Cybersecurity Saturday

Cybersecurity Saturday

From the cybersecurity defenses and law enforcement front

  • Cyberscoop reports,
    • Congress should use renewal of an expiring [in 2027] terrorism insurance program to create a federal backstop for cybersecurity insurance, according to a report out Tuesday that tries to thread many difficult needles to bolster an industry that its author says isn’t developing fast enough.
    • In an ideal world, cybersecurity insurance can be a valuable tool to protect policyholders and push everyone into adopting better cyber practices, but it will need government intervention to reach its full potential amid an array of challenges, Nick Leiserson writes in a study for the Foundation for Defense of Democracies, a D.C.-based think tank. 
  • and
    • “As spring gives way to summer, a wave of cybercrime crackdowns has taken root, with law enforcement and private security companies directing a surge of takedowns, seizures, indictments and arrests.
    • “Prolific infostealers, malware loaders, counter antivirus and encrypting services, cybercrime marketplaces, ransomware infrastructure and DDoS-for-hire operations have all been seized, taken offline or severely disrupted by global coordinated campaigns over the past six weeks.
    • “It’s been really energizing to see the volume and velocity of these takedowns in such a short period of time,” Flashpoint CEO Josh Lefkowitz told CyberScoop. 
    • “I can’t think of such a flurry and rapid succession — and then magnified by complementary takedowns by Europol and international partners,” he added. “It’s been a great couple of weeks for the good guys, and I wouldn’t be surprised if there’s more around the horizon.”

From the cybersecurity vulnerabilities and breaches front,

  • Bleeping Computer informs us,
    • “News broke [on June 18] about “one of the largest data breaches in history,” sparking wide media coverage filled with warnings and fear-mongering. However, it appears to just be a compilation of previously leaked credentials stolen by infostealers, exposed in data breaches, and via credential stuffing attacks.
    • “To be clear, this is not a new data breach, or a breach at all, and the websites involved were not recently compromised to steal these credentials.
    • “Instead, these stolen credentials were likely circulating for some time, if not for years. It was then collected by a cybersecurity firm, researchers, or threat actors and repackaged into a database that was exposed on the Internet.
    • “Cybernews, which discovered the briefly exposed datasets of compiled credentials, stated it was stored in a format commonly associated with infostealer malware, though they did not share samples
    • “An infostealer is malware that attempts to steal credentials, cryptocurrency wallets, and other data from an infected device. Over the years, infostealers have become a massive problem, leading to breaches worldwide.”
  • Cybersecurity Dive reports,
    • “Major insurance provider Aflac Inc. said Friday [June 20] that it was the target of a cyberattack on June 12 that is linked to a major cybercrime spree focusing on the industry. 
    • “The company said it was able to contain the attack within hours and confirmed its systems remain operational. 
    • “We continue to serve our customers as we respond to this incident and can underwrite policies, review claims and otherwise service our customers as usual,” the company said in a Securities and Exchange Commission filing
    • “The incident is part of a larger crime wave targeting the insurance industry that researchers have linked to a collective known as Scattered Spider. The group recently conducted a weeks-long attack campaign against retailers in the U.S. and the U.K.
    • “Erie Insurance Group last week disclosed that it was the target of a cyberattack that began on June 7. The company said Tuesday that it has regained control over its systems and sees no further evidence of malicious activity.”
  • Cyberscoop adds,
    • Scattered Spider is an amorphous band of young English-speaking cybercriminals affiliated with the larger sprawling network known as The Com. Scattered Spider associates recently ran roughshod over U.K.- and U.S.-based retailers before pivoting, once again, to insurance companies.
    • The ring of cybercriminals historically focus on one sector at a time, resulting in a wave of extortion attacks on companies in the same industry, which often use similar systems and processes. 
    • Google previously warned that Scattered Spider shifted its attention to U.S. retailers after the group hit multiple retailers and grocery stores in the U.K. in April. The pattern of recent activities attributed to Scattered Spider has been consistent.
    • “We are now seeing incidents in the insurance industry,” John Hultquist, chief analyst at Google Threat Intelligence Group, told CyberScoop on Monday. “Given this actor’s history of focusing on a sector at a time, the insurance industry should be on high alert, especially for social engineering schemes which target their help desks and call centers.”
  • The Wall Street Journal points out,
    • “Hackers in recent months have disrupted retail sales in the U.K. and U.S. and stolen hundreds of millions of dollars from crypto holders by targeting the outsourced call centers that many American corporations use to save costs.
    • “The hacks are often meticulously researched and use a variety of techniques, but they have one thing in common: low-level workers who staff call centers and have access to the kind of sensitive information that criminals need to commit crimes.
    • “The focus on outside call centers has allowed attackers to trick workers to get around so-called two-factor account authentication techniques that send codes by text to mobile phones. Those methods are commonly used to protect millions of bank and credit-card accounts, as well as a host of other online portals.”
  • Security Week lets us know,
    • “Healthcare services firm Episource has been targeted in a cyberattack that resulted in a data breach impacting more than 5.4 million individuals.
    • “Episource provides medical coding and risk adjustment services to doctors, health plans, and other types of healthcare organizations. 
    • “The firm revealed in a data breach notice that it detected unauthorized access to its systems in early February. An investigation showed that “a cybercriminal” was able to view and copy data belonging to some Episource customers between January 27 and February 6, 2025. 
    • “We quickly took steps to stop the activity. We began investigating right away and hired a special team to help us. We also called law enforcement. We turned off our computer systems to help protect the customers we work with and their patients and members,” the company said, noting that it’s not aware of any misuse of the compromised data.”
  • Per Dark Reading,
    • Cybercriminals are using fake search engine listings to hijack the results for people looking for tech support from brands like Apple, Bank of AmericaFacebook, HP, Microsoft, Netflix, and PayPal.
    • This type of deceptive scam is common, taking advantage of users’ trust in big name brands, beginning with a sponsored search result on Google — but this time, there’s a twist.
    • According to Pieter Arntz and Jérôme Segura, researchers at Malwarebytes Labs, cybercriminals start by paying for a sponsored ad on Google pretending to be a major brand. This advertisement will then lead people to the fake website.
    • “However, in the cases we recently found, the visitor is taken to the legitimate site with a small difference,” the researchers wrote in a post this week. “Visitors are taken to the help/support section of the brand’s website, but instead of the genuine phone number, the hijackers display their scammy number instead.”
    • “So, while the browser address is legitimate and shows no cause for concern, the fraudsters overlay the actual website with misinformation, directing the user to seek help from a fraudulent source.”
  • Cybersecurity Dive tells us,
    • “Researchers are urging Veeam Backup & Replication users to make sure their systems are fully upgraded to the latest version after the company released a patch Tuesday to address a critical remote code execution flaw. 
    • “The vulnerability, tracked as CVE-2025-23121, allows an authenticated domain user to run code on a backup server. 
    • Researchers at watchTowr and Code White GmbH previously disclosed that a patch to address a prior vulnerability, tracked as CVE-2025-23120, could be bypassed. That disclosure led to the development of the new patch.”
  • and
    • “Hackers are exploiting a critical vulnerability in Zyxel’s Internet Key Exchange packet decoder, GreyNoise researchers warned on Monday.
    • “The vulnerability, tracked as CVE-2023-28771, powered a sudden wave of exploitation attempts Monday, with researchers observing 244 unique IP addresses involved in the activity. 
    • “All of the addresses were located in the U.S. and registered to Verizon Business, but researchers caution that because the vulnerability was located over UDP (Port 500), the attackers may have been spoofing those addresses.
    • “Additional analysis suggests that the activity may be related to a variant of the Mirai botnet, researchers said. 
    • “Mirai-linked payloads suggest the activity may be aimed at enrolling devices into botnets for automated attacks like DDoS or scanning,” GreyNoise researchers told Cybersecurity Dive via email.”
  • The Cybersecurity and Infrastructure Security Agency (CISA) added three known exploited vulnerabilities to its catalog this week.
    • June 16, 2025
      • CVE-2025-43200 Apple Multiple Products Unspecified Vulnerability
      • CVE-2023-33538 TP-Link Multiple Routers Command Injection Vulnerability
        • NIST discusses the Apple vulnerability here.
        • Security Week discusses the TP-Link KVE here.
    • June 17, 2025
      •  CVE-2023-0386 Linux Kernel Improper Ownership Management Vulnerability 
        • Security Week discusses this KVE here.

From the ransomware front,

  • The Hacker News reports,
    • “An emerging ransomware strain has been discovered incorporating capabilities to encrypt files as well as permanently erase them, a development that has been described as a “rare dual-threat.”
    • “The ransomware features a ‘wipe mode,’ which permanently erases files, rendering recovery impossible even if the ransom is paid,” Trend Micro researchers Maristel Policarpio, Sarah Pearl Camiling, and Sophia Nilette Robles said in a report published last week.
    • “The ransomware-as-a-service (RaaS) operation in question is named Anubis, which became active in December 2024, claiming victims across healthcare, hospitality, and construction sectors in Australia, Canada, Peru, and the U.S. Analysis of early, trial samples of the ransomware suggests that the developers initially named it Sphinx, before tweaking the brand name in the final version.”
  • and
    • “The threat actors behind the Qilin ransomware-as-a-service (RaaS) scheme are now offering legal counsel for affiliates to put more pressure on victims to pay up, as the cybercrime group intensifies its activity and tries to fill the void left by its rivals.
    • “The new feature takes the form of a “Call Lawyer” feature on the affiliate panel, per Israeli cybersecurity company Cybereason.
    • “The development represents a newfound resurgence of the e-crime group as once-popular ransomware groups like LockBit, Black Cat, RansomHub, Everest, and BlackLock have suffered abrupt cessations, operational failures, and defacements. The group, also tracked as Gold Feather and Water Galura, has been active since October 2022.
    • “Data compiled from the dark web leak sites run by ransomware groups shows that Qilin led with 72 victims in April 2025. In May, it is estimated to be behind 55 attacks, putting it behind Safepay (72) and Luna Moth (67). It’s also the third most active group after Cl0p and Akira since the start of the year, claiming a total of 304 victims.”

From the cybersecurity defenses front,

  • Cybersecurity Dive reports,
    • “For organizations aiming to deploy generative AI at scale, focusing on the cybersecurity guardrails surrounding the technology can help ease adoption rather than hinder it, according to AWS CISO Amy Herzog. 
    • “Herzog, who took on the CISO role earlier this month, made the case for a closer enterprise focus on security during the company’s annual re:Inforce conference Tuesday. The strategy can pay off by speeding up adoption. 
    • “Security, when done right, can be a true enabler in adopting new technologies,” said Herzog. “What we’re noticing is customers with mature security practices and the ability to innovate while maintaining a high security bar, they’re adopting Gen AI faster.
    • “Companies in highly regulated environments, from finance to healthcare, have been able to rely on their existing security, privacy and data management guardrails to speed up AI adoption, Herzog said. 
    • “This enables them to reduce risks and pragmatically focus on scaling their use cases,” Herzog said.”
  • and
    • “Nearly one in 10 publicly accessible cloud-storage buckets contained sensitive data, with virtually all of that data considered confidential or restricted, according to a new report from Tenable based on scans conducted between October 2024 and March 2025.
    • “On the other hand, more than eight in 10 organizations using Amazon Web Services have enabled an important identity-checking service, according to the report, published on Wednesday.
    • ‘The number of organizations with triple-threat cloud instances — “publicly exposed, critically vulnerable and highly privileged” — declined from 38% between January and June 2024 to 29% between October 2024 and March 2025.”
  • Per Bleeping Computer,
    • “Microsoft has announced plans to periodically remove legacy drivers from the Windows Update catalog to mitigate security and compatibility risks.
    • “The rationale behind this initiative is to ensure that we have the optimal set of drivers on Windows Update that cater to a variety of hardware devices across the windows ecosystem, while making sure that Microsoft Windows security posture is not compromised,” Microsoft said.
    • “This initiative involves periodic cleanup of drivers from Windows Update, thereby resulting in some drivers not being offered to any systems in the ecosystem.
    • “As the company explained on Thursday, the first phase of this “cleaning up” procedure will involve drivers with newer replacements already published on Windows Update.”
  • CSO lets us know,
    • “Ransomware tabletop exercises confront participants with an attack scenario, offering them a way to test and improve their organization’s readiness and response capabilities.
    • “During this month’s Infosecurity Europe conference, CSO took part as a media advisor to a blue team, pitched against a red team of attackers in a ransomware tabletop simulation focused on the water industry. The “Operation 999” exercise was devised and run by cybersecurity vendor Semperis, a specialist in protecting Active Directory (AD) and hybrid identity environments.” * * *
    • “The “Operation 999” exercise offered a cybersecurity tabletop simulation designed to allow participants to exercise incident response strategies. The tabletop exercise offered an immersive experience without featuring any hands-on keyboard or analysis of technical data (such as exercise specific log files, or similar).”
  • Security Week discusses “Choosing a clear direction in the face of growing cybersecurity demands. In a rapidly changing AI environment, CISOs are worried about investing in the wrong solution or simply not investing because they can’t decide what the best option is.”
  • Here is a link to Dark Reading’s CISO Corner.

Friday Report

FEHBlog note: Since the FEHBlog launched in 2006, the FEHBlog has featured a photograph at the top of the post. The FEHBlog learned today that email subscribers to the FEHBlog see a blank spot at the top of the page as the email system blocks photographs. For that reason, the FEHBlog has stopped using photographs in the blog except when necessary.

From Washington, DC,

  • Roll Call informs us,
    • “Senate Republicans say they are looking for ways to safeguard rural hospitals from proposed cuts to a key Medicaid funding method, amid concerns from the powerful hospital lobby and others that the budget reconciliation bill could force many facilities to close.
    • “The draft text that the Senate Finance Committee released this week reduces the ability of states who expanded Medicaid under the 2010 health care law to levy taxes on providers to fund their programs. 
    • “Senate Majority Leader John Thune, R-S.D., told reporters Wednesday he is working on the issue, though he did not offer details. Leadership is attempting to balance directives to cut government spending with demands from senators like Josh Hawley, R-Mo., who said that the bill should protect rural hospitals from the effects of shrinking provider taxes.
    • “The right thing to do is not defund rural hospitals to pay for your pet projects,” Hawley said. “So, if you want your pet project in the bill, go find your own money. Don’t defund rural hospitals.” 
    • “Medicaid is often one of the top payers for rural facilities.”
  • STAT News adds,
    • “Hospitals are now lobbying senators to return to the House’s version of the bill, which also is expected to substantially cut hospitals’ revenues and the number of patients covered — but less so than the Senate’s version of the bill. 
    • “But that lobbying effort is butting up against senators who want to further reduce government spending. The Congressional Budget Office has not yet projected the budget impact of the Senate bill.”
  • The American Hospital Association News tells us,
    • The Centers for Medicare & Medicaid Services June 20 announced it is finalizing its 2025 Marketplace Integrity and Affordability final rule. The rule shortens the open enrollment period for the federal marketplace to Nov. 1-Dec. 15 starting in 2027, and limits open enrollment periods for state-based marketplaces to Nov. 1-Dec. 31. The rule also includes a change to the premium adjustment percentage that would increase the maximum annual cost sharing limitation. Additionally, the rule makes updates to the income verification process and pre-enrollment verification process for SEPs, changes to the essential health benefits, modifications to the redetermination and re-enrollment processes, and ends a special enrollment period for low-income individuals, among other policies. Many of the provisions reinstate policies finalized during the prior Trump administration.
  • Here is a link to CMS’s fact sheet on this final rule.
  • Govexec lets us know,
    • “The White House and its Department of Government Efficiency are spearheading efforts to shake up the Postal Service, according to details of the meetings obtained by Government Executive, with topics including pricing for mail and general reform proposals. 
    • “The meetings were not clearly within the scope of a memorandum of understanding former Postmaster General Louis DeJoy signed with DOGE, which focused on specific cost-cutting measures and real estate planning. Some of the meetings also involved top officials from the Treasury Department, White House attorneys and policy advisors and additional USPS executives. A source familiar with the meetings confirmed DOGE has been active at the Postal Service’s Washington headquarters in recent months.” 
  • Per an OPM news release,
    • This week, the U.S. Office of Personnel Management (OPM) Inspector General (IG) released a report that uncovered widespread compliance failures and weak internal oversight in the agencyʼs telework and remote work programs during the Biden Administration.
    • The report revealed more than half of OPM employees reviewed failed to meet basic in-office requirements and nearly a third of sampled teleworkers had expired or missing agreements. Additionally, 15 percent of remote workers had no approved agreement on file, and many discrepancies flagged by HR remained unresolved for months.
    • Since President Trump took office, OPM has reinstated in-office requirements to restore a culture of accountability and public service.
    • “Under the previous administration, OPMʼs telework and remote work policies were mismanaged and oversight was virtually nonexistent,” Acting Director Chuck Ezell said. “That era of telework abuse is over. At President Trumpʼs direction, OPM has restored in-person operations to ensure federal employees are working for the taxpayers.”
    • OPM has already implemented new internal controls and compliance reviews, and effective March 3, 2025, all employees are required to report to their official duty station full-time.
    • Read the OIG report here.

