{"license":"CC BY 4.0","attribution":"Patient Protect — patient-protect.com/breachdash","source":"HHS OCR Breach Portal with Patient Protect editorial enrichment","count":1000,"retrieved_at":"2026-05-22T22:56:45.313Z","incidents":[{"id":"73fe309d-de4c-4ec8-8695-f43bed0bc444","entity_name":"ABB B&R Automation Studio","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":98,"summary":"ABB became aware of vulnerability in the product versions listed as affected in the advisory. An update is available that replaces an outdated third-party component. Although no successful exploitation was observed during testing of the affected B&R products, the identified vulnerabilities could present potential attack vectors that might enable unauthorized access, data exposure, or remote code execution."},{"id":"4d866b99-7db0-4d3c-995e-41866481c92b","entity_name":"Phishing attempt posing as EHR vendor","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"4cc6f35e-5fa8-46b4-a8bd-d1bad7ae391c","entity_name":"Impersonation of vendor representative","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"53959072-a2ff-44ab-80ff-b7e4a684a2dc","entity_name":"After-hours login attempt detected","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"edccae96-07df-421a-b4fc-edd3f8cc1b0d","entity_name":"Kieback & Peter DDC Building Controllers","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":53,"summary":"Successful exploitation of this vulnerability could allow an attacker to take control of the victim's browser."},{"id":"24f6cb55-886d-4e28-b1ef-cf5201a4e28a","entity_name":"Unauthorized IoT device on network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"2936e44b-79ad-46ea-9cbd-05d1ddbe3126","entity_name":"Credential harvesting email targeting front desk","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"b180aa6f-a337-4d2f-948f-29b15c1f2ec2","entity_name":"Unencrypted USB device found in workstation","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"0d2c17bb-bf15-43cc-a90c-9dd9e0210f12","entity_name":"Personal device connected to secure network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"aa21bc30-fa96-445e-858e-e19d131694bb","entity_name":"Phishing attempt posing as EHR vendor","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"de712a63-fca5-4d30-95ff-7ece4fc87b21","entity_name":"Unapproved cloud storage use detected","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Removable media detected in a secure workstation without encryption."},{"id":"8c0947fe-0adc-4a13-a918-2e124c54bcf0","entity_name":"RXNT","reported_date":"2026-05-19","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":36,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Hackers breached RXNT, a healthcare software company used by the Office of the Attending Physician (OAP) for prescription services for Congress, on March 1 and March 3, obtaining copies of patient data."},{"id":"b9d838bb-fe19-4d8d-b76b-fe4ba5d26363","entity_name":"Fake invoice attachment from unknown sender","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"c6eb5f77-72db-4caf-82a3-cbc6123e41bd","entity_name":"Screen left unlocked in patient area","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Removable media detected in a secure workstation without encryption."},{"id":"d0c1dd05-2346-476b-a47e-7b4535afc270","entity_name":"Unusual access pattern on patient records","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"011278f2-a570-4bf2-967c-f719c156f445","entity_name":"Impersonation of vendor representative","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"aab964a5-9557-4799-b03b-405fc9c387dd","entity_name":"Unusual access pattern on patient records","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"998fb0fe-7535-4ae2-9a68-f1c6bd3e79d9","entity_name":"Suspicious voicemail from unknown number","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"ab758499-a484-45fe-9fe6-55230a7e26fb","entity_name":"Vishing attempt requesting PHI","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"95722430-c852-4853-a73e-067b8f6d7d59","entity_name":"Merseyside hospital group","reported_date":"2026-05-16","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":40,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Nearly 50 staff at a Merseyside hospital group inappropriately accessed details of individuals attacked in Southport. Victims were informed about the data breach through investigative journalism."},{"id":"b1a605df-4531-4f3b-a2cc-7241ccf10d3c","entity_name":"Personal hotspot creating network conflict","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"c184390a-51e3-4fde-baf6-1f8297046807","entity_name":"Tailgating attempt at secure entrance","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Caller used knowledge of internal procedures to attempt identity verification bypass."},{"id":"24476b76-99f3-48b8-9a09-12e15ca03a5a","entity_name":"Personal hotspot creating network conflict","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"7f283323-086e-4d68-828d-124bdab61fc6","entity_name":"Siemens SIMATIC","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":96,"summary":"SIMATIC CN 4100 contains multiple vulnerabilities which could potentially lead to a compromise in availability, integrity and confidentiality. Siemens has released a new version for SIMATIC CN 4100 and recommends to update to the latest version."