officers received a paycheck Monday covering four weeks of back wages that were held up by the funding lapse at the Homeland Security Department, a TSA spokesperson said, [due to an Executive Order].
  • Per an OPM news release,
    • “The US Office of Personnel Management (OPM), in partnership with the White House, today announced the launch of a new Early Career Talent Network designed to connect emerging professionals with full-time career opportunities across the federal government.
    • “The new network, available at EarlyCareers.gov, will help build a stronger pipeline of talent into critical mission roles across government, including finance, human resources, engineering, project management, and procurement. The initiative supports broader administration efforts to modernize federal hiring and strengthen the next generation of public servants.
    •  “Building a strong pipeline of early-career talent is essential to the future of the federal workforce,” OPM Director Scott Kupor said. “We are making it easier for talented individuals to connect with meaningful careers in public service while helping agencies efficiently identify the talent they need to deliver results for the American people.”
  • OPM Director Scott Kupor made another management-oriented post to his Secrets of OPM blog now available on Substack. The post discusses the Earlycareers.gov initiative.
  • The American Hospital Association News tells us,
    • “Average out-of-pocket premiums for Health Insurance Marketplace enrollees increased $65 per month in 2026 compared to 2025, going from $113 to $178, according to a report released March 27 by the Centers for Medicare & Medicaid Services. The figures represent costs after accounting for the enhanced premium tax credits, which expired at the end of 2025. CMS also found that 40% of 2026 enrollees selected bronze plans, up from 30% in 2025. Silver plan selection dropped from 56% to 43%, while gold plan selection increased from 13% to 17%. Additionally, CMS said 23.1 million consumers selected or re-enrolled in Marketplace coverage for 2026, marking a 5% decrease from 2025.” 
  • Per National Institutes of Health news releases,
    • “The National Institutes of Health (NIH) today has chosen 15 scientific teams from across the nation as cash prize winners for their submissions to a national crowdsourcing challenge designed to generate innovative ideas that integrate diet and nutrition into autoimmune disease research. Winning submissions investigated the effectiveness of dietary interventions; microbiome, immune system and multi-omic approaches; personalized and data-driven predictive nutrition; and community and patient-center research frameworks. 
    • “Autoimmune diseases affect more than 8% of the U.S. population, impacting between 23 and 50 million Americans. Despite the prevalence and significant economic burden of autoimmune diseases, the role of diet and nutrition in this area remains largely underexplored. NIH invited researchers, clinicians, patients, caregivers, advocacy groups, and interdisciplinary teams to submit feasible, scalable approaches to better understand how dietary interventions may influence autoimmune disease onset, progression, flares, and symptom management. 
    • “The challenge, known as the Nutrition for Our Immune System Health (NOURISH): Autoimmunity Challenge and led by NIH’s Office of Autoimmune Disease Research, yielded many highly competitive submissions, and resulted in 15 prize awards, totaling $10,000 to each team. The winners showed thoughtful planning and designs that, with further development, could result in innovative solutions to benefit Americans affected by autoimmune diseases. Each winning entry contributed innovative, scientifically rigorous, and patient-centered ideas to advance the science of autoimmune disease research and care in one of four thematic areas.”
  • and
    • “The National Institutes of Health (NIH) announced that Elisabeth Armstrong, DBe, has been named chief of staff in the NIH Office of the Director.  As chief of staff, Dr. Armstrong will oversee the Office of the Director. She will provide strategic counsel to the NIH Director and other key leaders within NIH, in addition to managing process, operations, and information flows.    
    • “Dr. Armstrong is an outstanding addition to NIH’s leadership team. Her unique background and range of public and private sector experience will help drive positive action and innovation at NIH,” said NIH Director Jay Bhattacharya, M.D., Ph.D.” 

From the Food and Drug Administration front,

  • BioPharma Dive points out five FDA decisions to watch in the second quarter of 2026, which starts on Wednesday.
  • Per Fierce Pharma,
    • “With a second phase 3 win for Tyvaso in idiopathic pulmonary fibrosis (IPF), United Therapeutics is padding the case for an expansion and putting more color on its filing plans with the FDA. 
    • “In the wake of the “overwhelmingly positive” pair of late-stage readouts, multiple analysts are sharing in United’s optimism that Tyvaso (treprostinil) could change the treatment landscape in the lung scarring disease, which is estimated to affect more than 100,000 people in the U.S.” 
  • MedTech Dive reports,
    • “Medtronic has received 510(k) clearance for its Stealth AXiS surgical system for cranial and ear, nose and throat procedures.
    • “The clearances, which Medtronic disclosed Friday, expand the label of a system that combines surgical planning, navigation and robotics to improve surgeons’ workflows.
    • “Medtronic said cranial surgeons can use the system to create patient-specific brain maps, while the benefits for ENT teams include visualization tailored to the sinuses and skull base.”