From the Food and Drug Administration front,

  • The Wall Street Journal reports,
    • “Sanofi and Regeneron Pharmaceuticals said they got Food and Drug Administration approval for anti-inflammatory drug Dupixent as a treatment for a rare skin disease, adding an eighth indication in the U.S. for their blockbuster medicine.
    • “France’s Sanofi and Tarrytown, N.Y.-based Regeneron said Friday that the FDA gave the green light for Dupixent as a treatment of adult patients with bullous pemphigoid, a skin disease that mainly affects elderly people and is characterized by itch, blisters and lesions, as well as a reddening of the skin.”

From the judicial front,

  • SCOTUSblog reports,
    • In a splintered decision, the Supreme Court did not allow a retired firefighter to sue her prior employer under the ADA. The majority opinion, written by Justice Gorsuch, determined the retiree was not a “qualified individual” under the law. In dissent, Justice Jackson called the majority opinion “counterintuitive.”
  • and
    • “On Friday, the Supreme Court opined on a challenge by retailers of e-cigarettes to an FDA decision. The majority opinion, written by Justice Amy Coney Barrett, held that the challengers were “adversely affected” by the FDA’s decision and could thus seek judicial review in the 5th Circuit.”
  • The AHA News relates,
    • “The U.S. District Court for the Northern District of Iowa June 18 vacated components of the Centers for Medicare & Medicaid Services’ minimum nurse staffing rule requiring nursing homes to have a registered nurse onsite 24/7 and prescribing a minimum total nurse staffing hours per resident day. The court kept in place the rule’s enhanced facility assessment and Medicaid reporting requirements.
    • “CMS’s general rulemaking power to promulgate ‘such other requirements as the Secretary deems necessary’ does not constitute clear authorization to mandate rigid staffing requirements for [long-term care] facilities,” wrote District Court Judge Leonard T. Strand in the ruling. “Therefore, I find that CMS did not have authority to promulgate the 24/7 RN requirement and the HPRD requirements pursuant to its health and safety rulemaking authority.”
    • “A district court in Texas also vacated the minimum staffing mandate in April.”
  • Beckers Payer Issues points out,
    • “New York City can implement an Aetna Medicare Advantage plan for its retirees, the state’s highest court ruled June 18. 
    • “The city has pushed to switch its health benefits for retired city employees to a Medicare Advantage plan since 2021. A group of retired employees sued to block the plan, arguing that the city had promised to provide supplemental Medicare benefits, and that their healthcare benefits would be diminished under an MA plan. 
    • “The New York Court of Appeals ruled against the retirees, reversing lower courts’ decisions. The judges ruled the city was not obligated to offer Medigap plans to its retirees. The court also ruled the retirees did not prove their care would be harmed under an MA plan.” 

From the public health and medical research front,

  • The Centers for Disease Control and Prevention announced today,
    • “Seasonal influenza activity is low. COVID-19 and RSV activity is very low.
    • “COVID-19
      • “COVID-19 wastewater activity is low and emergency department visits and laboratory percent positivity are at very low levels.
    • “Influenza
    • “RSV
      • “RSV activity is very low.
  • The University of Minnesota’s CIDRAP adds,
    • “New findings presented at the annual meeting of the American Society for Microbiology suggest increased levels of fungal spores in the air are strongly linked to surges in cases of influenza and COVID-19.
    • The study was based on daily spore samples taken in 2022 and 2024 in San Juan and Caguas, Puerto Rico, where fungal spores and pollen are endemic and present year-round. The data on spores was matched to data on the daily incidence of people diagnosed with COVID-19 and flu.
    • “The researchers found increases in fungal spore counts matched surges in flu and COVID activity. There was no relationship between pollen levels and respiratory illness activity.
    • “The findings from our study suggest that monitoring airborne fungal spore levels could help predict short-term outbreaks (spikes) of flu and COVID-19, giving public health systems an early warning signal,” study author Felix Rivera-Mariani, PhD said in a press release from the American Society of Microbiology. “Our findings also highlight the potential role of environmental factors—not just person-to-person spread—in contributing to the incidence of respiratory viral infections. That could open new doors for targeted public health alerts, especially in areas with high outdoor airborne fungi.” 
  • and
    • “The US Centers for Disease Control and Prevention (CDC) reported 17 more measles cases today in its weekly update, bringing its total for the year to 1,214 confirmed cases from 36 jurisdictions.
    • “Although measles cases have slowed since peaking in late March, the uptick in cases brings the country closer to surpassing the 1,274 cases reported in 2019, which to date is the highest number reported in a single year since the disease was eliminated from the United States in 2020. There were 285 confirmed measles cases in 2024. 
    • “The CDC reported two additional outbreaks (three or more related cases), bringing the 2025 total to 23 outbreaks. Of the 1,214 confirmed US cases, 89% are outbreak associated. Only 16 outbreaks were reported in 2024, with 69% of confirmed cases associated with those outbreaks. The biggest outbreak in 2025 has been in West Texas, which has seen 750 confirmed cases since late January.”
  • and
    • “Since late April, an infectious diseases specialist at Stanford University and his colleagues have been volunteering their time on a project they hope will help educate the public, and combat misinformation, about the safety and efficacy vaccines.
    • “The project, led by Jake Scott, MD, is a spreadsheet of all the randomized controlled trials (RCTs) that have ever been conducted for licensed vaccines. The idea, hatched on the social media site X, was prompted by responses to an old video of current Department of Health and Human Services Secretary Robert F. Kennedy Jr., in which he claims that none of vaccines mandated for US children has ever been tested in preclinical studies against a placebo. In one of the responses, infectious disease physician Brad Spellberg, MD, suggested a crowd-sourced effort to identify and post all of the RCTs in which vaccines have been tested against a placebo.
    • “That night Scott, a self-proclaimed “spreadsheet geek” who has previously collaborated with Spellberg, began building a spreadsheet using Google Sheets, creating criteria for inclusion, and seeding it with seven vaccine RCTs. Each entry has columns for the name of the vaccine, the date the RCT was published, which populations were studied, how many people were involved in the study and, importantly, the types of placebo or active comparator that were used for the control group.
    • “By the next morning, there were 20 vaccine RCTs on the spreadsheet. By May 5, the list had grown to 100. The spreadsheet now stands at more than 270 RCTs and continues to grow. Scott and his colleagues, who aim to eventually publish a peer-reviewed paper on the project in a medical journal, thoroughly review each entry before inclusion and provide links to the RCTs on PubMed.
    • “I think we’re kind of looking at the tip of the iceberg,” Scott told CIDRAP News. “There’s going to be, I would say, easily 400-plus, maybe 500-plus trials with millions and millions of participants.”
  • The AP reports,
    • “Older U.S. adults are increasingly dying from unintentional falls, according to a new federal report published Wednesday, with white people accounting for the vast majority of the deaths. 
    • “From 2003 to 2023, death rates from falls rose more than 70% for adults ages 65 to 74, the report from the U.S. Centers for Disease Control and Prevention said. The rate increased more than 75% for people 75 to 84, and more than doubled for seniors 85 and older.
    • “Falls continue to be a public health problem worth paying attention to,” said Geoffrey Hoffman, a University of Michigan researcher who was not involved in the new report. “It’s curious that these rates keep rising.”
  • MedTech Dive notes five things to watch at the American Diabetes Association’s upcoming scientific session.
    • “At the American Diabetes Association’s Scientific Sessions, companies like Abbott, Dexcom and Beta Bionics will share the latest data on diabetes technology and new partnerships.
    • “The annual conference takes place June 20-23 in Chicago, with industry leaders gathering to discuss new developments in diabetes treatments. This year’s event follows new ADA standards of care that would expand access to continuous glucose monitors, recommending that the devices be used in adults with Type 2 diabetes who are taking glucose-lowering medications other than insulin.”

From the U.S. healthcare business front,

  • The Wall Street Journal reports,
    • “Health insurers will pledge to smooth the preapproval process following backlash after the killing of an executive last year.
    • “Insurers will create a standard for electronic requests by 2027, with 80% answered in real time if documentation is included.
    • “The industry plan includes reducing procedures subject to authorization, improving explanations, and helping patients changing insurers.”
  • and
    • “Planes have been jetting from Ireland to the U.S. this year carrying something more valuable than gold: $36 billion worth of hormones for popular obesity and diabetes drugs.
    • “The frantic airlift of those ingredients—more than double what was imported from Ireland for all of last year—reflects the collision of two powerful forces: tariff-driven stockpiling and weight-loss drug demand.
    • “The peptide- and protein-based hormones feed into a category of drugs that include wildly popular GLP-1 treatments and newer types of insulin known as analogues. Taken together the shipments weighed just 23,400 pounds, according to U.S. trade data, equivalent to the weight of less than four Tesla Cybertrucks.
    • “Fit into temperature-controlled air-cargo containers, the pharmaceutical ingredients have had a huge impact on the U.S. trade imbalance. The shipments have propelled Ireland, a country of only 5.4 million people, to the second-largest goods-trade imbalance with the U.S., trailing only China. They accounted for roughly half of the $71 billion in goods the U.S. imported from the country in the first four months of the year.
    • “Nearly 100% of the imports had a final destination of Indiana, according to U.S. customs records. Eli Lilly, the drug giant behind weight loss and diabetes drugs Zepbound and Mounjaro, is headquartered in Indianapolis.”
  • Mercer Consulting notes,
    • “It’s been over three years since group health plan sponsors and issuers, in order to comply with the Transparency in Coverage final rule, began posting Machine-Readable Files that contain in-network negotiated charges for every medical item and service with providers in their networks, as well as out-of-network allowed amounts and billed charges. This data had previously been considered by insurers as proprietary and confidential, but the government recognized the need to make healthcare costs more transparent. The rule also requires group health plan sponsors and issuers to post files for negotiated rates and historical net prices for covered prescription drugs, but regulators have delayed that particular requirement .
    • “But even though the data has been available to the public since July 2022, almost 70% of very large employers (5,000+ employees) responding to our 2025 Health Policy Survey report that they have yet to meaningfully use the data.
    • “Impeding use is the sheer amount of data that was dropped on the internet all at once, but not all in one place. According to a recent report from the Congressional Review Service, users have faced significant challenge * * *.
  • Per Fierce Healthcare,
    • “Hinge Health, which just went public last month, launched a referral network of in-person providers to complement its virtual physical therapy platform.
    • “The curated provider network for musculoskeletal (MSK) care, called HingeSelect, includes imaging centers and brick-and-mortar physical therapy providers to help bridge the gap between in-person and digital care. The aim is to offer a more comprehensive end-to-end MSK care model, executives said.
    • “Hinge Health’s technology and in-house orthopedic physicians triage and direct downstream care. When in-person care, such as imaging or injections, is required, members are connected to pre-vetted providers at up to 50% below PPO rates.” 
  • Per Beckers Payer Issues,
    • “Philadelphia-based Independence Blue Cross has launched a new GenAI customer service tool to support customer service representatives in improving accuracy and speed of customer interactions, according to a news release shared with Becker’s
    • “The pilot, initiated in February 2025, tasked more than 40 customer service representatives with using the tool to assist with member-specific questions, summarize complex medical policies and search benefits. 
    • “The AI tool was found to have reduced the number of steps customer representatives must take to access critical information and improved efficiency by increasing the percentage of customers who receive solutions on their first inquiry. It also documents responses and validates the information with Independence Blue Cross’ existing customer relationship system.”

Cybersecurity Saturday

From the cybersecurity and law enforcement front,

  • Cyberscoop reports,
    • “A House panel approved a fiscal 2026 funding bill Monday [June 9, 2025] that would cut the Cybersecurity and Infrastructure Security Agency by $135 million from fiscal 2025, significantly less than the Trump administration’s proposed $495 million.
    • “The chairman of the House Appropriations Subcommittee on Homeland Security, Rep. Mark Amodei, said the annual Department of Homeland Security funding measure “responsibly trimmed” the CISA budget. But Illinois Rep. Lauren Underwood, the top Democrat on his panel, said the legislation “fails to address the catastrophic cybersecurity threats facing our critical infrastructure.”
    • “The subcommittee approved the bill by a vote of 8-4.
    • “CISA would get $2.7 billion under the measure, according to a committee fact sheet, or $134.8 million less than the prior year.
    • “While the full committee chairman Tom Cole, R-Okla., said “the bill provides critical support for cybersecurity technology,” Republicans also criticized the agency’s past work.”
  • and
    • “A familiar face is being promoted from within to lead the FBI’s Cyber division.
    • “In a LinkedIn post Sunday [June 8, 2025], Brett Leatherman said that FBI Director Kash Patel had selected him as assistant director and lead official for the FBI’s primary division for investigating cybercrimes.  The role is prominent in national security, espionage and counterintelligence investigations.” * * *
    • “Leatherman takes over the reins from Bryan Vorndran, who led the bureau’s Cyber Division from 2021 until this past spring when he left the federal government to take a job as Microsoft’s deputy chief information security officer.”  
  • The National Institute of Standards and Technology (NIST) illustrates “19 Ways to Build Zero Trust Architectures.”
    • “The traditional approach to cybersecurity, built around the idea of solely securing a perimeter, has given way to the zero-trust approach of continuously evaluating and verifying requests for access.
    • “Zero trust architectures can help organizations protect far-flung digital resources from cyberattacks, but building and implementing the right architectures can be a complex undertaking.
    • “New NIST guidance offers 19 example zero trust architectures using off-the-shelf commercial technologies, giving organizations valuable starting points for building their own architectures.”
  • Cyberscoop points out,
    • “Federal authorities on Wednesday [June 11, 2025] announced the seizure of about 145 domains and cryptocurrency funds linked to BidenCash, a cybercrime marketplace for stolen credit cards, compromised credentials and other personal information. 
    • “BidenCash was used by more than 117,000 customers, resulting in the trafficking of more than 15 million credit card numbers and personally identifiable information, the Justice Department said. Administrators of the cybercrime platform, which charged a per-transaction fee, generated more than $17 million in illicit revenue since its formation in March 2022, authorities said.
    • “Domains associated with BidenCash now redirect to a server controlled by U.S. law enforcement and display seizure notices. The U.S. Attorney’s Office for the Eastern District of Virginia, which is leading the case, said it seized cryptocurrency funds the BidenCash marketplace used to receive illicit proceeds from its operations.
    • “Authorities did not disclose the value of those seized cryptocurrency funds or identify the physical location of the administrators and infrastructure used by BidenCash. The U.S. Attorney’s Office for the Eastern District of Virginia did not immediately respond to questions.” 
  • Cybersecurity Dive adds,
    • “An international law enforcement operation has dismantled the computer infrastructure powering multiple strains of information-stealer malware.
    • “As part of “Operation Secure,” authorities in 26 Asian countries “worked to locate servers, map physical networks and execute targeted takedowns,” Interpol said in a statement. Law enforcement agencies worked with cybersecurity firms Group-IB, Kaspersky and Trend Micro to prepare assessments of their targets and shared that information with “cyber teams across Asia,” according to Interpol, resulting in “in the takedown of 79 percent of identified suspicious IP addresses.”