},{"id":"f11b825b-989d-4552-b1d7-7121214d70ce","entity_name":"Siemens gWAP","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":80,"summary":"Siemens gPROMS Web Applications Publisher (gWAP) is affected by a remote code execution vulnerability introduced through a third-party component, namely the Axios HTTP client library. The vulnerability stems from a specific \"Gadget\" attack chain that allows prototype pollution in other third-party libraries, potentially allowing an attacker to execute arbitrary code. Siemens has released a new version for gWAP and recommends to update to the latest version."},{"id":"b2264373-ec9d-4ce0-8662-d07874c6e662","entity_name":"Hamilton County Government","reported_date":"2026-05-20","state":"TN","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"e72c47a2-2497-43df-a1ea-f86092e9085c","entity_name":"Siemens Siemens ROS#","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":91,"summary":"ROS# contains a ROS service file_server, that before version 2.2.2 contains a path traversal vulnerability which could allow an attacker to access, i.e. read and write, arbitrary files, which are accessible with the user rights of the user that runs the service, on the system that hosts service. Siemens has released a new version for ROS# and recommends to update to the latest version."},{"id":"03c1d205-460b-4965-a110-3aa195d312cb","entity_name":"Cisco Catalyst SD-WAN - Cisco Catalyst SD-WAN Controller Authentication Bypass Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Cisco Catalyst SD-WAN Controller & Manager contain an authentication bypass vulnerability that allows an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system."},{"id":"f7cc2a03-cc94-41ad-8c31-55140abb99ba","entity_name":"Employee sharing credentials via email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"21c2fdd2-936b-4ffd-9359-82f518e88fac","entity_name":"Personal device connected to secure network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"6731ae62-f01b-4501-b4bb-39986bdade49","entity_name":"Personal hotspot creating network conflict","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Rogue wireless access point discovered broadcasting near the facility."},{"id":"3caf34e9-472d-4677-8a0d-fbba4c433109","entity_name":"OpenLoop","reported_date":"2026-05-14","state":null,"individuals_affected":716000,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. The telehealth platform OpenLoop was hacked in January, resulting in the exfiltration of personal information of 716,000 users."},{"id":"40ab3659-54f7-4942-a24a-2d280da81c9d","entity_name":"Phishing attempt posing as EHR vendor","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"2c758c83-4128-4451-9662-3d1a8d90bd8f","entity_name":"Rogue access point identified","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"227dc7e6-83fb-4fcb-92a2-97f071e106a3","entity_name":"Robocall spoofing internal extension","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Caller attempted to obtain patient information without proper verification."},{"id":"ef139ac6-9e59-4ee7-8df8-fa324cbe5cde","entity_name":"Unapproved cloud storage use detected","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"14c28352-b420-42e3-8aa1-7caf355b9d90","entity_name":"Repeated hang-up calls to reception","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"2a3e5ab3-205e-4c07-aad0-47269f500a43","entity_name":"Family Health Centers of San Diego","reported_date":"2026-05-20","state":"CA","individuals_affected":523,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"e51db2ef-6332-4470-b443-00a73d2d798a","entity_name":"Spoofed email requesting password reset","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Message attempted to harvest credentials by impersonating the IT department."},{"id":"3342dfe2-9e2e-4999-b01d-5e6f08e25d7e","entity_name":"Tulane University","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Unknown"},{"id":"050e4f5b-7eec-4b3d-b86f-b7b1aab366f2","entity_name":"Family Health Centers of San Diego","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Unknown"},{"id":"df9beade-5353-42d6-bba5-0a25b1ddc48d","entity_name":"ABB WebPro SNMP Card PowerValue Multiple Vulnerabilities","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":88,"summary":"ABB became aware of multiple internally discovered vulnerabilities in the WebPro SNMP card PowerValue for the product versions listed as affected in the advisory. Depending upon the vulnerability, an attacker with access to local network who successfully exploited this vulnerability could have - Unauthorized access - Insufficient Session Expiration leading to resource unavailability - Uncontrolled Resource Consumption leading to DOS attack ABB strongly advises customers to update the latest firmware of affected products."},{"id":"d54d508a-af70-467e-a1bd-56146a094579","entity_name":"Unauthorized IoT device on network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"48f8ebff-63d5-4be8-90ef-f161f7a9d235","entity_name":"Unapproved cloud storage use detected","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"6df35071-f287-4252-b763-e8bbb79b406e","entity_name":"Screen left unlocked in patient area","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Removable media detected in a secure workstation without encryption."