From the public health and medical / Rx research front,

  • USA Today reports,
    • A “highly mutated” COVID variant that flew under the radar for years has been detected in a growing number of U.S. states, health officials said this week.
    • “The Centers for Disease Control and Prevention (CDC) said in a March 19 report that it was tracking variant BA.3.2, nicknamed “Cicada,” after routine surveillance noted an increase in U.S. cases. The World Health Organization (WHO) likewise listed the strain on its “variants of monitoring” record, as it has been detected in at least 23 countries.
    • “Cicada still accounts for only a small number of cases in the United States, but has ballooned to represent up to 30% in some European countries. Still, the CDC said its monitoring of the spread “provides valuable information about the potential for this new SARS-CoV-2 lineage to evade immunity from a previous infection or vaccination.” * * *
    • “The CDC’s latest data from Feb. 11 used wastewater collected by its National Wastewater Surveillance System and Stanford University’s WastewaterSCAN Dashboard. A pathogen’s existence and prominence can be measured by testing wastewater samples collected from sources such as sewage, industrial waste and stormwater runoff.
    • “The testing tracked the presence of BA.3.2 in 25 states, including: California, Connecticut, Florida, Hawaii, Idaho, Illinois, Louisiana, Maine, Michigan, Maryland, Massachusetts, Missouri, New Hampshire, New Jersey, Nevada, New York, Ohio, Pennsylvania, Rhode Island, South Carolina, Texas, Utah, Vermont, Virginia and Wyoming.”
  • Stony Brook (NY) Medicine adds,
    • “The Cicada variant (BA.3.2) is a newer Omicron-related subvariant identified through global and U.S. monitoring systems. Like other recent strains, it has evolved with mutations that may influence how easily it spreads and how the immune system responds.” * * *
    • “Overall, while the Cicada variant may contribute to seasonal increases in cases, it does not currently appear to dramatically change the risk landscape.
    • “Health experts say that the BA.3.2 “Cicada” variant doesn’t seem to cause any new or unusual symptoms compared to other Omicron COVID‑19 variants. Right now, health organizations are mostly tracking how the virus spreads and changes, rather than listing new symptoms.”
  • The Wall Street Journal relates,
    • “Measuring cholesterol levels has long been the main way doctors assess the risk of heart disease. Increasingly, people are opting, too, for a simple, relatively affordable test: a coronary artery calcium scan, or CAC.
    • “The tests recently got a boost from influential clinical guidelines issued earlier this month by leading cardiology groups. These guidelines also included, for the first time, recommended levels of LDL—known as low-density lipoprotein or “bad” cholesterol—based on calcium scores from the scans.
    • “Why does this matter to you? The more calcium you have in your heart, the lower your LDL cholesterol should be to help reduce your risk of having a heart attack or stroke. So the scans give doctors and patients a more precise picture of your risk and whether you need to take action.”
  • The American Medical Association lets us know “what doctors wish patients knew about the deadly risk of stroke.”
    • “Every 40 seconds, someone in the U.S. has a stroke, which is a medical emergency that demands swift action. Meanwhile, every three minutes and 14 seconds, someone dies of stroke in this country. Stroke is the fifth leading cause of death in the U.S. and a major cause of long-term disability for adults, but it is preventable and treatable. That is why patients and families need to know more about preventing and identifying stroke. 
    • “More than 795,000 people in the U.S. have a stroke every year. About 610,000 of these are first or new strokes. Meanwhile, nearly 25% of strokes are in people who have had a previous stroke. And about 87% are ischemic strokes in which blood flow to the brain is blocked, according to the Centers for Disease Control and Prevention (CDC).”
  • Health Day tells us,
    • “For parents of a child with obesity, a normal lab report from the pediatrician may suggest that their weight isn’t yet a problem.
    • “But even if the child’s blood pressure is steady and their sugar levels are fine, those encouraging results — called metabolically healthy obesity or MHO — might be a deceptive snapshot of a much riskier future.
    • ‘Researchers at the Karolinska Institute in Sweden followed more than 7,200 children aged 7 to 17 who were in treatment for obesity. They were followed until age 30. 
    • “Over that period, researchers compared those with metabolically healthy test results to those with early warning signs, and to a control group of more than 35,000 from the general population.
    • ‘The study published March 23 in JAMA Pediatrics found that even kids with MHO — meaning they had normal blood pressure, liver values and blood fats — were at a disadvantage compared to their peers over the long term.”
  • CNN informs us,
    • “Calls to poison centers in the United States about the widely available herb kratom increased more than 1,200% between 2015 and 2025, new research has found.
    • “This data reflects a concerning trend,” study coauthor Dr. Christopher Holstege , director of the Blue Ridge Poison Center at the University of Virginia, said in a news release.
    • “The research was published Thursday in the US Centers for Disease Control and Prevention’s Morbidity and Mortality Weekly Report.
    • “Kratom is an herb from the leaves of the tropical tree Mitragyna speciosa native to Southeast Asia. It has both stimulant and sedative effects and carries a risk of addiction due to how it interacts with the brain, Dr. Oliver Grundmann , a leading kratom researcher and clinical professor in the department of medicinal chemistry at the University of Florida, told CNN in an August story.
    • “The psychoactive herb isn’t federally regulated and thus isn’t “lawfully marketed in the U.S. as a drug product, a dietary supplement, or a food additive in conventional food,” according to the US Food and Drug Administration. But in states that haven’t banned kratom, it’s sold at gas stations, smoke shops and convenience, grocery and health food stores in various forms, including powders, loose-leaf teas, capsules, tablets and concentrates. Some states allow people of any age to buy it.”
  • Neurology Advisor notes,
    • “Among multiple healthy dietary patterns, higher adherence to the DASH diet was associated with the greatest reduction in risk for subjective cognitive decline, supporting diet quality as a modifiable factor for cognitive health.”
  • Per Fierce Pharma,
    • “After notching a phase 2 trial win, Idorsia’s insomnia med Quviviq (daridorexant) is one step closer to potentially becoming a first-in-class treatment for children.
    • “The drug, a dual orexin receptor antagonist (DORA), was studied in children with insomnia between the ages of 10 and 17 years old, including those with neurodevelopmental disorders such as autism spectrum disorder and attention-deficit/hyperactivity disorder (ADHD). 
    • “As measured through a two-week polysomnography sleep study, 165 patients who received a 10-, 25- or 50-mg dose of Quviviq experienced dose-dependent improvements in total sleep time from baseline, Idorsia reported on Monday.”
  • Per MedTech Dive,
    • “Boston Scientific’s Watchman FLX left atrial appendage closure device worked as effectively as blood thinners to lower stroke risk and death at three years in patients with non-valvular atrial fibrillation, study data unveiled Saturday showed.
    • “The study also demonstrated a 45% relative reduction in non-procedural bleeding risk in patients who received the Watchman FLX implant. The findings of the closely watched CHAMPION-AF clinical trial were presented at the American College of Cardiology’s annual meeting and published in the New England Journal of Medicine.
    • “The 3,000-patient study met all of its safety and efficacy endpoints. Boston Scientific said it will seek to expand the indication and Medicare coverage for the device as a first-line stroke risk reduction option based on the results.