From the cybersecurity vulnerabilities and breaches front,

  • The Wall Street Journal reports,
    • “Supermarket shelves are emptying out at some stores around the country, after a cyberattack hit a major distributor to Whole Foods Market and other chains.
    • United Natural Foods said it detected unauthorized activity on its systems last week and took certain ones offline proactively.
    • “Disruptions to its operations have followed, United Natural said. Stores around the country have reported being unable to place orders. The company has told suppliers that it hopes to restore normal operations by Sunday, according to a notice viewed by The Wall Street Journal.” 
  • CISA added four known exploited vulnerabilities to its catalog this week.
    • June 9, 2025
      • CVE-2025-32433 Erlang Erlang/OTP SSH Server Missing Authentication for Critical Function Vulnerability 
      • CVE-2024-42009 RoundCube Webmail Cross-Site Scripting Vulnerability” 
        • The Hacker News discusses these KVEs here.
    • June 10, 2025
      • CVE-2025-24016 Wazuh Server Deserialization of Untrusted Data Vulnerability
      • CVE-2025-33053 Web Distributed Authoring and Versioning (WebDAV) External Control of File Name or Path Vulnerability”
        • Akamai discusses the “Wasuh Server” KVE here.
        • Security Week discusses the WebDAV KVE here.
  • Cybersecurity Dive adds,
    • “Government agencies are operating with massive amounts of “security debt” — meaning unresolved vulnerabilities — putting them and the public at increased risk of falling victim to hackers, according to a Veracode report released Wednesday [June 11, 2025]. 
    • “Roughly 80% of government agencies have software vulnerabilities that have gone unaddressed for at least a year, and roughly 55% of them have long-standing software flaws that place them at even greater risk, the report found.
    • “Veracode’s research shows that it takes government agencies an average of 315 days to resolve half of their software vulnerabilities, compared to the combined public- and private-sector average of 252 days.
    • “But companies and agencies alike are falling short of the necessary investments and procedures to address insecure software, according to Veracode.”
  • Dark Reading warns
    • “Secure Shell (SSH) keys are the backbone of secure remote access. They are everywhere, powering DevOps pipelines, enabling server management, and automating everything from deployments to patching. But despite their ubiquity, SSH keys often remain a blind spot in enterprise security. Why? Because unlike passwords, they don’t expire. They are easy to create, hard to track, and alarmingly simple to forget.
    • “In large enterprises, it is not uncommon to find hundreds of thousands or even millions of unmanaged SSH keys. Many of these grant access to sensitive systems but lack clear ownership or life-cycle oversight, turning what should be a secure authentication method into a major risk factor.
    • “If your organization cannot answer “Who can log in to what, using which key?” you are flying blind.”
  • Security Week notes,
    • “More than 40,000 security cameras worldwide are exposed to the internet, cybersecurity firm Bitsight warns.
    • “Operating over HTTP or RTSP (Real-Time Streaming Protocol), the cameras expose their live feed to anyone knowing their IP addresses, directly from the web browser, which makes them unintended tools for cyberattacks, espionage, extortion, and stalking, the company says.
    • “The HTTP-based cameras rely on standard web technologies for video transmission and control and are typically found in homes and small offices.
    • “Of the more than 40,000 cameras exposing their live feed, more than 14,000 are in the US, with Japan ranking second, at roughly 7,000 devices. Austria, Czechia, and South Korea have roughly 2,000 exposed cameras each, while Germany, Italy, and Russia have roughly 1,000 each.
    • “In the US, most of the exposed cameras are in California and Texas, followed by Georgia, New York, and Missouri. Massachusetts and Florida have high concentrations of exposed cameras as well.” * * *
    • “To keep these security cameras protected, users should secure their internet connections, replace default credentials, disable remote access if not needed, keep the devices always updated, and monitor them for unusual login attempts.”
  • and
    • “Trend Micro has released patches for ten vulnerabilities in Apex Central and Endpoint Encryption (TMEE) PolicyServer, including critical-severity flaws leading to remote code execution (RCE).
    • “The update for Apex Central resolves two critical bugs leading to RCE, tracked as CVE-2025-49219 and CVE-2025-49220 (CVSS score of 9.8). The security defects are similar, but were discovered in different methods, the company says.
    • “Both vulnerabilities are described as an insecure deserialization operation that could allow remote attackers to execute arbitrary code on affected installations, without authentication.
    • “Endpoint Encryption PolicyServer received fixes for eight flaws, including four critical and four high-severity defects.”
  • Per Bleeping Computer,
    • “Cloudflare has confirmed that the massive service outage yesterday was not caused by a security incident, and no data has been lost.
    • “The issue has been largely mitigated. It started 17:52 UTC yesterday [June 12, 2025] when the Workers KV (Key-Value) system went completely offline, causing widespread service losses across multiple edge computing and AI services.
    • “Workers KV is a globally distributed, consistent key-value store used by Cloudflare Workers, the company’s serverless computing platform. It is a fundamental piece in many Cloudflare services, and a failure can cause cascading issues across many components.”
    • “The disruption also impacted other services used by millions, most notably the Google Cloud Platform.”

From the ransomware front,

  • The HIPAA Journal informs us,
    • “It has taken three weeks, but Kettering Health has confirmed that it has resumed normal operations for key services following its May 20, 2025, Interlock ransomware attack. Kettering Health has been releasing regular updates on the progress being made restoring its systems, confirming that the core components of its Epic EHR system were restored on the morning on June 2, 2025, which allowed patient data to be entered, and the backlog of data recorded on paper to start to be entered into patient records.
    • “Interlock’s access to its network and system was immediately terminated when the attack was discovered, and Kettering Health confirmed on June 5, 2025, that all of the ransomware group’s tools and persistence mechanisms had been eradicated from its systems. Kettering Health also confirmed that all systems were fully up to date with the latest versions of software installed and patches applied, and security enhancements had been implemented, including network segmentation, enhanced monitoring, and updated access controls. Kettering Health said it is confident that its cybersecurity framework and employee security training are sufficient to mitigate future risks.”
  • Cybersecurity Dive reports,
    • “Ransomware gangs have exploited a vulnerability in the SimpleHelp remote support program to breach customers of a utility billing software vendor, the Cybersecurity and Infrastructure Security Agency (CISA) warned on Thursday [June 12, 2025].
    • “The government advisory follows an earlier warning from CISA and the FBI that hackers associated with the Play ransomware gang had been targeting critical infrastructure organizations using the flaw in SimpleHelp’s remote management software.
    • “The new CISA alert highlights the risks of vendors not verifying the security of their software before providing it to customers.” * * *
    • “In its Thursday alert, CISA said the breach of the utility payment vendor reflected a “broader pattern” of such attacks.
    • “The agency urged “software vendors, downstream customers, and end users to immediately implement the Mitigations listed in this advisory based on confirmed compromise or risk of compromise.” 
    • “Vendors should isolate vulnerable SimpleHelp instances, update the software and warn customers, according to CISA, while customers should determine whether they are running the SimpleHelp endpoint service, isolate and update those systems and follow SimpleHelp’s additional guidance.’
  • Per Bleeping Computer,
    • “Fog ransomware hackers are using an uncommon toolset, which includes open-source pentesting utilities and a legitimate employee monitoring software called Syteca.
    • “The Fog ransomware operation was first observed last year in May leveraging compromised VPN credentials to access victims’ networks.
    • ‘Post-compromise, they used “pass-the-hash” attacks to gain admin privileges, disabled Windows Defender, and encrypted all files, including virtual machine storage.
    • “Later, the threat group was observed exploiting n-day flaws impacting Veeam Backup & Replication (VBR) servers, as well as SonicWall SSL VPN endpoints.”

From the cybersecurity defenses front,

  • Cybersecurity Dive lets us know,
    • “The threat of cyberattacks represents the most serious challenge for businesses in the coming year, the advisory firm Kroll said in a report published Thursday [June 12, 2025].
    • “Roughly three-quarters of respondents said their cybersecurity and privacy concerns had increased over the past year, with nearly half citing malware and more than a third citing data extortion as specific fears.
    • “Kroll’s survey of 1,200 respondents from more than 20 countries, conducted in February, provides some measure of how businesses are thinking about and dealing with cyber worries as global tensions escalate.”
  • and
    • “Artificial intelligence is poised to transform the work of security operations centers, but experts say humans will always need to be involved in managing companies’ responses to cybersecurity incidents — as well as policing the autonomous systems that increasingly assist them.
    • “AI agents can automate many repetitive and complex SOC tasks, but for the foreseeable future, they will have significant limitations, including an inability to replicate unique human knowledge or understand bespoke network configurations, according to experts who presented here at the Gartner Security and Risk Management Summit.
    • “The promise of AI dominated this year’s Gartner conference, where experts shared how the technology could make cyber defenders’ jobs much easier, even if it has a long way to go before it can replace experienced humans in a SOC.
    • “As the speed, the sophistication, [and] the scale of the attacks [go] up, we can use agentic AI to help us tackle those challenges,” Hammad Rajjoub, director of technical product marketing at Microsoft, said during his presentation. “What’s better to defend at machine speed than AI itself?”
  • Dark Reading explains “Why CISOs Must Align Business Objectives & Cybersecurity. This alignment makes a successful CISO, but creating the same sentiment across business leadership creates a culture of commitment and greatly contributes to achieving goals.”
  • Here is a link to Dark Reading’s CISO Corner.

Thursday report

Photo by Josh Mills on Unsplash

From Washington, DC

  • The Wall Street Journal reports
    • “House Republicans narrowly passed a $9.4 billion rescissions package that includes cuts to foreign aid as well as the entity that funds National Public Radio and the Public Broadcasting Service.
    • “The vote was 214-212, after some last-minute arm-twisting by GOP leaders convinced two Republicans to switch their votes to yes from no. All Democrats were opposed. The package now heads to the Senate, where it could face more scrutiny from Republicans.”
  • Beckers Payer Issues tells us,
    • “Proposed changes to Medicare Advantage are unlikely to be included in a final budget deal, The Hill reported June 11. 
    • “Senators had floated adding provisions of the No UPCODE Act, which targets overpayments in the program, to the massive federal budget bill. 
    • “Sen. Kevin Cramer, R-N.D., who first raised the idea of targeting MA savings in the bill, told The Hill the final legislation is unlikely to touch Medicare.”
  • STAT News informs us,
    • The Trump administration is pushing pharmaceutical companies to begin negotiations to bring their drug prices in line with what other countries pay — usually far less than Americans.
    • “Under President Trump’s direction, HHS is demanding that pharmaceutical companies end their obstruction and come to the table—just as they already do with nearly every other economically comparable nation—to negotiate fair, transparent pricing for Americans,” an agency spokesperson said in a statement to STAT, adding that the companies were “prevent[ing] progress of lowering prices for the American people.”
    • “The spokesperson did not immediately clarify how companies were preventing that progress. The administration’s statement comes after pharmaceutical executives said they were expecting more details about the kinds of drugs that would be up for negotiations and the price targets for them. 
    • ‘It also comes after a number of drug companies have met with the administration. At least three firms said this week that talks have not yet gotten into the details of pricing, instead mostly consisting of exchanging high-level ideas about the pharmaceutical market.”
  • The International Foundation of Employee Benefit Plans points out
    • The Internal Revenue Service (IRS) issued 2025 draft 1094-B, 1095-B, 1094-C, and 1095-C forms for use by employers, plan sponsors and group health insurers to report health coverage to plan members and the IRS.
  • Per MedTech Dive,
    • “Medtronic has recalled ventilators and asked customers to stop using the devices because of a fault linked to two serious injuries and one death, the company said Wednesday.
    • “Affected Newport HT70 and HT70 Plus ventilators can shut down during use or fail to effectively sound the shutdown alert alarm. The company also recalled certain related Newport service parts. There have been 63 medical device reports about the problem.
    • ‘The Food and Drug Administration said in a Class 1 recall database entry about the fault this week that 4,842 affected ventilators are in commerce worldwide.”

From the judicial front,

  • Bloomberg Law reports,
    • A trio of air ambulance providers lost [Dropbox link] an appeals court bid to overturn a decision in two surprise medical bill disputes, narrowing the legal path for physicians to challenge alleged malfeasance from health insurers in court.
    • The consolidated case revolves around two conflicting provisions of the No Surprises Act, which requires doctors and insurers to settle unexpected out-of-network bills via arbitration rather than balance billing the patient. 
    • The US Court of Appeals for the Fifth Circuit’s decision accompanies a separate ruling also issued [Dropbox link] Thursday in which the same panel of judges upheld a lower court’s decision, similarly, asserting that surprise billing arbitration disputes may not be addressed through litigation.
    • The Fifth Circuit sided against air ambulance companies Guardian Flight LLC, Reach Air Medical Services LLC, and Calstar Air Medical Services LLC in the consolidated case challenging Aetna Health Inc., Kaiser Foundation Health Plan Inc., and arbitrator Medical Evaluators of Texas ASO LLC over what the providers said were misrepresentations during the arbitration process. 
    • Judges Stuart Kyle Duncan, a Donald Trump appointee, Jerry E. Smith, a Ronald Reagan appointee, and Edith Brown Clement, a George H. W. Bush appointee, also reversed the lower court’s ruling in determining that MET was protected from litigation under the No Surprises Act.

From the public health and medical research front,

  • CBS News reports,
    • “Check your medicine cabinet — Zicam nasal swabs and Orajel baby teething swabs are being recalled due to potential microbial contamination, according to federal health officials.
    • “In an alert from the U.S. Food and Drug Administration, Church & Dwight Co., Inc., the brands’ manufacturer, voluntarily issued the recall after the potential contamination was discovered, which was identified as fungi in the cotton swab components of the products. 
    • “The recalled products include all lots of Zicam Cold Remedy Nasal Swabs (with UPC 732216301205), all lots of Zicam Nasal AllClear Swabs (UPC 732216301656) and all lots of Orajel Baby Teething Swabs (UPC 310310400002). All other Zicam and Orajel products are not affected by this recall, the FDA said.
    • “Consumers with any recalled products should stop using them immediately, the FDA advised.”
  • Health Imaging notes,
    • “New MRI data suggest that patients who weathered severe cases of COVID-19 may sustain long-lasting heart damage. 
    • “Specifically, researchers have uncovered evidence indicating patients who have been hospitalized with the virus may develop long-term left ventricular systolic dysfunction and coronary microvascular dysfunction. These findings were detailed this week in JAMA Network Open, where experts revealed the damage was evident on imaging nearly one year after patients had recovered from their initial infection. 
    • “In long COVID, or postacute sequelae of SARS-CoV-2 infection (PASC), patients commonly experience cardiopulmonary symptoms, including dyspnea, palpitations, chest pain, and fatigue, which impair quality of life and functional capacity,” Jannike Nickander, MD, PhD, with the department of clinical physiology at Karolinska University Hospital, in Sweden, and colleagues noted. “The underlying pathophysiological mechanisms are not fully understood but may stem from myocardial injury sustained during acute COVID-19 due to hypoxia, systemic hyperinflammation, hypercoagulability, and direct viral invasion of endothelial cells and cardiomyocytes.” 
  • Fierce Healthcare relates,
    • “Urine drug test (UDT) data can generate timely estimates of overdose deaths, a new study suggests. 
    • “The study, published in JAMA Network Open by specialty lab Millennium Health and The Ohio State University, aimed to determine whether UDT data could provide near real-time indications of overdose trends. Effective responses to the overdose crisis must be prompt, the study noted, which requires a timely evaluation of current trends. However, current publicly available data on fatal overdoses in the U.S. can lag by at least six months. 
    • “We were determined to close that gap,” Eric Dawson, vice president of clinical affairs at Millennium Health, told Fierce Healthcare. “We wanted to be able to tell people, here’s what’s happening today with overdoses—compared to here’s what you’re being told today happened six months ago.” 
  • The International Foundation of Employee Benefit Plans offers a new look at virtual care.
    • “What’s next for virtual care? One area of focus is the further development of hybrid solutions that offer virtual-first care coupled with in-person clinics. Many vendors are also introducing their own health plan and/or TPA for a virtual-first solution. These can be offered alongside traditional health plans (e.g., not necessarily as a full replacement offering). Supplemental and/or coordinating carrier care management is also an avenue explored by new digital health startups offering virtual care. Another trend influencing virtual care is the development of artificial intelligence (AI) as a tool and the related ability to become more predictive and proactive around population health management and outreach. It will be important, however, for employers to track how these virtual offerings impact quality outcomes, engagement and positive user experience.
    • “Overall, the opportunity is clear—Virtual care as a component of a broader health care system can provide convenient and efficient care while increasing access and lowering costs for employer populations. Integration with in-person care will always be important, but technological developments will pave the way to create a more seamless patient experience.”