},{"id":"f6d88bee-2fe0-4c26-9065-7f54601b15a2","entity_name":"Phishing attempt posing as EHR vendor","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"a219ae4b-8573-4e0d-a89b-9621cf426378","entity_name":"Impersonation of vendor representative","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"dda9cf2d-bbc3-4189-b92d-6773f4ccdf6d","entity_name":"Robocall spoofing internal extension","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"be806ce2-1a95-4c00-b43b-b3d92fd04328","entity_name":"Multiple failed login attempts observed","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"f761bd97-3943-4b8b-aaea-0c1779b671c4","entity_name":"Caller requesting patient info without verification","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"a53721a7-5027-4076-bad2-5ad707b8d7a4","entity_name":"Tailgating attempt at secure entrance","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"eb50cea5-b391-4155-a62f-c7d6ef49b5f7","entity_name":"Login from unrecognized IP address","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"1edf1b20-1df0-4614-8136-83666e6ae7d2","entity_name":"Quartz Health Solutions, Inc.","reported_date":null,"state":"WI","individuals_affected":396000,"source_type":"state_ag","severity_score":85,"summary":"Quartz Health Solutions, Inc. was impacted by the large-scale MOVEit Transfer cyberattack, which exploited a vulnerability in the software. This breach exposed the protected health information of Quartz members."},{"id":"756ef712-f5ee-4907-be03-2566195614d2","entity_name":"Managed Health Services of Wisconsin","reported_date":null,"state":"WI","individuals_affected":339272,"source_type":"state_ag","severity_score":85,"summary":"Managed Health Services of Wisconsin was impacted by the large-scale MOVEit Transfer cyberattack, which exploited a vulnerability in the software. This breach exposed the protected health information of MHS members."},{"id":"8c8e8b9e-f0d5-4417-83a8-d5528cd38001","entity_name":"Anthem (now Elevance Health)","reported_date":null,"state":"WI","individuals_affected":78800000,"source_type":"state_ag","severity_score":95,"summary":"This is a follow-up notification regarding the 2015 cyberattack that exposed the personal information of nearly 79 million Americans. Multiple state attorneys general reached a settlement with Anthem, requiring them to improve their data security and pay $48.2 million. Wisconsin received $994,763.48 from the settlement."},{"id":"f16f2494-4ae6-42fe-b32c-b11e605a0dc8","entity_name":"Palomar Health Medical Group","reported_date":"2026-05-20","state":"CA","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"216f4286-b292-46a1-8b67-e25b2ac1973a","entity_name":"Ivanti Endpoint Manager Mobile (EPMM) - Ivanti Endpoint Manager Mobile (EPMM) Improper Input Validation Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Ivanti Endpoint Manager Mobile (EPMM) contains an improper input validation vulnerability that allows a remotely authenticated user with administrative access to achieve remote code execution."},{"id":"b330666b-9118-47a5-bcfc-e1d1a6f87929","entity_name":"Multiple failed login attempts observed","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"d0408cb7-59f5-43d8-85f1-228bdacaf2f9","entity_name":"Sanger Skilled Care, LLC dba Cornerstone Care Center","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Unknown."},{"id":"76f7f685-5068-43f6-8778-016e0c142c44","entity_name":"World Trade Center Health Program","reported_date":"2026-05-19","state":"DC","individuals_affected":1071,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"70deb141-c48c-4838-9e5d-46d4698753b4","entity_name":"Suspicious LinkedIn message from fake recruiter","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"59670b1b-96c1-480f-b33d-a73df78b8437","entity_name":"Caller impersonating IT support","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Individual attempted to gain physical access to restricted area using false pretenses."},{"id":"5efecc67-f0fd-4022-9e95-be445ce2b904","entity_name":"Rogue access point identified","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"f43e4528-9c3a-4913-aa49-180852946a77","entity_name":"Access attempt from retired employee credentials","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"df466a73-6b15-4e61-8c5c-1c083e49fb45","entity_name":"Login from unrecognized IP address","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Access pattern suggests automated credential stuffing."},{"id":"779bc3dd-117b-4d5c-bc2e-17de6c2cb7db","entity_name":"Vishing attempt requesting PHI","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"83322a32-cbe0-4b96-9b0b-e6db7c204648","entity_name":"Personal device connected to secure network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"User account credentials were shared via unencrypted email."},{"id":"3ba025ab-311a-4df8-a3a8-54369a84db2e","entity_name":"Palo Alto Networks PAN-OS - Palo Alto Networks PAN-OS Out-of-bounds Write Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Palo Alto Networks PAN-OS contains an out-of-bounds write vulnerability in the User-ID Authentication Portal (aka Captive Portal) service that can allow an unauthenticated attacker to execute arbitrary code with root privileges on the PA-Series and VM-Series firewalls by sending specially crafted packets."},{"id":"dc514b10-963a-45ba-b3bb-7e2d8c65461c","entity_name":"Unregistered tablet accessing EHR system","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"79f46331-5230-40a0-b47b-a2258a74ea45","entity_name":"Johnson Controls CEM AC2000","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":87,"summary":"Successful exploitation of this vulnerability could allow a standard user to escalate privileges on the host machine."