From the U.S. healthcare business and artificial intelligence front,

  • Beckers Hospital Review reports,
    • “Cigna’s Express Scripts continued its lead in the U.S. pharmacy benefit manager market for the second year in a row, processing nearly one-third of all prescription claims, according to a March 30 report from the Drug Channels Institute.
    • “The PBM handled 31% of total equivalent prescription claims last year, up from 30% in 2024. CVS Caremark, which dominated the sector until 2024, saw its share fall to 26% amid volume losses tied to major client transitions. Optum Rx, a subsidiary of UnitedHealth Group, maintained a 23% share for the second straight year.
    • “Despite ongoing scrutiny from regulators and rising competition from smaller firms, the same three PBMs as last year still control 80% of the market.
    • “The rankings are based on Drug Channels Institute’s analysis of total equivalent prescription claims processed across the industry.”
  • and
    • “CVS Pharmacy will open its first pharmacy-only location in Chicago on March 30.
    • “The store, located at 2628 W. Pershing Road in the city’s West End, is part of a planned rollout of nearly 20 pharmacy-only, apothecary-style CVS Pharmacy locations expected to launch in select communities in 2026, according to a March 24 statement from CVS shared with Becker’s. The format reflects CVS’ shift toward smaller, pharmacy-focused stores amid declining retail sales.
    • “CVS is in the early stages of launching the new model, the first locations under which will average less than 5,000 square feet — about half the size of a traditional CVS store. The sites will stock health-related products but exclude general consumer goods like greeting cards and groceries.
    • “The launch comes as CVS repositions its pharmacy footprint. The company closed 270 locations in 2025 but plans to open nearly 100 new sites, including more than 60 acquired from Rite-Aid. According to CVS Health’s October 2025 “Rx Report,” 80% of patients prefer in-person pharmacy care and 84% view pharmacies as credible sources of healthcare. The small-format stores aim to meet these expectations while expanding access in underserved areas.”
  • BioPharma Dive relates,
    • “Obesity drugmaker Kailera Therapeutics plans to test investor appetites for another biotechnology initial public offering, according to a Friday securities filing.
    • “If successful, the company, which has several experimental weight loss medicines in testing, could join a short list of newly public biotechs that have raised more than $1.7 billion in proceeds so far this year.
    • “Kailera’s most advanced prospect, ribupatide, is a weekly GLP-1/GIP agonist in late-stage testing. So far, Kailera and its partner Hengrui Pharma have published data from a 48-week Phase 3 trial in Chinashowing that ribupatide helped people with obesity, on average, lose 18% of their body weight.
    • “The drugmaker expects to publish data from an earlier study of an increased dose next year, and findings from its global Phase 3 study in 2028.”
  • A MedCity News opinion piece explains why
    • “AI Can Expand Access to Healthcare — But Only With Human Action
    • “Health systems can turn insights into action, ensuring that preventive care actually happens by combining accurate risk prediction with human outreach and careful planning.”
  • Per an ICER news release,
    • “The Institute for Clinical and Economic Review (ICER) announced today that it will assess the comparative clinical effectiveness and value of lorundrostat (Mineralys Therapeutics, Inc.) and baxdrostat (AstraZeneca) for hypertension.
    • “The assessment will be publicly discussed during a meeting of the Midwest Comparative Effectiveness Public Advisory Council (CEPAC) in October 2026, where the independent evidence review panel will deliberate and vote on evidence presented in ICER’s report.
    • “ICER’s website provides timelines of key posting dates and public comment periods for this assessment.
    • “Consistent with ICER’s process for announcing new assessments, we have spent the past five weeks conducting outreach and engaging with targeted stakeholders, including relevant patient groups, the manufacturers, and clinical experts. Based on this preliminary cross-stakeholder engagement, today ICER has posted a Draft Scoping Document outlining how we plan to conduct this assessment.  