From the U.S. healthcare business front,

  • BioPharma Dive reports,
    • “COVID vaccine maker BioNTech is buying rival CureVac, announcing Thursday an all-stock deal weeks before the two companies were due to face off in a German court over potentially billions of dollars worth of royalties related to intellectual property on messenger RNA drugs.
    • “Per deal terms, each CureVac share will be exchanged for about $5.46 worth of BioNTech’s U.S.-listed shares, valuing the company at $1.25 billion. Upon the deal’s close, CureVac shareholders will own between 4% and 6% of BioNTech.
    • “In the early days of the COVID-19 pandemic, BioNTech and CureVac were among the companies racing to develop the first coronavirus vaccines. BioNTech, however, partnered with Pfizer and won approval of the first COVID-19 shot, while CureVac’s program never made it to market. The two companies have since been embroiled in patent litigation.”
  • Per Healthcare Dive,
    • “Cigna unveiled a number of new digital tools on Thursday meant to improve customer experience with its health benefits portal, including a virtual assistant based on generative artificial intelligence.
    • “The rollout — part of the insurer’s larger push to make it easier for members to access and afford the benefits they’re due — also includes a new tool to match patients to in-network providers.
    • “Experts have raised concerns about rising adoption of AI in the healthcare sector due to the technology’s tendency to make mistakes. Cigna said its new features were developed with “rigorous” research and testing within an AI governance framework.”
  • and
    • “Mergers and acquisitions should play an “important role” in Teladoc’s future business strategy, the virtual care firm’s CEO said Wednesday. 
    • “We’re going to make investments not just for the short term, but things that we think are going to start to increase that [total addressable market], start to increase the scope and range of what we can do. And we think that’s the right place to deploy our capital,” CEO Chuck Divita said at the Goldman Sachs Global Healthcare Conference.
    • “The telehealth company has already completed two acquisitions this year, scooping up preventive care firm Catapult Health in February and virtual mental health provider UpLift last month.”
  • Beckers Hospital Review calls attention to “six hospital partnerships and proposed deals that were called off or unwound so far this year”

Weekend update

From Washington, DC,

  • The Senate maintains a daily Executive Calendar. There are now eight nominees whose names were reported to the Senate floor before Scott Kupor. According to the unanimous consent resolution page in the front of the calendar, the Senate will consider tomorrow the nominations of the earliest reported nominee David Fotouhi (March 13) and two nominees reported in May after Mr. Kupor (April 9). The FEHBlog think that this is the pattern that the Senate leadership is following, which means that the Senate is likely to take up Mr. Kupor’s nomination later this month. 
  • Roll Call summarizes expected Congressional activities for this week here.
    • As Senate committees continue to release their proposals for the House-passed reconciliation package this week, the House plans to vote on President Donald Trump’s proposals to rescind foreign aid and other spending, including for public broadcasting.
    • “The rescissions request sent to Congress by the Trump Administration takes the federal government in a new direction where we actually cut waste, fraud, and abuse and hold agencies accountable to the American people,” House Majority Leader Steve Scalise, R-La., said in a statement.
  • The Supreme Court will be issuing another batch of opinions this coming Thursday.
  • Last Thursday, HR Dive tells us,
    • “A federal appeals court’s “background circumstances” requirement for majority-group plaintiffs who seek to prove job discrimination cuts against both Title VII of the 1964 Civil Rights Act and U.S. Supreme Court precedent, Justice Ketanji Brown Jackson wrote for a unanimous SCOTUS on Thursday.
    • “The court reversed the 6th U.S. Circuit Court of Appeals’ decision in Ames v. Ohio Department of Youth Services, which had dismissed a heterosexual woman’s claim that she was unlawfully passed over for a promotion in favor of a lesbian woman and subsequently demoted, after which a gay man was hired to fill her original role. The plaintiff alleged that those decisions constituted illegal discrimination on the basis of her sexual orientation, which the Supreme Court has said is a form of sex-based discrimination under Title VII.
    • “The 6th Circuit held that the plaintiff could not show background circumstances to support her suspicion that her employer discriminated against her on the basis of her status as a member of a majority group.
    • “Justice Jackson, however, wrote that such requirements flout the Supreme Court’s case law, which “makes clear that the standard for proving disparate treatment under Title VII does not vary based on whether or not the plaintiff is a member of a majority group.”
    • “The court vacated and remanded the case to the 6th Circuit for further proceedings.”
  • Federal News Network interviews Tammy Flanagan about “what retiring feds need to know about their benefits in transition.”
    • “Timing is everything when thinking about when to drop your retirement paperwork. Understanding what happens to your leave balances, health insurance, and survivor benefits can inform that decision. Hear with more on those key considerations is the Founder and Principal Retirement specialist at Retire Federal, Tammy Flanagan.”

From the public health and medical research front,

  • The University of Minnesota’s CIDRAP informs us,
    • “A new gene-tracking study in Nature shows that mpox spread among people in Nigeria for 8 years before it sparked a global outbreak in 2022.
    • “Using genomic tracing, researchers from Nigeria, the United States, Cameroon, Ethiopia, and Belgium estimate that the ancestor of the clade 2 mpox virus (mpxv) that ignited an international outbreak beginning in May 2022 first emerged in southern Nigeria in August 2014 and spread to 11 Nigerian states before human infections were detected in 2017. 
    • “In light of the findings, the authors write, “We need improved surveillance in the wildlife population in the forest systems to better understand the transmission and maintenance of MPXV in animal hosts,” as well as better human surveillance.
    • “We could have very easily prevented the 2022 multi-country outbreak if countries in Africa were given better access to therapeutics, vaccines, and surveillance technologies,” says first author Edyth Parker, PhD, MPhil, a researcher with the Institute of Genomics and Global Health and with the International Biosecurity and Biosafety Initiative for Science, in a Scripps Research news release. “In a vulnerably connected world, we cannot neglect epidemics until they get exported to the Global North.”
  • Medscape offers these reports from the recent American College of Obstetricians and Gynecologists (ACOG) 2025 Annual Meeting.
    • Changing the prescribing protocol for low-dose aspirin (LDA) for preeclampsia prevention from risk-based to universal significantly increased aspirin use in pregnant patients, based on new data presented at the American College of Obstetricians and Gynecologists (ACOG) 2025 Annual Meeting.
    • The use of LDA to reduce the risk for preeclampsia has been well established as an inexpensive and simple intervention, but it has remained underutilized nationwide, said lead author Meryl Y. Grimaldi, MD, of SBH Health System, New York City, in an interview.
    • “Many of the patients we care for at SBH Health are at high risk for preeclampsia, but we wanted to ensure that our eligible patients received the benefits of this intervention,” said Grimaldi, who presented the study at the meeting.
  • and
    • “Clinicians need to discuss and offer all patients a variety of pain management options for in-office gynecologic procedures ranging from intrauterine device (IUD) insertion to biopsies, according to new guidance published by the American College of Obstetricians and Gynecologists (ACOG). The guidelines, published on May 15, are the first formal ones from ACOG to not only acknowledge the range of pain experiences that can be associated with different procedures but also to explicitly lay out recommendations for the conversations providers should have with their patients about what pain management options are available.
    • “This guidance speaks to more than just Ob/Gyns,” Co-Author Genevieve Hofmann, DNP, women’s health nurse practitioner and assistant professor of Ob/Gyn at the University of Colorado School of Medicine in Aurora, Colorado, said during a discussion with the press on May 17 at American College of Obstetricians and Gynecologists (ACOG) Annual Meeting in Minneapolis. “It speaks to any physician who’s providing these types of services and certainly to advanced practice registered nurses who work in women’s health and provide these services.”
  • Medscape adds,
    • Regeneron said on Monday [June 2, 2025,] its experimental drug helped patients preserve up to 51% of lean mass and lose more fat when used in combination with Novo Nordisk’s popular obesity drug Wegovy in a mid-stage trial. 
    • In the 599-patient study, those on Wegovy alone lost about 7.9 pounds of muscle, while those on a combination of Regeneron’s trevogrumab and Wegovy lost up to 4.2 pounds. 
    • The combination helped patients shed up to 11.3% of their body weight compared with 10.4% for those on only Wegovy. 
    • The results mark an early win for Regeneron in the race against nearly a dozen companies to develop obesity treatments that preserve muscle, as they vie for a share of the potential $150 billion weight-loss drug market. 

From the U.S. healthcare business front,

  • Medical Economics “spoke with Mark McClellan, M.D., Ph.D., director, Duke-Margolis Institute for Health Policy, and a former administrator at CMS, about why value-based care hasn’t been adopted more quickly.” and let us know that “New Marit Health data from May, 2025, reveal that physicians feel most satisfied where compensation aligns with cost of living, practice expectations and quality of life. These 10 states show that perceived fairness matters just as much as raw earnings.”
  • The Wall Street Journal reports,
    • Unexpected healthcare costs can arise in retirement, such as uncovered drugs, isolation and concierge care.
    • Medicare Part D may not cover all drugs, potentially leading to high out-of-pocket expenses for uncovered medications.
    • Retirees may face unexpected travel costs for medical care based on retirement location or feel compelled to pay for concierge medical care.
  • All PSHB plans and Most FEHB plans offer Medicare Part D plans which are integrated with the regular plan formulary, thereby reducing one of the Journal’s identified risks.
  • Per BioPharma Dive,
    • “Hiroyuki Okuzawa holds an enviable position. The veteran Daiichi Sankyo executive took over as the Japanese drugmaker’s new CEO two months ago and inherited a company whose cancer medicines have, over the past half-decade, won it three of the pharmaceutical industry’s largest licensing deals.
    • “One of those medicines, the antibody-drug conjugate Enhertu, again took the spotlight at the American Society of Clinical Oncology’s annual meeting here, showing potential to become part of standard therapy for the frontline treatment of advanced breast cancer. It did the same in 2022 and 2024.
    • “Okuzawa can point to Enhertu and four other antibody-drug conjugates Daiichi Sankyo’s developing with AstraZeneca and Merck & Co. as proof of the strength of its research laboratories. By 2030, the company plansto have these five “ADCs” approved across more than 30 tumor types, which would allow it to treat nearly 400,000 cancer patients each year.
    • “We’d like to become one of the most important players in oncology,” said Okuzawa, noting aspirations to crack the top 10 companies by cancer drug sales. “Our senior leaders are now talking about not only top 10, but maybe top 5. We’re very much confident in our ADCs.”
  • Per Fierce Healthcare,
    • Neuroscience technology company Brooklyn Health is using artificial intelligence to target a fundamental problem in neurology and psychiatry: the flawed approach to mental health outcomes measurement.
    • The startup aims to modernize mental health measurement and scoring in central nervous system (CNS) drug development, an area of CNS research that faces limitations in objectivity and standardization. 
    • “Clinical interviews, the standard for symptom assessment, are fundamentally unreliable and imprecise,” said Anzar Abbas, Ph.D., a neuroscientist and founder of Brooklyn Health, in an interview.
    • “Brooklyn’s platform uses AI and digital phenotyping methods it developed to evaluate the quality and scoring of clinical interviews in real time.” * * *
    • “Brooklyn’s current focus in on drug development and central nervous system clinical trials to improve outcome measurement, essentially, how well a drug is working. But the company has ambitions beyond clinical trials to support outcome measurement across all forms of behavioral health delivery, including in-clinic psychiatric care and virtual mental health platforms.” 
  • The Washington Post reports on a smartphone app Death Clock AI that predicts how many years a user has left before beginning to push daisies as they day.

Cybersecurity Saturday

From the cybersecurity policy and law enforcement front,

  • Yesterday, the President issued a cybersecurity executive order. Here is a link to related fact sheet.
  • Federal News Network adds,
    • “President Donald Trump has signed a new cybersecurity executive order that continues many of the policies of his predecessors, while also marking out some key changes in the approach to software security, digital identity and more.
    • “The new executive order, “Sustaining Select Efforts to Strengthen the Nation’s Cybersecurity,” modifies many aspects of a cyber EO signed by President Joe Biden in January. It also makes changes to executive orders signed by President Barack Obama to focus federal cybersecurity law enforcement efforts on foreign nationals.
    • “But Trump’s new EO continues key aspects Biden directives, including an effort to strengthen the Cybersecurity and Infrastructure Security Agency’s role in defending civilian federal networks.” * * *
    • “The latest cybersecurity executive order also maintains federal efforts around post-quantum cryptography, Border Gateway Protocol, and advanced encryption.
    • “But it eliminates the January order’s directive for agencies to require federal software vendors to provide evidence of following secure development practices.
    • “Instead, Trump directs the National Institute of Standards and Technology to establish a new consortium with industry “that demonstrates the implementation of secure software development, security, and operations practices” based on NIST’s Secure Software Development Framework.”
  • Per Cybersecurity Dive,
    • “Trump’s elimination of Biden’s software security requirements for federal contractors represents a significant government reversal on cyber regulation. Following years of major cyberattacks linked to insecure software, the Biden administration sought to use federal procurement power to improve the software industry’s practices. That effort began with Biden’s 2021 cyber order and gained strength in 2024, and then Biden officials tried to add teeth to the initiative before leaving office in January. But as it eliminated that project on Friday, the Trump administration castigated Biden’s efforts as “imposing unproven and burdensome software accounting processes that prioritized compliance checklists over genuine security investments.”
    • “Trump’s order eliminates provisions from Biden’s directive that would have required federal contractors to submit “secure software development attestations,” along with technical data to back up those attestations. Also now eradicated are provisions that would have required the Cybersecurity and Infrastructure Security Agency to verify vendors’ attestations, required the Office of the National Cyber Director to publish the results of those reviews and encouraged ONCD to refer companies whose attestations fail a review to the Justice Department “for action as appropriate.”
  • Cyberscoop reports,
    • “Sean Cairncross laid out his vision to senators Thursday for the Office of the National Cyber Director if he is confirmed to lead it.
    • “A goal of mine is to make sure this office sits at the place that this committee and I believe Congress intended in the statute, and that is to lead cyber policy coordination across the federal government,” he told the Homeland Security and Governmental Affairs Committee at his confirmation hearing.
    • “In doing that, working with our interagency partners is vital,” he said. “We’ve been empowered to work with [the Office of Management and Budget] to ensure that budget alignment among the interagency aligns with administration policy, and I think those tools have to be leveraged, and relationships between us and the interagency — it’s making sure that it is monitored and enforced.”
  • Cybersecurity Dive adds,
    • “Two coalitions of cybersecurity companies, professional associations and experts have endorsed Sean Plankey and Sean Cairncross, President Donald Trump’s nominees to serve as director of the Cybersecurity and Infrastructure Security Agency and national cyber director, respectively.
    • “Plankey and Cairncross’s backers include executives at cybersecurity firms, former senior government officials from administrations of both parties and leaders of trade groups and think tanks.”
  • Per Bleeping Computer,
    • “The U.S. Department of State has announced a reward of up to $10 million for any information on government-sponsored hackers with ties to the RedLine infostealer malware operation and its suspected creator, Russian national Maxim Alexandrovich Rudometov.
    • “The same bounty covers leads on state hackers’ use of this malware in cyber operations targeting critical infrastructure organizations in the United States.
    • “This bounty is posted as part of the Department of State’s Rewards for Justice program established by the 1984 Act to Combat International Terrorism, which rewards informants for tips that help identify or locate foreign government threat actors behind cyberattacks against U.S. entities.”
  • Per Cyberscoop,
    • “Federal authorities on Thursday [June 5, 2025] said they seized $7.74 million from North Korean nationals as they attempted to launder cryptocurrency obtained by IT workers who gained illegal employment and funneled the wages to the North Korean regime.
    • “The allegedly illegally obtained funds were linked to Sim Hyon Sop, a representative of North Korean Foreign Trade Bank, and Kim Sang Man, CEO of Chinyong, an outfit associated with North Korea’s Ministry of Defense, the Justice Department said. Both North Korean nationals were added to the Treasury Department’s Office of Foreign Assets Control’s list of sanctioned individuals in 2023.
    • “The cryptocurrency seizure marks another action in a series of long-running law enforcement efforts to identify and prevent North Korean operatives from gaining employment at companies, evading U.S. sanctions, and sending payroll back to the North Korean government.”
  • Per Security Week,
    • “German authorities have named Russian national Vitaly Nikolaevich Kovalev as the founder and leader of the TrickBot cybercrime gang.”
    • “Established in 2016, the TrickBot group is believed to have infected millions of computers worldwide, exfiltrating sensitive information such as credentials, banking and credit card details, and personal information, while also enabling the deployment of other malware, such as ransomware.
    • “Authorities targeted TrickBot’s infrastructure in takedown attempts in 2020 and 2024 and announced charges and sanctions against over a dozen group members in 2023, including Kovalev, believed at the time to be a senior figure within the cybercrime ring.”

