<table style="border:1px solid #adadad; background-color: #F3F1EC; color: #666666; padding:8px; -webkit-border-radius:4px; border-radius:4px; -moz-border-radius:4px; line-height:16px; margin-bottom:6px;" width="100%">
<tbody>
<tr>
<td><span style="font-family:Helvetica, sans-serif; font-size:20px;font-weight:bold;">Beckers Hospital Review Cybersecurity Feed (Unofficial)</span></td>
</tr>
<tr>
<td> </td>
</tr>
</tbody>
</table>
<table style="font:13px Helvetica, sans-serif; border-radius:4px; -moz-border-radius:4px; -webkit-border-radius:4px; background-color:#fff; padding:8px; margin-bottom:6px; border:1px solid #adadad;" width="100%">
<tbody>
<tr>
<td><a href="https://www.beckershospitalreview.com/cybersecurity/hackers-are-using-ai-to-be-more-productive.html" style="font-family:Helvetica, sans-serif; letter-spacing:-1px;margin:0;padding:0 0 2px;font-weight: bold;font-size: 19px;line-height: 20px;color:#222;">Hackers are using AI to be more 'productive'</a>
<div style="font-family:Helvetica, sans-serif; text-align:left;color:#999;font-size:11px;font-weight:bold;line-height:15px;">Feb 15th 2024, 10:56</div>
<div style="font-family:Helvetica, sans-serif; color:#494949;text-align:justify;font-size:13px;">
<p><p>Microsoft research found that government-sponsored hackers affiliated with Russia, China and Iran have been utilizing tools associated with OpenAI to create cyberattacks, <a href="https://www.nytimes.com/2024/02/14/technology/openai-microsoft-hackers.html" target="_blank" rel="noopener"><em>The New York Times</em></a> reported Feb. 14. </p></p>
</div>
<div style="font-family:Helvetica, sans-serif; font-size:13px; text-align: center; color: #666666; padding:4px; margin-bottom:2px;"></div>
</td>
</tr>
</tbody>
</table>
<table style="font:13px Helvetica, sans-serif; border-radius:4px; -moz-border-radius:4px; -webkit-border-radius:4px; background-color:#fff; padding:8px; margin-bottom:6px; border:1px solid #adadad;" width="100%">
<tbody>
<tr>
<td><a href="https://www.beckershospitalreview.com/cybersecurity/lurie-childrens-restores-access-to-some-systems-after-cyberattack.html" style="font-family:Helvetica, sans-serif; letter-spacing:-1px;margin:0;padding:0 0 2px;font-weight: bold;font-size: 19px;line-height: 20px;color:#222;">Lurie Children's restores access to some systems after cyberattack</a>
<div style="font-family:Helvetica, sans-serif; text-align:left;color:#999;font-size:11px;font-weight:bold;line-height:15px;">Feb 14th 2024, 17:30</div>
<div style="font-family:Helvetica, sans-serif; color:#494949;text-align:justify;font-size:13px;">
<p><p>Lurie Children's Hospital of Chicago has restored access to its email and phone after a cyberattack forced the hospital to take them offline, <a href="https://www.nbcchicago.com/news/local/lurie-childrens-hospital-gives-restoration-update-on-impact-of-dayslong-cyberattack/3356228/" target="_blank" rel="noopener"><em>NBC Chicago</em></a> reported Feb. 14. </p></p>
</div>
<div style="font-family:Helvetica, sans-serif; font-size:13px; text-align: center; color: #666666; padding:4px; margin-bottom:2px;"></div>
</td>
</tr>
</tbody>
</table>
<p><strong>Forwarded by:<br />
Michael Reeder LCPC<br />
Baltimore, MD</strong></p>
<p><strong>This information is taken from free public RSS feeds published by each organization for the purpose of public distribution. Readers are linked back to the article content on each organization's website. This email is an unaffiliated unofficial redistribution of this freely provided content from the publishers. </strong></p>
<p> </p>
<p><s><small><a href="#" style="color:#ffffff;"><a href="https://blogtrottr.com/unsubscribe/565/4nYymW">unsubscribe from this feed</a></a></small></s></p>
<img src="https://blogtrottr.com/spot/8lQ0/0/hFvz" alt="" />