    • “All interested stakeholders are encouraged to submit comments and suggested refinements to the scope to ensure all perspectives are adequately considered. Comments can be submitted by email to publiccomments@icer.org and must be received by 5 PM ET on April 17, 2026.”

Weekend update

From Washington, DC,

  • Congress left town late last week on two weeklong recess which wraps around the upcoming Passover and Easter holidays.
  • Beckers Payer Issues reports,
    • “Healthcare took center stage in governors’ 2026 “State of the State” addresses.
    • “The National Governors Association compiled excerpts from across the country that focused on healthcare, ranging from technology use to the Rural Health Transformation Program to insurance reforms.”
  • The FEHBlog expects that OPM’s call letter for 2026 FEHB and PSHB benefit and rate proposals will be released this week, and the sooner the better.

From the public health and medical / Rx research front,

  • ABC News reports on how online gambling has become a public health crisis for our Nation’s youth.
    • “[T]he link between gambling early and gambling addiction has become increasingly clear. While only 1% of adults who gamble report addictions, the Journal of Behavioral Addictions reports that between 2% and 7% of young people who place bets report gambling addictions. 
    • “Young people’s brains are particularly susceptible to this because … the parts of their brains that respond to these rewards develop more quickly,” said Dr. Nasir Naqvi, the director of Columbia University’s gambling disorders clinic. “So they become sensitive to these awards and to that dopamine release before the part of their brain that helps them to control these behaviors.” 
    • “Naqvi says he now routinely hears about children as young as 13 seeking support for possible addictions to gambling. 
    • “I don’t want to overstate the problem. But yes … it’s a looming public health crisis,” Naqvi told ABC News. “In fact, it’s already here.” 
  • Medscape reports,
    • “Going into 2026, widespread shortages of most major diabetes medications had largely stabilized: The shortages of Humulin and lispro insulin vials, and therefore medications, that dogged Indianapolis-based Eli Lilly in spring and summer 2024 have resolved, and it, like other manufacturers, has largely caught up with much of the demand for its GLP-1 products as well. 
    • “However, experts from the advocacy group T1D Strong say that shortages of GLP-1 receptor agonists, basal and rapid-acting insulin analogues, and several frontline oral agents are expected to persist into 2026 as the supply chain remains unstable, and especially in certain geographic pockets. 
    • “When shortages occur, it often falls to primary care clinicians to improvise substitutions and bridge strategies, while hospitalists see the downstream effects of shortages in real time in patients who show up with conditions like dehydration, medication errors, and avoidable admissions. The challenge has shifted from simply locating medication to building structured, risk-based strategies that prevent treatment gaps and protect the most vulnerable patients.” “
  • and
    • “Repeating the same meals and keeping calorie intake steady produced more weight loss than eating a more varied diet among individuals living with overweight or obesity, a short-term trial showed.
    • “Conventional wisdom around dieting says you should incorporate a lot of different foods to avoid getting bored and that you should splurge on the weekends or special occasions so you don’t feel as deprived,” lead author Charlotte Hagerman, PhD, of the Oregon Research Institute, Springfield, Oregon, told Medscape Medical News. “This contradicts research showing that consistency makes your behavior more habitual, that is, more automatic or effortless.
    • “We wanted to formally test these competing ideas in a group of people trying to lose weight,” she explained. “Maintaining a healthy diet in today’s food environment requires constant effort and self-control. Creating routines around eating may reduce that burden and make healthy choices feel more automatic.”