From the cybersecurity vulnerabilities and breaches front,

  • CISA added nine known exploited vulnerabilities to its catalog this week.
  • Bleeping Computer tells us,
    • “A threat actor has re-released data from a 2021 AT&T breach affecting 70 million customers, this time combining previously separate files to directly link Social Security numbers and birth dates to individual users.
    • “AT&T told BleepingComputer that they are investigating the data but also believe it originates from the known breach and was repackaged into a new leak.
    • “It is not uncommon for cybercriminals to repackage previously disclosed data for financial gain. We just learned about claims that AT&T data is being made available for sale on dark web forums, and we are conducting a full investigation,” AT&T told BleepingComputer.”
  • andD
    • “Cisco has released patches to address three vulnerabilities with public exploit code in its Identity Services Engine (ISE) and Customer Collaboration Platform (CCP) solutions.
    • “The most severe of the three is a critical static credential vulnerability tracked as CVE-2025-20286, found by GMO Cybersecurity’s Kentaro Kawane in Cisco ISE. This identity-based policy enforcement software provides endpoint access control and network device administration in enterprise environments.
    • “The vulnerability is due to improperly generated credentials when deploying Cisco ISE on cloud platforms, resulting in shared credentials across different deployments.”
  • Dark Reading informs us,
    • “ClickFix campaigns are gaining steam according to various security researchers, with recent campaigns spotted across the globe from a wide swath of cyberattackers. The increasingly popular tactic represents a significant new evolution for social engineering, researchers say — and enterprises need to take note.
    • “ClickFix activity has been snowballing: Darktrace said yesterday that it recently identified multiple ClickFix attacks across customer environments in Europe, the Middle East, and Africa (EMEA), and in the United States; while SlashNext, in a separate report, detailed an unusual version of the attack vector that impersonates Cloudflare Turnstile, which is the Web protection company’s CAPTCHA-like Turing test. Also, this week, Cofense outlined a campaign that spoofed Booking.com CAPTCHAs, targeting hotel chains with remote access Trojans (RATs) and infostealers.”
  • and
    • The Federal Burau of Investigation (FBI) warned that cybercriminals are compromising Internet of Things (IoT) devices connected to home networks through the BADBOX 2.0 botnet.
    • The BADBOX 2.0 botnet was discovered several months ago after the original BADBOX campaign was disrupted in 2024. Human Security’s Satori Threat Intelligence and Research team, alongside Google, Trend Micro, the Shadowserver Foundation, and others, were able to partially disrupt the “complex and expansive” BADBOX 2.0 operation, noting that it remains the largest botnet of infected connected TV (CTV) devices ever uncovered.
  • Per Cybersecurity Dive,
    • “A financially motivated hacker group has been targeting Salesforce instances for months in a campaign that uses voice phishing to engage in data theft and follow-on extortion attempts, according to Google Threat Intelligence Group
    • “The hackers, whom Google tracks as UNC6040, impersonated IT workers and tricked employees at often English-speaking branches of multinational companies into sharing sensitive credentials that were then used to access the organizations’ Salesforce data, Google said in a blog post published Wednesday.
    • “As part of the social engineering campaign, the hackers tricked workers at these companies into visiting the Salesforce-connected app setup page, at which point the attackers used an unauthorized, malicious version of the Salesforce Data Loader app to access and steal sensitive information from the customers’ Salesforce environments. 
    • “Beyond the immediate data thefts, the hackers were able to move laterally within target networks, accessing victims’ other cloud services and moving into internal corporate networks.”

From the ransomware front,

  • The American Hospital Association warns,
    • “The FBI, Cybersecurity and Infrastructure Security Agency and Australian Cyber Security Centre June 4 released an advisory on updated actions and tactics used by the Play ransomware group. The group, active since 2022, has impacted a wide range of businesses and critical infrastructure in North America, South America and Europe. As of May, the FBI was aware of about 900 victims allegedly exploited by the group’s efforts.
    • “The threat actors are presumed to be a closed group, designed to “guarantee the secrecy of deals,” according to a statement on the group’s data leak website. They employ a double-extortion model that encrypts systems after exfiltrating data. Their ransom notes do not include an initial ransom demand or payment instructions. Instead, victims are instructed to contact the threat actors via email.
    • “Play ransomware was among the most active cyberthreat groups in 2024,” said Scott Gee, AHA deputy national advisor for cybersecurity and risk. “This report highlights their evolving tactics, and health care cybersecurity teams should be aware of the changes.  As threat actors shift tactics, it is critical that network defenders keep pace. The double-layered extortion model and encryption of systems, as well as theft of data, pose a serious potential risk to hospitals and the delivery of health care.”
  • Cybersecurity Dive adds,
    • “Since mid-January, multiple ransomware groups, including initial access brokers affiliated with Play, have targeted vulnerabilities in a remote support tool called SimpleHelp. Researchers disclosed those flaws in January.  
    • “The new advisory updates the government’s original December 2023 warning about the Play ransomware group, which is also known as PlayCrypt. The hackers have previously been blamed for attacks targeting ConnectWise ScreenConnect and Rackspace
    • “The recent attacks exploiting SimpleHelp involve three flaws discovered by security firm Horizon3.ai.”
  • Bleeping Computer lets us know,
    • “Healthcare giant Kettering Health, which manages 14 medical centers in Ohio, confirmed that the Interlock ransomware group breached its network and stole data in a May cyberattack.
    • “Kettering Health operates over 120 outpatient facilities and employs over 15,000 people, including over 1,800 physicians.
    • “The healthcare network noted in a Thursday statement that its network devices have been secured, and its team is now working on re-establishing communication channels with patients disrupted by the outage triggered by last month’s ransomware attack.”
  • Security Week adds,
    • “American media company Lee Enterprises revealed this week that the disruptive cyberattack it dealt with earlier this year resulted in a data breach impacting nearly 40,000 individuals.
    • “Lee Enterprises owns 350 weekly and specialty publications across 25 states, and dozens of them suffered disruptions in February as a result of a ransomware attack that involved the encryption of critical applications and the theft of files.
    • “The company informed the Maine Attorney General’s Office this week that it recently completed its investigation into the incident and determined that personal information was compromised.
    • “According to Lee Enterprises, the attackers may have obtained the information of 39,779 people, including their names and Social Security numbers.
    • “Affected individuals are being offered 12 months of free credit monitoring and identity protection services.”
  • Honeywell lets us know,
    • “In a growing wave of sophisticated cyber threats against the industrial sector, ransomware attacks jumped by 46% from Q4 2024 to Q1 2025, according to Honeywell’s new 2025 Cybersecurity Threat Report. The research also found that both malware and ransomware increased significantly in this period and included a 3,000% spike in the use of one trojan designed to steal credentials from industrial operators.”
    • “To learn more and download the full report, visit our website.”

From the cybersecurity business and defenses front,

  • Cybersecurity Dive reports,
    • “Microsoft and CrowdStrike will lead a cooperative effort to map out the overlapping web of hacker groups that their researchers have disclosed and named, the companies said on Monday. 
    • “Palo Alto Networks and Google and its Mandiant unit have also agreed to join the collaborative effort on streamlining threat group taxonomy.
    • “For years, the companies’ different naming conventions for various criminal and state-linked threat groups have created unnecessary confusion and delays in the sharing of threat intelligence.
    • “Microsoft and CrowdStrike released an initial version of their threat actor matrix on Monday, listing the groups they track and each one’s corresponding aliases from other researchers.
    • “Palo Alto Networks and Google and its Mandiant unit are joining the collaborative effort on streamlining threat group taxonomy.”
  • The Wall Street Journal reports,
    • CrowdStrike swung to a loss in the fiscal first quarter and posted a lower-than-expected outlook, as the costs of its outage last summer continue to weigh on results.
    • “The cybersecurity company said Tuesday its revenue is still being hurt by an incentive program it launched last year to try to retain customers after a widespread software outage in July.
    • “CrowdStrike had implemented a customer-commitment program, which let customers try some products for free, and was weighing on its subscription revenue. The program wrapped up at the end of fiscal-year 2025, but its effects are lingering.”
  • Dark Reading tells us,
    • F5 this week announced the acquisition of Fletch, a San Francisco-based startup with agent-based artificial intelligence (AI) technology that analyzes massive amounts of threat intelligence data and remediates the most severe vulnerabilities in real time.
    • “Terms of the deal were not disclosed, but most of Fletch’s 15 employees have joined F5, which was seeking the technology and expertise to bring agentic AI capabilities to the recently introduced F5 Application Delivery and Security Platform (ADSP).”
  • Help Net Security points out,
    • “Cybersecurity leaders and consultants identified AI-driven automation and cost optimization as top organizational priorities, according to Wipro. 
    • “30% of respondents are investing in AI automation to enhance their cybersecurity operations. AI-driven automation can help in detecting and responding to threatsmore quickly and accurately, thereby reducing the need for extensive manual intervention. 
    • ‘26% of respondents are focusing on tools rationalization. This approach involves evaluating and consolidating duplicate security tools across platforms to eliminate redundancies and improve efficiency while reducing costs. 
    • “Another significant area is security and risk management process optimization, with 23% of organizations targeting this for cost savings. Streamlining these processes can lead to more effective risk management and better allocation of resources. Apart from these priorities, 20% are focusing on simplifying operating models to achieve better visibility and faster response across reduced attack surfaces.”
  • Here is a link to Dark Reading’s CISO Corner.

Cybersecurity Saturday

Cybersecurity policy and law enforcement,

  • Helpnet Security tells us,
    • “NIST has introduced a new way to estimate which software vulnerabilities have likely been exploited, and it’s calling on the cybersecurity community to help improve and validate the method.
    • “The new metric, “Likely Exploited Vulnerabilities” (LEV), aims to close a key gap in vulnerability management: identifying which of the thousands of reported flaws each year are actually being used in real-world attacks.
    • “Organizations typically rely on two main tools for this: the Exploit Prediction Scoring System (EPSS), which estimates the chance of future exploitation, and Known Exploited Vulnerability (KEV) lists like the one maintained by CISA. But both have limits. EPSS is predictive and doesn’t account for past exploitation, while KEV lists are confirmed cases but often incomplete.
    • “LEV aims to bridge that gap by calculating the probability that a vulnerability has been exploited in the past, based on historical EPSS data. It’s a statistical estimate, not a confirmation, which is why the whitepaper emphasizes that LEV is meant to augment, not replace, existing methods.” * * *
    • The researchers outline four key ways LEV could be used:
      • 1. Estimate how many vulnerabilities have been exploited.
      • 2. Check how complete KEV lists are.
      • 3. Identify high-risk vulnerabilities missing from those lists.
      • 4. Fix blind spots in EPSS, which sometimes underestimates risk for already-exploited bugs.
  • Next Thursday, the Senate Homeland Security and Governmental Affairs Committee will hold a confirmation hearing for the following Department of Homeland Security nominees.
    • Sean Cairncross, of Minnesota, to be National Cyber Director, Robert Law, of the District of Columbia, to be Under Secretary for Strategy, Policy, and Plans, James Percival, of Florida, to be General Counsel, Sean Plankey, of Pennsylvania, to be Director of the Cybersecurity and Infrastructure Security Agency, and Kevin Rhodes, of Florida, to be Administrator for Federal Procurement Policy.
  • Federal News Network reports yesterday,
    • “The Trump administration is proposing to cut more than 1,000 positions at the Cybersecurity and Infrastructure Security Agency.
    • “Under the 2026 budget request, CISA would go from approximately 3,732 funded positions today to 2,649 positions next year. The staff reductions are detailed in CISA’s fiscal 2026 budget justification, posted today. They present the most detailed view yet of the Trump administration’s proposal to cut CISA’s budget by nearly $500 million.
    • “The proposed cuts still have to be approved by Congress as part of the 2026 appropriations process. But they come as hundreds of CISA employees have already left under the Trump administration. Meanwhile, more staff could depart through deferred resignations or early retirements offered to DHS staff in April.
    • “The proposed cuts are spread across CISA’s various divisions. CISA’s cybersecurity division would go from 1,267 positions to 1,063 jobs. CISA’s infrastructure security division would go from about 343 positions to 325 jobs.”
  • Dark Reading informs us,
    • “The Cybersecurity and Infrastructure Security Agency (CISA) and Australian Cyber Security Centre (ACSC) released new guidance this week on procuring, implementing, and maintaining security information and event management (SIEM) and security orchestration, automation, and response (SOAR) platforms.
    • “SIEM and SOAR help organizations collect and analyze data from firewalls, endpoints, and applications to better detect and respond to cybersecurity incidents. However, many organizations encounter significant implementation and deployment challenges, including significant costs and ongoing maintenance requirements. The guidance noted these are not “set it and forget it” tools.
    • “These platforms are becoming more essential as organizations store and manage an influx of data that is highly attractive to attackers, particularly personally identifiable information and personal health information. Additionally, increasing infrastructure complexity is creating gaps in visibility and making threat detection more difficult. There are more endpoints to secure, more applications, more third-party vendors, and more remote workers for attackers to exploit.”  
  • Per HHS Office for Civil Rights news releases,
  • and
    • “Today [May 30, 2025], the U.S. Department of Health and Human Services (“HHS”), Office for Civil Rights (“OCR”) announced a settlement with Comstar, LLC (“Comstar”), a Massachusetts company that provides billing, collection, and related services to non-profit and municipal emergency ambulance services, concerning potential violations of the Health Insurance Portability and Accountability Act of 1996 (HIPAA) Security Rule. The settlement resolves an OCR investigation concerning a ransomware breach that affected 585,621 individuals.”
    • “Under the terms of the settlement, Comstar agreed to implement a corrective action plan that OCR will monitor for two years, and paid OCR $75,000.”
    • “The resolution agreement and corrective action plan may be found at: https://www.hhs.gov/hipaa/for-professionals/compliance-enforcement/agreements/hhs-hipaa-agreement-comstar/index.html.”
       
