URGENT/11 vulnerabilities allow attackers to take control of embedded devices remotely without any user interaction and often without triggering traditional security defenses. Discovered in 2019, these eleven flaws in the IPnet TCP/IP stack affect millions of devices...
Download RunSafe’s 2025 Medical Device Cybersecurity Index
Industry-defining insights from 605 healthcare decision-makers on medical device cybersecurity
Medical device cybersecurity has evolved from an IT concern to a patient safety imperative. Our comprehensive survey of 605 healthcare executives reveals how cyberattacks on medical devices are reshaping procurement decisions, budget priorities, and patient care across the healthcare ecosystem.
Key Findings At-a-Glance:
- 22% of healthcare organizations have experienced cyberattacks on medical devices
- 75% of these incidents affected patient care
- 46% have declined device purchases due to cybersecurity concerns
- 79% are willing to pay premium prices for devices with advanced security
- 35% now identify medical devices as their biggest cybersecurity concern
What’s Inside the Report:
- Real-world examples of how cyber incidents are affecting patient care
- How security is changing procurement and vendor expectations
- Where healthcare budgets are shifting—and why
- What healthcare buyers now demand from medical device manufacturers
- What forward-thinking leaders can do to stay ahead
Who Should Read This Report:
- Healthcare executives and decision-makers
- Medical device manufacturers and vendors
- Healthcare IT and security professionals
- Healthcare procurement professionals
- Healthcare investors and analysts
Check Out Our Latest Blog Posts
Navigating Third-Party Software Risk: Best Practices for 2026
Most of the code running in your product probably isn't code you wrote. Open source libraries, vendor SDKs, and firmware components all become part of your attack surface the moment they're compiled into your build. Third-party software risk is the potential for...
The Worst Vulnerabilities of 2025: How Pre-Auth RCE Broke the Perimeter
Across industries, the year’s most damaging vulnerabilities shared the same defining trait: unauthenticated remote code execution (pre-auth RCE) on internet-facing systems. VPNs, firewalls, web frameworks, and even core ERP platforms all fell victim to flaws that...



