Trellix: Healthcare cyberattacks now a safety crisis
Overview
A report from Trellix reveals that healthcare cyberattacks are becoming a significant safety issue, with over 54.7 million detections reported in 2025. Email is identified as the main attack vector, accounting for 85% of these incidents, and the United States is the most targeted nation, representing 75% of the detections. This alarming trend shows how vulnerable healthcare systems are to cyber threats, which can compromise patient safety and data integrity. With the increasing reliance on digital communication in healthcare, organizations need to bolster their security measures to protect sensitive information and ensure operational continuity. The findings call for urgent attention from healthcare providers to strengthen their defenses against these persistent cyber threats.
Key Takeaways
- Active Exploitation: This vulnerability is being actively exploited by attackers. Immediate action is recommended.
- Affected Systems: Healthcare systems, email communication systems
- Action Required: Organizations should enhance email security protocols, implement multi-factor authentication, and conduct regular security training for employees.
- Timeline: Newly disclosed
Original Article Summary
Based on 54.7 million detections from healthcare environments in 2025, the report identifies email as the top threat vector (85% of detections) and the U.S. as the primary target (75%).
Impact
Healthcare systems, email communication systems
Exploitation Status
This vulnerability is confirmed to be actively exploited by attackers in real-world attacks. Organizations should prioritize patching or implementing workarounds immediately.
Timeline
Newly disclosed
Remediation
Organizations should enhance email security protocols, implement multi-factor authentication, and conduct regular security training for employees.
Additional Information
This threat intelligence is aggregated from trusted cybersecurity sources. For the most up-to-date information, technical details, and official vendor guidance, please refer to the original article linked below.