  • Cybersecurity Dive points out,
    • “U.S. authorities on Thursday [May 28, 2025] charged 16 defendants in a massive global operation to disrupt the Russia-based cybercrime group behind the DanaBot malware. 
    • “DanaBot infected more than 300,000 computers around the world, facilitating fraud and ransomware and resulting in more than $50 million in damage, according to federal prosecutors. The U.S. coordinated with multiple foreign governments and private cybersecurity firms to dismantle the botnet operators’ infrastructure.
    • “The Department of Justice charged Aleksandr Stepanov, 39, a.k.a. “JimmBee,” with conspiracy, conspiracy to commit wire and bank fraud and additional charges. Artem Aleksandrovich Kalinkin, 34, a.k.a. “Onix,” was charged with conspiracy to gain unauthorized access to a computer to gain information and to defraud, among additional charges. 
  • Bleeping Computer lets us know,
    • The Federal Criminal Police Office of Germany (Bundeskriminalamt or BKA) claims that Stern, the leader of the Trickbot and Conti cybercrime gangs, is a 36-year-old Russian named Vitaly Nikolaevich Kovalev.
    • “The subject is suspected of having been the founder of the ‘Trickbot’ group, also known as ‘Wizard Spider,'” BKA said last week [English PDF], after another round of seizures and charges part of Operation Endgame, a joint global law enforcement action targeting malware infrastructure and the threat actors behind it.
    • “The group used the Trickbot malware as well as other malware variants such as Bazarloader, SystemBC, IcedID, Ryuk, Conti and Diavol.
    • “Kovalev is now also wanted in Germany, according to a recently issued Interpol red notice saying he was charged with being the ringleader of an unnamed criminal organization.”
  • and
    • “An international law enforcement operation has taken down AVCheck, a service used by cybercriminals to test whether their malware is detected by commercial antivirus software before deploying it in the wild.
    • “The service’s official domain at avcheck.net now displays a seizure banner with the crests of the U.S. Department of Justice, the FBI, the U.S. Secret Service, and the Dutch police (Politie).
    • “According to an announcement on the Politie website, AVCheck was one of the largest counter antivirus (CAV) services internationally, which helped cybercriminals assess the stealthiness and evasion of their malware.
    • “Taking the AVCheck service offline marks an important step in tackling organized cybercrime,” stated Politie’s Matthijs Jaspers.
    • “With this [action], we disrupt cybercriminals as early as possible in their operations and prevent victims.”
  • USA Today reports,
    • “An Iranian national pleaded guilty for his role in an international ransomware scheme that targeted the computer networks of Baltimore and other U.S. cities, disrupting services and causing tens of millions of dollars in losses, federal authorities said.
    • “Sina Gholinejad, 37, pleaded guilty May 27 to one count of computer fraud and abuse and one count of conspiracy to commit wire fraud, the Justice Department said in a news release. Gholinejad was arrested Jan. 10 at Raleigh-Durham International Airport in North Carolina, federal court records show.
    • “He faces a maximum penalty of 30 years in prison and is set to be sentenced in August, the Justice Department announced.”

From the cybersecurity vulnerabilities and breaches front,

  • Cybersecurity Dive informs us,
    • “A previously unknown team of Russian government-backed hackers is targeting critical infrastructure organizations in multiple sectors to collect intelligence for Moscow, Microsoft and the Dutch government said in separate reports published Tuesday.
    • “The group, which Microsoft calls Void Blizzard and the Dutch intelligence services call Laundry Bear, has been using stolen credentials and automated bulk-email collection from cloud services to scoop up data on NATO member states and Ukraine.
    • “Void Blizzard’s cyberespionage operations tend to be highly targeted at specific organizations of interest to the Russian government, including in government, defense, transportation, media, non-governmental organizations (NGOs), and healthcare sectors primarily in Europe and North America,” Microsoft said in a blog post.”
  • and
    • “A “highly targeted” spearphishing campaign is attempting to ensnare financial executives at banks, investment firms, energy utilities and insurance companies around the world, Trellix said in a report published Wednesday.
    • “The malicious emails are rigged with installers that allow the hackers to remotely access victim computers.
    • “With this amount of access to legitimate accounts, attackers could steal files or initiate fraudulent money transfers, potentially without raising red flags.”
  • and
    • “ConnectWise is investigating suspicious activity — likely associated with a nation-state actor — affecting a limited number of customers that use ScreenConnect. 
    • “In a post on its website, ConnectWise said it has notified all affected customers, alerted law enforcement to the attack and retained Mandiant to help with its investigation. 
    • “A company spokesperson added that ConnectWise issued a patch for ScreenConnect, implemented enhanced monitoring and hardening measures across its environment.” 
  • and
    • “More than 9,000 ASUS routers have been compromised in a months-long hacking campaign that researchers from GreyNoise warn may be a prelude to the creation of a botnet.
    • “Hackers are breaching routers through brute-force login attempts and authentication bypasses that rely on a command injection vulnerability, tracked as CVE-2023-39780, to execute system commands, GreyNoise researchers said in a blog post on Wednesday.
    • “GreyNoise first detected suspicious activity in March, when it flagged three suspicious HTTP POST requests made to ASUS routers, according to Matthew Remacle, senior researcher at GreyNoise.
    • “ASUS released a patch for the vulnerability in a recent firmware update, but the initial bypass attempts have not received CVEs, according to GreyNoise. In addition, researchers say, if a router was compromised before the firmware was updated, a backdoor will still remain on the devices unless secure shell protocol access is explicitly disabled.” 
  • Per Cyberscoop,
    • “As the internet fills up with clips from AI-video generators, hacking groups are seeding the online landscape with malware-laced programs and fake websites hoping to cash in on the trend.
    • “Tracked by researchers at Mandiant and Google Cloud, the campaign is being carried out by a group identified as “UNC6032.” Since mid-2024, they have spread thousands of advertisements, fake websites and social media posts promising victims access to popular prompt-to-video AI generation tools like Luma AI, Canva Dream Lab and Kling AI.
    • “Those promises lead to phishing pages and malware, with the group deploying infostealers and backdoors on victim devices. Compromised parties saw their login credentials, cookies, credit card data and in some cases Facebook information stolen, and the scheme appears to be impacting a wide range of industries and geographic areas.”
  • CISA did not add any known exploited vulnerabilities to its catalog this week.

From the ransomware front,

  • Dark Reading tells us,
    • “Extortionist-cum-information broker “Everest Group” has pulled off a swath of attacks against large organizations in the Middle East, Africa, Europe, and North America, and is now extorting victims over records stolen from their human resources departments.
    • “This May, the long-overlooked threat actor advertised nine new cyberattacks. Victims ranged from healthcare organizations to construction and facilities management companies. But its biggest win came against Coca-Cola, from which it stole records associated with hundreds of employees, including their personally identifying information (PII) like names and addresses, salary records, and scans of passports and visas.
    • “In each of these leaks, researchers from VenariX found files relating to SAP SuccessFactors, SAP’s cloud-based HR management platform. The researchers believe the attacks to be legitimate and estimate that initial access in each case likely occurred through a third-party SAP service provider called “INK IT Solutions.”
  • The Hacker News notes,
    • “The threat actors behind the DragonForce ransomware gained access to an unnamed Managed Service Provider’s (MSP) SimpleHelp remote monitoring and management (RMM) tool and then leveraged it to exfiltrate data and drop the locker on multiple endpoints.
    • “It’s believed that the attackers exploited a trio of security flaws in SimpleHelp (CVE-2024-57727, CVE-2024-57728, and CVE-2024-57726) that were disclosed in January 2025 to access the MSP’s SimpleHelp deployment, according to an analysis from Sophos.
    • “The cybersecurity company said it was alerted to the incident following a suspicious installation of a SimpleHelp installer file, pushed via a legitimate SimpleHelp RMM instance that’s hosted and operated by the MSP for their customers.”
    • The threat actors have also been found to leverage their access through the MSP’s RMM instance to collect information from different customer environments about device names and configuration, users, and network connections.
  • Fortra tells us what we need to know about Interlock ransomware.
  • Per Bleeping Computer,
    • “Threat actors linked to lesser-known ransomware and malware projects now use AI tools as lures to infect unsuspecting victims with malicious payloads.
    • “This development follows a trend that has been growing since last year, starting with advanced threat actors using deepfake content generators to infect victims with malware.
    • “These lures have become widely adopted by info-stealer malware operators and ransomware operations attempting to breach corporate networks.
    • “Cisco Talos researchers have discovered that the same technique is now followed by smaller ransomware teams known as CyberLock, Lucky_Gh0$t, and a new malware named Numero.
    • “The malicious payloads are promoted via SEO poisoning and malvertising to rank them high in search engine results for specific terms.”
  • Per CFO Dive,
    • “About one in four companies targeted in a ransomware incident in the last year did not get all their data back after paying the attacker, cybersecurity firm Delinea said in a report released Wednesday.
    • “Delinea also found that most ransomware today includes data-theft extortion, with 85% of victims saying they were threatened with having their data published or sold.
    • “Paying the ransom doesn’t always bring the desired results,” Delinea said in the report.”

From the cybersecurity business and defenses front,

  • Dark Reading notes,
    • Tenable Security has announced plans to acquire Apex, an Israel-based startup specializing in security solutions driven by artificial intelligence (AI). Apex will be integrated into Tenable One, Tenable’s software-as-a-service-based exposure management platform.
    • “Founded in 2023, Apex helps organizations discover ungoverned AI. Co-founders Matan Derman (CEO) and Tomer Avni (chief product officer) developed a platform designed to surface all AI activities, including shadow apps, AI-generated code, and fake identities. The boutique company of roughly 20 employees competes with Prompt Security, Lasso Security, and Aim Security.”
  • Per Cyberscoop,
    • Zscaler announced Tuesday its intention to acquire Red Canary, a company known for Managed Detection and Response (MDR) services, to boost its ability to integrate artificial intelligence, automation and human expertise into its security offerings. 
    • “The acquisition is positioned around the convergence of Zscaler’s data-driven, AI-centric cloud security and Red Canary’s decade of operational expertise in MDR. Zscaler’s executive leadership emphasizes the blending of large-scale data intelligence and automated, agentic Security Operations Centers (SOCs) with the capabilities of ThreatLabz, its security research division.
    • “The proposed acquisition of Red Canary is a natural expansion of our capabilities into managed detection and response and threat intelligence to accelerate our vision of AI-powered SOC of the future,” Jay Chaudhry, CEO and founder of Zscaler, said in a press release. “By integrating Red Canary with Zscaler, we will deliver to our customers the power of a fully integrated Zero Trust platform and AI-powered security operations.”
  • Dark Reading lets us know,
    • “Chief information security officers (CISOs) are being paid better than ever, more likely to be an executive — or report directly to an executive — and have expanding responsibilities. Yet tight security budgets continue to be a major challenge.
    • “Overall, the top cybersecurity professional is doing well at large companies and has proven their value but continually has to work to link security to business opportunities rather than costs, according to two surveys published this week.
    • “The average CISO at large US companies — those with revenue of $1 billion or more — has a current compensation of $532,000, including base salary, bonuses, and equity benefits, according to survey data published by cybersecurity consultancy IANS Research on May 29. Increasing responsibilities come with the high salaries, with CISOs now often charged with assessing business risk, product security, and digital strategy.
  • Per Dark Reading explains why “A Defense-in-Depth Approach for the Modern Era By integrating intelligent network policies, zero-trust principles, and AI-driven insights, enterprises can create a robust defense against the next generation of cyber threats.”
  • Here is a link to Dark Reading’s CISO Corner.

Tuesday Report

From Washington, DC

  • Federal News Network interviews Bloomberg Government deputy news director Loren Duggan about what’s next for the Big Beautiful Bill Act.
  • Per a Senate press release,
    • Senate Judiciary Committee Chairman Chuck Grassley (R-Iowa) joined Sens. John Cornyn (R-Texas) and Amy Klobuchar (D-Minn.) to introduce the Don’t Sell My DNA Act to safeguard consumers’ sensitive genetic data during corporate bankruptcy proceedings.
    • The Don’t Sell My DNA Act strengthens consumer privacy protections by:
      • Modernizing the Bankruptcy Code to include genetic information in the definition of “personally identifiable information”;
      • Requiring written notice and affirmative consumer consent prior to the use, sale or lease of genetic information during bankruptcy proceedings; and
      • Requiring the trustee or debtor in possession of genetic information to permanently delete any data not subject to a sale or lease.
    • “Consumers should feel confident that any personal information shared with a public company isn’t up for grabs when that company files for bankruptcy,” Grassley said. “This bill would fill gaps in current law to help safeguard consumers’ genetic information and ensure Americans’ DNA isn’t treated like any other financial asset.”
  • The American Hospital Association lets us know,
    • Department of Health and Human Services Secretary Robert F. Kennedy Jr. May 27 announced in a post on X that the Centers for Disease Control and Prevention would no longer recommend the COVID-19 vaccine for healthy children and pregnant women. 
  • Per Fierce Healthcare,
    • “The Centers for Medicare & Medicaid Services (CMS) Innovation Center announced Monday it is extending three tracks within the Kidney Care Choices (KCC) Model through 2027.
    • “Starting in performance year 2026, the model’s financial methodology and participation options will be modified to “improve model sustainability,” the agency said. However, one KCC Model track will be shuttered a year early at the end of December.
    • “The KCC Model has 93 participants, and implementation first began in January 2022. The most recent participants were announced Jan. 15.”
  • The Equal Employment Opportunity Commission announced last week
    • The EEOC collects workforce data from employers with more than 100 employees (lower thresholds apply to federal contractors). Employers meeting the reporting thresholds have a legal obligation to provide the data; it is not voluntary.  * * *
    • The 2024 EEO-1 Component 1 data collection opened on Tuesday, May 20, 2025. The deadline to file the 2024 EEO-1 Component 1 report is Tuesday, June 24, 2025.
    • “As part of EEOC Acting Chair Lucas’ efforts to identify continued cost savings for the American public, there will be a shorter collection period during which filers may submit their 2024 reports. The collection period will not extend beyond the Tuesday, June 24, 2025 “Published Due Date” deadline. Additionally, beginning with the 2024 EEO-1 Component 1 data collection, all communications sent to filers will be electronic.” * * *
    • “Filers should visit the dedicated EEO-1 Component 1 website at www.eeocdata.org/eeo1
      to access the EEO-1 Component 1 Online Filing System (OFS), to find supplementary resource materials such as the 2024 EEO-1 Component 1 Instruction Booklet and 2024 EEO-1 Component 1 Data File Upload Specifications, and to get the latest updates. Filers needing additional assistance can access the Filer Support Team Message Center upon logging into the OFS.”

In Food and Drug Administration News,

  • The American Hospital Association News tells us,
    • “The Food and Drug Administration has identified a Class I recall of certain lots of BD esophagogastric balloon tamponade tubes due to the potential for serious injury or death. BD said it became aware of some users encountering challenges removing the plastic plugs from the rubber lumen to inflate the balloons. BD and their subsidiary C.R. Bard Urology and Critical Care sent all affected customers a letter with updated use instructions. There have been two serious injuries, and one death associated with the issue.”
  • Per Fierce Pharma,
    • Despite facing ongoing legal pressure from its rival United Therapeutics, Liquidia has successfully landed a pair of long-awaited FDA approvals for its dry powder formulation of treprostinil.
    • The FDA has cleared treprostinil—also known by the trade name Yutrepia—to improve exercise ability in adults with pulmonary arterial hypertension (PAH) and pulmonary hypertension associated with interstitial lung disease (PH-ILD).
  • and
    • The FDA has also approved Sanofi’s meningococcal vaccine MenQuadfi for use in infants as young as 6 weeks, multiple news outlets reported Tuesday. The shot was already cleared to protect against four prolific strains of meningococcal bacteria in individuals as young as 2 years and older.
    • The FDA based its decision on data from three phase 3 trials that found MenQuadfi worked as well as GSK’s rival meningococcal vaccine Menveo when given with other routine vaccines in children between the ages of 6 weeks to 19 months, Reuters pointed out. Sanofi’s trials enrolled more than 6,000 participants.
  • BioPharma Dive reports,
    • “A patient who received an experimental gene therapy developed by Rocket Pharmaceuticals has died following treatment, the company disclosed Tuesday.
    • “According to Rocket, the patient experienced what’s known as capillary leak syndrome, where plasma and proteins seep from blood vessels into surrounding tissue, and later died from an acute systemic infection.
    • “The Food and Drug Administration ordered the study’s halt Friday, while Rocket works with clinical trial monitors and other experts to investigate the cause. The company said it is focusing on a “novel immune suppression agent” it recently added to a pre-treatment preparatory regimen.”