From the U.S. healthcare business and articifical intelligence front,

  • Modern Healthcare reports,
    • “Insurers and providers are locked in more messy contract disputes than in previous years
    • “A convergence of economic pressures across nearly all business lines has raised the stakes.
    • “Reimbursement disagreements are just one factor as providers object to insurance company practices.
    • “Both sides are equipped with unprecedented access to price transparency data.”
  • STAT News reports,
    • “Alex Zhavoronkov, CEO of Insilico Medicine, can’t stop complimenting Eli Lilly. “Lilly is better in AI than Insilico, and no other company is better in AI than us … except for these guys,” he said. 
    • “He insisted he wasn’t saying nice things about Lilly just because the pharma giant has signed a new deal with Insilico that’s worth $115 million up front and approximately $2.75 billion in biobucks, which are contingent on achieving regulatory and commercial milestones. After calling Lilly’s tirzepatide, which he is on, “the best drug ever invented by humans,” he said he’s been consistently singing Lilly’s praises for a year. “Mounjaro makes me so happy every day. I want to develop the next one.
    • “It looks like Zhavoronkov might have the opportunity to do just that — his AI drug development company’s new deal with Lilly, announced on Sunday, includes rights for the Mounjaro and Zepbound manufacturer to develop, manufacture, and commercialize some of Insilico’s preclinical AI-discovered candidates for oral therapeutics. Though he declined to say which assets Lilly licensed, he said that the company is the “absolutely best partner” for the candidates and that “nobody is better than them” in these disease areas. Insilico’s pipeline webpage recently was updated to note that a candidate targeting GLP-1 has been out-licensed to an undisclosed partner.” 
  • Beckers Hospital Review relates,
    • “Hospitals and health systems have continued to close maternity units, citing ongoing financial challenges, workforce shortages and declining birth rates. However, in rural Kansas, AdventHealth Ottawa — part of Altamonte Springs, Fla.-based AdventHealth — recently restored labor and delivery services to Franklin County.
    • “The AdventHealth Ottawa Family Birth Place temporarily closed in 2023 and reopened in September 2025 with a fully staffed labor and delivery team. As of August 2025, the hospital had hired 11 full-time staff for the unit, with additional providers joining in 2026.
    • “Maternity care challenges remain significant. A report reflecting data stretching into 2026 from the Center for Healthcare Quality and Payment Reform found that fewer than half of U.S. rural hospitals still offer labor and delivery services. In a dozen states, fewer than one-third do.
    • Becker’s has reported similar trends, including 29 maternity service closures in 2025 and seven in 2026. Against that backdrop, AdventHealth Ottawa’s reopening stands out.
    • “What’s unique about Ottawa is that we’re an OB desert that does not sit in a population desert, so there’s a lot of population around us that doesn’t have OB services,” AdventHealth Ottawa President and CEO Brendan Johnson said in a hospital video. “But within a large circumference, there’s about 400 to 500 births a year that didn’t have a place to go.”
  • and
    • “Defining return on investment for healthcare technology has never been more consequential — or more contested. As health systems face mounting financial pressure, workforce strain and the rapid proliferation of AI-driven tools, the question of what truly constitutes a return on a technology investment has grown more complex than a simple cost-benefit calculation. The old metrics — uptime, deployment speed, license cost — no longer tell the full story. 
    • ‘”Across the industry, a new framework is emerging, one that measures ROI not just in dollars saved or revenue gained but in time restored to clinicians, cognitive burden lifted, outcomes improved, and trust strengthened between technology and the people who use it. From community hospitals to academic medical centers, health system leaders are redefining what it means for technology to deliver value. Becker’s asked 50 healthcare leaders how they define ROI for a technology they invest in.” [The answers are found in the article.]