From the judicial front,

  • The American Medical Association informs us,
    • “In a win for the nation’s youth—and all Americans’ health—the U.S. Supreme Court has ruled (PDF) that the Food and Drug Administration (FDA) did not act in an arbitrary and capricious manner when it told applicants that they could not put certain flavored e-cigarette liquids on the shelf.
    • “The unanimous decision overturned a 5th U.S. Circuit Court of Appeals ruling. Had that appellate-court ruling been allowed to stand, companies could have marketed products that clearly were designed to appeal to children, with names such as “Jimmy the Juice Man Peachy Strawberry,” “Suicide Bunny Mother’s Milk and Cookies,” “Pink Lemonade,” “Iced Pineapple Express” and “Killer Kustard Blueberry.”
    • “Justice Samuel A. Alito Jr., who wrote the opinion for the court, said the FDA did not act arbitrarily and capriciously when it denied the companies’ applications for premarket approval of the tobacco products. The companies challenged the agency’s decision arguing that, among other things, that the FDA didn’t give them fair notice about the evidentiary and comparative requirements used during the application stage and that the agency had changed its position on scientific evidence. 
    • “The high court remanded the case to the 5th Circuit to review other legal arguments, so this is not the end of the litigation, but it is a favorable step forward. The 5th Circuit’s decision was an outlier among the federal circuits that have considered similar cases.”
  • Per Govexec,
    • “At least one agency’s staff impacted by the mass dismissals of probationary workers can pursue their reinstatements as a class, the panel that hears federal employees’ challenges to firings has for the first time ruled, creating a new path for sweeping reversals of those terminations. 
    • “Hundreds of recently hired and subsequently fired employees at the Homeland Security Department will be part of a class action alleging their dismissals were unlawful after a Merit Systems Protection Board administrative judge granted the request. The DHS ruling was the first to come down after a consortium of lawyers filed similar challenges on behalf of fired probationary employees at 20 federal agencies
    • “I find that a class appeal is the fairest and most efficient way to adjudicate the appeal and that the putative class counsel and named appellants will adequately represent the interests of the parties,” said Sara Snyder, the chief administrative judge for MSPB’s western regional office.” 

From the public health and medical research front,

  • CBS News reports,
    • Cases of the new COVID-19 variant NB.1.8.1, linked to a large surge in China, have been detected in multiple locations across the United States, according to the Centers for Disease Control and Prevention. The earliest cases in the U.S. date back to late March and early April, and were detected through a screening program at airports for arriving international travelers.
    • “CDC is aware of reported cases of COVID-19 NB.1.8.1 in China and is in regular contact with international partners,” a CDC spokesperson said in a statement last week.
    • The spokesperson said that, so far, too few U.S. sequences have been reported of NB.1.8.1 to be included in the agency’s variant estimates dashboard.
    • But hospitalizations abroad have raised questions about the new variant, its symptoms and more.
    • Answers to those questions may be found in the CBS News article.
  • ABC News adds,
    • “More than five years after the first cases of COVID-19 were detected in the United States, hundreds of people are still dying every week.
    • “Last month, an average of about 350 people died each week from COVID, according to data from the Centers for Disease Control and Prevention (CDC).” * * *
    • “The experts said there are a few reasons why people might still be dying from the virus, including low vaccination uptake, waning immunity and not enough people accessing treatments.” * * *
    • CDC data shows that those aged 75 and older currently have the highest rate of COVID-19 deaths at 4.66 per 100,000.”
  • The American Medical Association let us know what doctors wish their patients knew about lung cancer screening.
  • The Washington Post relates,
    • “Engagement with digital technology was associated with a 58 percent reduced risk of cognitive impairment in people middle-aged and older, according to a study in the journal Nature Human Behavior.
    • “Researchers conducted a systematic review of 57 studies to see whether exposure to technology has helped or harmed cognition among the first generation of adults with prolonged exposure to digital devices such as smartphones, tablets and computers. The studies involved more than 411,000 adults with an average age of 69.
    • “The analysis revealed that technology could play a role in preserving brain function, not worsening it, said co-authors Jared Benge, a clinical neuropsychologist at the University of Texas at Austin’s Dell Medical School, and Michael Scullin, an associate professor of psychology and neuroscience at Baylor University.”
  • Per Medscape,
    • “Herpes simplex virus 1 (HSV-1) infection is associated with an increased risk of developing Alzheimer’s disease (AD), but treating the viral infection may offer protection, a new study found.
    • “In a matched case-control study of nearly 700,000 older adults, HSV-1 was more common in those with AD, and antiviral therapy for HSV-1 was associated with a lower risk of developing AD.
    • “However, the authors and outside experts cautioned that no firm conclusions can be drawn from this observational study and called for more research.
    • “The study was published online on May 20 in BMJ Open. It was funded by Gilead Sciences, which is actively involved in the research and development of treatments for HSV.”
  • The Wall Street Journal points out,
    • Good posture improves circulation, respiration, digestion and bladder function. It also enhances cognitive ability and mood.
    • To improve posture, become aware of your body position, stand against a wall to align yourself, and perform dynamic stretching exercises.
    • Upright posture is associated with confidence, self-esteem, and reduced anxiety. Physical therapists can help develop personalized plans to improve posture.

From the U.S. healthcare business front,

  • Fair Health released today a claims-based analysis of GLP-1 drugs and obesity. Beckers Hospital Review summarizes this analysis here.
  • The Wall Street Journal considers the price outlook for GLP-1 drugs used to treat obesity.
  • Fierce Pharma tells us,
    • “After a fourth quarter in which revenue boomed throughout the biopharma industry, there were reversals for several drugmakers in the first three months of 2025. 
    • “The companies that took the biggest hits were in the United States, where there is already considerable angst in the industry over the tariff threats and drug price-slashing aspirations of President Donald Trump, along with the unsettling prospects of having a pharma adversary, Robert F. Kennedy Jr., heading up the Department of Health and Human Services.
    • “Among the top 25 revenue companies in the industry in Q1, there were seven that saw year-over-year sales declines, all from the U.S. Viatris took the biggest hit at 11%, followed by Pfizer (-8%), Organon (-7%), Bristol Myers Squibb (-6%), Regeneron (-4%), Merck (-2%) and Gilead (-0.3%).”
  • Per BioPharma Dive,
    • “Eli Lilly is wagering up to $1 billion on a private biotechnology company developing new, non-opioid pain drugs that have already caught the attention of other large pharmaceutical firms.
    • “Per an announcement Tuesday, Lilly plans to acquire SiteOne Therapeutics in an all-cash deal. The companies aren’t disclosing how much money is being exchanged upfront or when they expect the transaction to close. But, if SiteOne’s research programs hit certain regulatory and commercial goals, the amount paid to its shareholders could reach that 10-figure mark.”
  • and
    • “Biogen is partnering with RNA drug developer City Therapeutics to develop a better way of reaching an unspecified target that “mediates key central nervous system diseases.” Biogen will pay City, a startup that launched publicly late last year, $16 million in upfront fees and invest another $30 million in convertible notes that could later become a minority stake. “With this effort, we are further expanding the modalities in our R&D toolbox to potentially reach our targets of interest more precisely by adding an RNAi-based approach,” Biogen research head Jane Grogan said in a statement.”
  • Per an Institute for Clinical and Economic Review news release,
    • ICER today released a Draft Evidence Report assessing the comparative clinical effectiveness and value of apitegromab(Scholar Rock Holdings), nusinersen (Spinraza®, Biogen), onasemnogene abeparvovec-xioi (Zolgensma®, Novartis), and risdiplam (Evrysdi®, Genentech) for spinal muscular atrophy (SMA).
    • “This preliminary draft marks the midpoint of ICER’s eight-month process of assessing this treatment, and the findings within this document should not be interpreted to be ICER’s final conclusions.”
  • Beckers Health IT discusses why Texas Health is taking a loss on its hospital at home program and summarizes Medscape’s list of telehealth friendly states which Utah leads.
  • Beckers Clinical Leadership identifies the 24 U.S. hospitals that have received the American Nurses Credentialling Center’s Magnet with Distinction award. “The Magnet with Distinction program was created as a special designation to celebrate hospitals and healthcare organizations that exceed scoring thresholds required to earn Magnet recognition.”
  • The Wall Street Journal reports,
    • “AI-powered ambient-listening technology is expanding in healthcare, documenting doctor-patient encounters.
    • “AI scribes save doctors time on documentation, reducing burnout and improving focus on patients, according to pilot programs.
    • “Concerns exist around patient privacy, data security and costs, but patient feedback has been largely positive.”
  • Fierce Healthcare offers insights into how Anthem Blue Cross is growing its behavioral health network in California.
    • “The insurer’s network is built on partnerships with multiple organizations, with recent additions including Headway, Rula and Octave. Through its relationship with these firms, the insurer is seeking to make it simpler for members to find providers that meet their unique needs.
    • “Through Headway, the insurer connects employers and plan members with personalized services. Rula, meanwhile, makes it easier for members to schedule an appointment with one of the more than 10,000 providers in its network.
    • “Octave, similarly, is built to make it simple for members to find a provider across multiple specialties, backgrounds and evidence-based approaches, according to the announcement.”
  • NIST explains for those interested how an MRI machine works.

Cybersecurity Saturday

From the cybersecurity policy and law enforcement front,

  • Cyberscoop tells us,
    • “A bipartisan Senate duo is reintroducing legislation Thursday that would establish an executive branch panel to align conflicting cybersecurity regulations on the private sector.
    • “Michigan Sen. Gary Peters, the top Democrat on the Homeland Security and Governmental Affairs Committee, is bringing back the Streamlining Federal Cybersecurity Regulations Act with co-sponsor James Lankford, R-Okla.
    • “By reducing the number of duplicative or burdensome reporting requirements, we can give businesses the tools to better secure our critical infrastructure against the serious threat of cyberattacks,” Peters said about the reintroduction of the bill, which CyberScoop is first reporting. “This legislation ensures federal agencies can work collaboratively to create effective cybersecurity standards, enabling businesses to focus on safeguarding their systems rather than navigating a maze of conflicting requirements.”
  • and
    • “A bipartisan pair of senators is taking another shot at legislation that would require federal government contractors to follow National Institute of Standards and Technology guidelines on vulnerability disclosure policies.
    • “The Federal Contractor Cybersecurity Vulnerability Reduction Act from Sens. Mark Warner, D-Va., and James Lankford, R-Okla., advanced out of the chamber’s Homeland Security and Governmental Affairs Committee last November but never got a full floor vote.
    • “The companion bill from Reps. Nancy Mace, R-S.C., and Shontel Brown, D-Ohio, meanwhile, was reintroduced in January and passed the House in March.
    • “The re-do from Warner and Lankford would make sure government contractors have the same legal obligations that federal agencies do in abiding by NIST’s recommendations on vulnerability disclosure policies. With VDPs, organizations can receive unsolicited reports on software vulnerabilities and patch them before an attack occurs.” 
  • Per a Cybersecurity and Infrastructure Security Agency news release,
    • The Cybersecurity and Infrastructure Security Agency (CISA) is proud to announce the appointment of Madhu Gottumukkala as its new Deputy Director. In this role, he will help lead CISA’s mission to understand, manage, and reduce risk to the cyber and physical infrastructure that the American people rely on every day. 
    • Prior to his appointment as the CISA Deputy Director, Dr. Gottumukkala served as Commissioner and Chief Information Officer for South Dakota’s Bureau of Information and Technology, overseeing statewide technology and cybersecurity initiatives. He assumed this role after serving as South Dakota’s second-ever chief technology officer, focused on innovation through the adoption of emerging technologies, while increasing efficiency by replacing outdated legacy systems.
    • “I am honored to be appointed by Secretary Noem to serve as Deputy Director of CISA. As a former state and local leader, I have seen firsthand the exceptional work CISA does in advancing our nation’s cybersecurity and infrastructure resilience,” said Gottumukkala. “I look forward to building on that foundation by fostering collaboration and strengthening resilience across all levels of government and the private sector. Together, through trusted partnerships, transparency, and shared responsibility, we can better manage systemic risks and safeguard the critical functions that ensure our nation’s safety and prosperity.”
  • Cybersecurity Dive reports,
    • “Microsoft’s Digital Crimes Unit (DCU) on Wednesday [May 21] announced an international operation to disrupt Lumma Stealer, a variant of infostealing malware that is popular with criminal gangs and other threat actors worldwide. 
    • “Hackers have used Lumma to steal passwords, credit cards, bank account information and cryptocurrency wallets in major attack campaigns in recent years, Steven Masada, assistant general counsel at Microsoft’s DCU, said in a blog post.
    • “Between March 16 and May 16, Microsoft identified more than 394,000 Windows computers infected with Lumma. After obtaining a court order from the U.S. District Court for the Northern District of Georgia, Microsoft seized 2,300 domains that formed the backbone of Lumma’s infrastructure. The U.S. Department of Justice also seized Lumma’s central command structure and disrupted online marketplaces that sold Lumma.”
  • Here is a link to a related CISA advisory.

From the cybersecurity vulnerabilities and breaches front,

  • CISA added seven known exploited vulnerabilities to its catalog this week.
    • May 19, 2025
      • CVE-2025-4427 Ivanti Endpoint Manager Mobile (EPMM) Authentication Bypass Vulnerability
      • CVE-2025-4428 Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability
      • CVE-2024-11182 MDaemon Email Server Cross-Site Scripting (XSS) Vulnerability
      • CVE-2025-27920 Srimax Output Messenger Directory Traversal Vulnerability
      • CVE-2024-27443 Synacor Zimbra Collaboration Suite (ZCS) Cross-Site Scripting (XSS) Vulnerability
      • CVE-2023-38950 ZKTeco BioTime Path Traversal Vulnerability
        • Ivanti discusses its KVEs here.
        • Cyber Press discusses the MDaemon KVE here.
        • TechTarget discusses the Srimax KVE here.
        • Syscan discusses the Synacor KVE here.
    • May 22, 2025
      • CVE-2025-4632 Samsung MagicINFO 9 Server Path Traversal Vulnerability
        • The Hacker News discusses this KVE here.
  • On May 21, released a joint cybersecurity advisory which
    • highlights a Russian state-sponsored cyber campaign targeting Western logistics entities and technology companies. This includes those involved in the coordination, transport, and delivery of foreign assistance to Ukraine. Since 2022, Western logistics entities and IT companies have faced an elevated risk of targeting by the Russian General Staff Main Intelligence Directorate (GRU) 85th Main Special Service Center (85th GTsSS), military unit 26165—tracked in the cybersecurity community under several names (see “Cybersecurity Industry Tracking”). The actors’ cyber espionage-oriented campaign, targeting technology companies and logistics entities, uses a mix of previously disclosed tactics, techniques, and procedures (TTPs). The authoring agencies expect similar targeting and TTP use to continue.
  • On May 22, CISA released an “Advisory Update on Cyber Threat Activity Targeting Commvault’s SaaS Cloud Application (Metallic).
  • Security Week relates “The developers of OpenPGP.js have released updates to patch a critical vulnerability that can be exploited to spoof message signature verification.”
    • OpenPGP.js is an open-source JavaScript implementation of the OpenPGP email encryption library, enabling its use on any device. According to its developers, “The idea is to implement all the needed OpenPGP functionality in a JavaScript library that can be reused in other projects that provide browser extensions or server applications.”
    • “Its website shows that OpenPGP.js is used by projects such as FlowCrypt, Mymail-Crypt, UDC, Encrypt.to, PGP Anywhere, and Passbolt.”
  • Dark Reading points out “3 Severe Bugs Patched in Versa’s Concerto Orchestrator. Three zero-days could have allowed an attacker to completely compromise the Concerto application and the host system running it.”
  • Per SC Media,
    • “Stolen credentials were the root cause of more than 30% of data breaches last year, according to Verizon’s 2025 Data Breach Investigations Report. Attackers compromised more than 23 million unmanaged and user-controlled devices—including personal laptops and home systems used in remote work settings—to extract login information, often using session cookies to bypass multi-factor authentication and other access controls.
    • “Credentials don’t just manifest—you’re either phishing them, brute forcing them, or stealing them via malware,” said Philippe Langlois, lead data scientist at Verizon and co-author of the 2025 DBIR, speaking at last month’s RSAC 2025.
    • “Those numbers aren’t outliers—they’re symptoms of a deeper failure in enterprise cybersecurity. Identity systems, Langlois noted at RSAC 2025, are now routinely exploited as entry points with attackers relying less on technical exploits—like finding and exploiting software vulnerabilities—and more on credential-based access, where they simply log in using stolen usernames, passwords, or hijacked sessions.”

From the ransomware front,

  • Cybersecurity Dive lets us know,
    • “Kettering Health is facing a cyberattack that’s impacting patient care, the Ohio-based health system said on Tuesday [May 20].
    • “The provider was hit by a system-wide technology outage Tuesday morning due to unauthorized access to its network, Kettering said in a press release. 
    • “Elective inpatient and outpatient procedures at the health system’s facilities were canceled Tuesday. Kettering’s call center was also knocked offline and might have been occasionally inaccessible, the provider added.”
  • Security Week informs us,
    • “In a data breach notice published on its website, Marlboro-Chesterfield Pathology said it discovered unauthorized activity on some internal IT systems on January 16, 2025. An investigation revealed that the hackers had stolen some files.
    • “The compromised data includes personal information such as name, address, date of birth, medical treatment information, and health insurance information. The stolen information varies by individual. 
    • “MCP informed the US Department of Health and Human Services (HHS) this week that the incident impacted 235,911 individuals.”
  • Per Bleeping Computer,
    • “The FBI warned that an extortion gang known as the Silent Ransom Group has been targeting U.S. law firms over the last two years in callback phishing and social engineering attacks.
    • “Also known as Luna Moth, Chatty Spider, and UNC3753, this threat group has been active since 2022and was also behind BazarCall campaigns that provided initial access to corporate networks for Ryuk and Conti ransomware attacks.
    • “In March 2022, following Conti’s shutdown, the threat actors separated from the cybercrime syndicate and formed their own operation called Silent Ransom Group (SRG).
    • “In recent attacks, SRG impersonates the targets’ IT support in email, fake sites, and phone calls using social engineering tactics to gain access to the targets’ networks.
    • “This extortion group doesn’t encrypt the victims’ systems and is known for demanding ransoms not to leak sensitive information stolen from compromised devices online.”
  • Per Dark Reading,
    • “Yet another threat group has embraced the trend of combining email bombing with vishing to gain initial access to systems and deploy ransomware.
    • “This time the adversary employing the technique, first documented as a tactic of Black Basta ransomware group, is the recently emerged 3AM ransomware group, researchers at Sophos revealed in a recent blog post. Sophos spotted an attack in the first quarter this year by 3AM affiliates, which followed the familiar playbook and successfully stole data from the targeted system but did not complete the ransomware attack.”
  • Per Fortra’s Tripline,
    • “Health-ISAC recently released their 2025 Health Sector Cyber Threat Landscape Report, a comprehensive outline of the malicious activity aimed at healthcare in the previous year. Not surprisingly, ransomware was cited by security professionals in the industry as the number one threat of 2024 and the top area of concern coming into 2025 (followed by third-party breaches, supply chain attacks, and zero-day exploits). Some things never change.
    • “However, when it comes to ransomware, they do evolve. Take a look at [the Tripline article] some of the reasons ransomware maintains its top spot as the primary plague of healthcare organizations as we move into another threat-filled year.”

From the cybersecurity business and defenses front,

  • Cybersecurity Dive reports,
    • “Shares of Palo Alto Networks fell Wednesday after the company reported better-than-expected earnings in the third fiscal quarter but disappointed some investors over its margins. 
    • “The company reported non-GAAP (generally accepted accounting principles) net income of 80 cents a share during the quarter that ended on April 30, up from 66 cents in the same quarter last year. Those earnings beat consensus estimates of 77 cents. 
    • “Revenue grew 15%, to $2.3 billion, in the quarter, compared with $2 billion in the same period last year.”
  • and
    • Companies designing AI systems should protect training data from tampering and strictly limit access to its underlying infrastructure, the U.S. and three allies said in a joint guidance document published on Thursday [May 22].
    • The AI security guidance addresses multiple topics, including protecting data throughout the AI systems’ life cycle, supply chain considerations and ways to mitigate possible attacks on large data sets.
    • The multilateral warning reflects concerns in the U.S. and allied nations about powerful AI models containing vulnerabilities that can ripple across critical infrastructure.
  • NIST discusses “Cybersecurity and AI: Integrating and Building on Existing NIST Guidelines.”
  • The Wall Street Journal explains “How to lock down your finances and online accounts after a data breach spreads your information to the secret corners of the internet.”
  • Here’s a link to Dark Reading’s CISO Corner.

Midweek Report

Photo by Joshua Hoehne on Unsplash

From Washington, DC,

  • Govexec tells us,
    • Rep. Gerry Connolly, D-Va., died Wednesday morning after a battle with esophageal cancer. He was 75 years old.
    • Connolly is leaving behind a legacy as a legislator who fought for the federal workforce, government contractors and the economic development of his home region of Northern Virginia.
    • In April, Connolly announced he would not seek re-election in 2026 and would step down from his post as the ranking member of the House Oversight Committee. He first announced his diagnosis in November, shortly after easily winning a ninth term to the House.
  • RIP, Congressman.
  • The Wall Street Journal reports,
    • “House Republicans made a series of last-minute changes to their sprawling tax-and-spending bill, searching for a path that could unite the party’s warring wings headed into a nail-biter floor vote expected early Thursday.
    • “New language to assuage conservatives would accelerate new Medicaid work requirements to December 2026 from 2029 and end certain tax credits for wind energy and solar energy by 2028 instead of a slower phaseout through 2031. The updates would also formally lock in a $40,000 cap on the state and local tax deduction starting this year, up from a $30,000 cap in the prior plan; that change was designed to satisfy Republicans from high-tax states such as New York and New Jersey. 
    • “Lawmakers from states such as Florida and Texas that haven’t expanded Medicaid under Obamacare would get a favorable change to a funding formula, and border states would get $12 billion for security costs incurred during the Biden administration. An indoor-tanning excise tax that was eliminated in the original bill text would be maintained and a nuclear-energy tax break would be expanded. Federal land swaps in Nevada and Utah would be eliminated. Gun-rights supporters won changes to the tax treatment of suppressors. 
    • “The revised legislation advanced in an initial vote in the early hours of Thursday morning, with all Republicans except one in favor, and all Democrats opposed.” * * *
    • “I believe we are going to land this airplane,” Johnson said during a hectic day of legislating that saw the House Rules Committee start a hearing at 1 a.m. and continue past sunset. He is trying to finish the bill in the House before Memorial Day; it would then go to the Senate, and Republicans are aiming to get it to Trump’s desk by July 4.” 
  • Per the New York Times,
    • “The House early Thursday narrowly passed a wide-ranging bill to deliver President Trump’s domestic agenda, after Speaker Mike Johnson put down several mini-rebellions in Republican ranks to muscle the legislation to its first major victory over unified Democratic opposition.
    • “The early morning vote was 215 to 214, mostly along party lines.”
  • Fierce Healthcare adds,
    • “We have a tiny sliver that really matters to employers and working families,” said James Gelfand, president and CEO of The ERISA Industry Committee, a group representing large employers. “But I can say those provisions are monumental to us.”
    • “There’s a laundry list of items Gelfand and others are happy the bill, in its current form, includes.
    • “Employer-offered worksite clinics with free or discounted primary care services would now be available to employees on high-deductible health plans (HDHPs), even if they already have an HSA.” * * *
    • “Other changes allow HSA funds to be spent on gym memberships, increases the HSA contribution limit for some individuals, classifies bronze and catastrophic plans as a HDHP that can pair with an HSA and permits one spouse to contribute to an HSA even if the other spouse has a flexible spending account.” * * *
    • “The bill [further codifies a rule from 2019 creating the [ICHRA] program and lets employees use pretax dollars through a cafeteria plan to pay for on-exchange marketplace premiums, explains the KFF.
  • and
    • “A bipartisan bill aiming to reform prior authorization has been reintroduced in the Senate.
    • “The Improving Seniors’ Timely Access to Care Act seeks to streamline the prior auth process in Medicare Advantage (MA), which would ease administrative burdens on providers and reduce delays in accessing care for patients.
    • “The bill is co-sponsored by Sens. Roger Marshall, R-Kan., and Mark Warner, D-Va., and is supported by dozens of senators on both sides of the aisle. A version of the legislation in the House is also backed by a bipartisan group.”
  • Per an CMS news release,
    • “Today, the Centers for Medicare & Medicaid Services (CMS) announced a significant expansion of its auditing efforts for Medicare Advantage (MA) plans. Beginning immediately, CMS will audit all eligible MA contracts for each payment year in all newly initiated audits and invest additional resources to expedite the completion of audits for payment years 2018 through 2024.”
  • The American Hospital Association News informs us,
    • “The Administration for Strategic Preparedness and Response today released a bulletin on workplace violence in health care that includes recommendations for strengthening security protocols, enhancing emergency preparedness, supporting workforce mental health and promoting information sharing.”

From the Food and Drug Administration front,

  • BioPharma Dive points out,
    • “After discussions with the Food and Drug Administration, Moderna on Wednesday said it has voluntarily withdrawn its application for a combination COVID-19 and influenza shot in adults aged 50 years and older.
    • “The biotechnology company said it plans to resubmit its candidate later this year after it gathers data from an ongoing Phase 3 trial of a standalone seasonal influenza vaccine it’s developing. Earlier this month, Moderna had told investors the FDA would require efficacy data from this trial before considering approval of the combo vaccine.
    • “Moderna’s confirmation comes one day after the FDA announced new rules for COVID vaccine approvals, for which it will now require placebo-controlled studies for any clearance in healthy adults under 65 years old.”
  • and
    • “Expert advisers to the Food and Drug Administration on Tuesday backed Johnson & Johnson’s Darzalex for people with an asymptomatic form of multiple myeloma that often progresses into more severe blood cancer.
    • “Members of the Oncologic Drugs Advisory Committee voted 6-2 that the benefits of Darzalex’s use in high-risk smoldering multiple myeloma outweighed its risks. However, panelists wrestled with some controversial aspects of the Phase 3 trial J&J is using to ask for an expanded approval. Namely, FDA staff had flagged the trial’s inclusion of patients that could be classified as having a lower risk of progression, as well as an unclear survival benefit following disease progression.
    • “The FDA isn’t required to follow the advice of its outside expert panels but usually does.”
  • MedTech Dive adds,
    • “Teal Health published data Monday from a trial of its cervical cancer screening sample self-collection device in JAMA Network Open.
    • “The paper describes a trial of 599 people who both self-collected samples and underwent standard clinician collection. Self-collection correctly identified 95.2% of the positive samples.
    • “Teal won Food and Drug Administration approval for the self-collection device in early May, setting the company up to start shipping the product to customers in June.”
  • The New York Times provides helpful background information about the Alzheimer’s Disease blood test that the FDA approved for marketing last week.
    • “The test, manufactured by Fujirebio Diagnostics, is intended to be used only by specialists in Alzheimer’s, the F.D.A. said. Its mouthful of a name — Lumipulse G pTau217/ß-Amyloid 1-42 Plasma Ratio — describes what the test measures: levels of two proteins, amyloid and tau, that are hallmarks of Alzheimer’s disease.
    • “In people who develop Alzheimer’s, amyloid begins to accumulate and form plaques in the brain more than 20 years before any symptoms of cognitive impairment. Tau accumulates later, forming tangles in the brain, and is much more closely correlated with cognitive decline.” * * *
    • “The F.D.A., and Alzheimer’s experts, emphasized that the blood test should be given only to people who are already experiencing cognitive decline and are ages 55 and older. Moreover, it should not be used on its own to diagnose or to rule out Alzheimer’s.”

From the public health and medical research front,

  • The Wall Street Journal reports,
    • “Biden’s cancer diagnosis has sparked a debate over prostate-cancer screening guidelines.
    • “Increased diagnoses of later-stage cancers are suspected to be linked to changing screening guidance.
    • “Some prostate-cancer specialists said that there has also been a shift in how they manage lower-risk prostate cancer.”
  • Per STAT News,
    • “In what researchers hope could be a case of 1 + 1 = 3, new research suggests that combining a model to predict 10-year cardiovascular risk with an imaging test of coronary arteries could be better than either method alone at identifying people in danger of their first heart attack.
    • “The model is PREVENT, which computes a risk score based on measures familiar from the primary care office: blood pressure, cholesterol levels, kidney function, age, and BMI, as well as questions about type 2 diabetes, smoking, and social determinants of health. The imaging test is a CT scan that detects calcium buildup in arteries leading to the heart. High amounts of calcium, alone and inside fatty plaques, can lead to blockages and heart attacks.” * * *
    • “It’s not always clear who should be screened for coronary calcium; thus, we decided to see if the PREVENT score could be used in this novel manner,” Morgan Grams of New York University’s Grossman School of Medicine told STAT. She is an author of the study published Wednesday in the Journal of the American Heart Association. “Once we determined that it could, we assessed whether the coronary calcium score could add information to PREVENT in the prediction of incident cardiovascular disease. It did.”
       
  • Per a National Institute of Health news release,
    • Research teams funded by the National Institutes of Health (NIH) have created a versatile set of gene delivery systems that can reach different neural cell types in the human brain and spinal cord with exceptional accuracy. These delivery systems are a significant step toward future precise gene therapy to the brain that could safely control errant brain activity with high precision. In contrast, current therapies for brain disorders mostly treat only symptoms.
    • The new delivery systems carry genetic material into the brain and spinal cord for targeted use by specific cell types. This platform has the potential to transform how scientists can study neural circuits. It provides researchers with gene delivery systems for various species used in research, without the need for genetically modified, or transgenic, animals. Examples include illuminating fine structures of brain cells with fluorescent proteins and activating or silencing circuits that control behavior and cognition.
    • “Imagine this new platform as a delivery truck dropping off specialized genetic packages in specific cell neighborhoods in the brain and spinal cord,” said John Ngai, Director of the NIH’s Brain Research Through Advancing Innovative Neurotechnologies® Initiative, or The BRAIN Initiative®. “With these delivery systems, we can now access and manipulate specific cells in the brain and spinal cord – access that was not possible before at this scale.”
  • Healio notes,
    • “Increased dietary fiber was associated with reduced likelihood of stroke, especially small-vessel stroke, in addition to reduced all-cause mortality and improved poststroke survival, researchers reported.
    • “Data on the link between daily dietary fiber intake and odds of stroke and adverse stroke outcomes were published in Stroke.”

From the U.S. healthcare business front,

  • The Wall Street Journal lets us know,
    • “Sanofi will acquire Vigil Neuroscience for $470M, potentially reaching $600M with milestone payments.
    • “The deal centers on neurology, adding VG-3927, an Alzheimer’s treatment, to Sanofi’s pipeline.
    • “Vigil’s VGL101 molecule will return to Amgen before the Sanofi acquisition closes in Q3.”
  • Fierce Healthcare reports,
    • “Digital physical therapy company Hinge Health priced its IPO at $32 per share on Wednesday, at the top of the company’s expected price range.
    • “The company said it raised $437 million by selling 13,666,000 million shares of its Class A common stock, according to a press release issued Wednesday. Hinge Health said it sold 8.5 million shares and 5.1 million shares are being sold by existing shareholders.
    • “Hinge Health will begin trading tomorrow morning on the New York Stock Exchange under the ticker symbol “HNGE.” The offering is expected to close May 23.”
  • Fierce Pharma relates,
    • “Cigna’s Evernorth is rolling out a new pharmacy benefit management program that caps members’ monthly cost for key GLP-1 drugs.
    • “Evernorth said in an announcement that through its Express Scripts arm it negotiated directly with the manufacturers for Wegovy and Zepbound—Novo Nordisk and Eli Lilly, respectively—to cap patients’ monthly costs at $200. The company said this could save as much as $3,600 per year compared to savings patients receive through direct-to-consumer discount programs.
    • “Evernorth added that the costs will contribute toward a patient’s deductible as well.
  • CNBC adds, “Evernorth’s new weight loss pricing program will begin in the second half of the year, as employers begin to make decisions about coverage for next year’s plans.”
  • Per STAT News,
    • “Five years after launching, a unique nonprofit drug company has published data showing that consumers and health plans saved considerable money on a generic cancer medicine thanks to its “transparent” pricing model. And it maintains that the findings validate plans to distribute and — eventually — manufacture still more copycat medicines for the U.S. market.
    • “The company — CivicaScript — was created as a vehicle to combat stubbornly high drug prices even after dominant brand-name medicines lost patent protection and generic competitors entered the market. Backed mostly by 18 Blue Cross Blue Shield plans, the nonprofit made its first drug available — a generic version of the Zytiga prostate cancer treatment — in August 2022.
    • “The initial wholesale price was $160, plus an $11 dispensing fee paid to pharmacies, but uptake was slow until it was accepted by pharmacy benefit managers and other health plans. But eventually, the gambit worked: Between September 2023 and December 2023, patients saved 64% and payers saved 92% by purchasing the generic distributed by CivicaScript, according to a new analysis.”
  • Beckers Payer Issues offers the view of eleven payer “leaders to learn what’s overhyped in healthcare.”