},{"id":"af48e60a-a97a-4532-a497-f66c1383c5b2","entity_name":"Aroostook Mental Health Center","reported_date":"2026-05-19","state":"ME","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"1019137c-4865-42b8-b206-f5b54a17b887","entity_name":"Pretexting call requesting employee directory","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"a0b063a6-b4b0-48ab-8a57-d3940e1df018","entity_name":"After-hours login attempt detected","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Access pattern suggests automated credential stuffing."},{"id":"e5c4afea-45c0-4cc3-96aa-614d1de6e9d8","entity_name":"Centers for Medicare and Medicaid Services (CMS)","reported_date":"2026-05-07","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":36,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. The Trump administration inadvertently exposed the Social Security numbers of health care providers in a database powering a new Medicare portal."},{"id":"6dc404c4-d2fd-41bf-b1b9-ed8895353e53","entity_name":"Personal hotspot creating network conflict","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"e05e845f-6f4b-4901-8508-3a5c90c6e487","entity_name":"Centers for Medicare and Medicaid Services (CMS)","reported_date":"2026-05-06","state":"TX","individuals_affected":null,"source_type":"modeled_breach","severity_score":36,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. The Trump administration inadvertently exposed the Social Security numbers of health care providers in a database powering a new Medicare portal."},{"id":"709aff59-cb00-48b2-8c63-54f4a74357af","entity_name":"DATCP Home","reported_date":null,"state":"WI","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"The provided text doesn't contain enough information to generate a breach notification for DATCP Home. There are no details about specific breaches, affected individuals, or data types exposed within the given context. It's an HTML header, not a breach notification."},{"id":"900681d1-11ad-41ab-afee-9a6763949db9","entity_name":"Ronald M Mann MD PC DBA Catalina Dermatology","reported_date":"2026-05-14","state":"AZ","individuals_affected":3000000,"source_type":"hhs_breach","severity_score":95,"summary":""},{"id":"dfd1c8b0-826a-47af-ad0a-22ab7d6263ea","entity_name":"Centers for Medicare and Medicaid Services (CMS)","reported_date":"2026-05-05","state":"US","individuals_affected":null,"source_type":"modeled_breach","severity_score":36,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. The Centers for Medicare and Medicaid Services (CMS) inadvertently exposed the Social Security numbers of health care providers in a database powering a new Medicare portal."},{"id":"5b2ee5a4-4537-4a16-ba6e-62ec90643c24","entity_name":"Employee sharing credentials via email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"5049705c-18d6-4750-8541-379588522524","entity_name":"Login from unrecognized IP address","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"1be6ddb5-85f2-43bf-937f-291fc925a0ba","entity_name":"Repeated hang-up calls to reception","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"e34ea8f4-fc7f-4946-ba0c-16470b070435","entity_name":"Unknown device detected on clinic WiFi","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"d9a68359-f9cf-4348-9331-4eff036b76c5","entity_name":"Tailgating attempt at secure entrance","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"864cffe7-24a6-4a52-a1ae-5618e2f7cbdb","entity_name":"Access attempt from retired employee credentials","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Access pattern suggests automated credential stuffing."},{"id":"e3cdd7f1-ec70-47bb-b139-11b28e660f96","entity_name":"Integrated Pain Associates","reported_date":"2026-05-13","state":"TX","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"5f5b15a9-a50f-445e-ab26-49e6e238f57c","entity_name":"Western Orthopaedics, P.C.","reported_date":"2026-05-13","state":"CO","individuals_affected":113330,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"ebac51f7-d13a-46df-ba31-0ad73b77c431","entity_name":"Phishing attempt posing as EHR vendor","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"893e9893-1acf-4df9-80e3-0d8f8f3998c8","entity_name":"Fake invoice attachment from unknown sender","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"28427cc7-431d-4a1b-8239-0caa3af36d0f","entity_name":"University of Michigan/Michigan Medicine","reported_date":"2026-05-08","state":"MI","individuals_affected":551,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"aa84fae3-992f-413a-9db5-b869aeaec90f","entity_name":"CUNNINGHAM PROSTHETIC CARE LLC","reported_date":"2026-05-13","state":"ME","individuals_affected":2523,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"8f0c8601-e64a-48a1-8d60-0ab411544896","entity_name":"HealthTech Innovations","reported_date":null,"state":"IN","individuals_affected":200000,"source_type":"state_ag","severity_score":85,"summary":"HealthTech Innovations experienced a data breach affecting user names, email addresses, and encrypted health metric data."},{"id":"eda9028a-21f0-4798-88eb-e9d1e810296f","entity_name":"Sierra Nevada Health Plan","reported_date":null,"state":"NV","individuals_affected":250000,"source_type":"state_ag","severity_score":85,"summary":"Cyberattack on insurer's systems resulted in exposure of member data."},{"id":"8734e1bd-c55d-46f7-9733-8f93f5076979","entity_name":"Delta Dental","reported_date":"2026-05-02","state":null,"individuals_affected":7000000,"source_type":"modeled_breach","severity_score":54,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Delta Dental suffered a data breach involving MOVEit software, exposing patient data after a zero-day vulnerability was exploited by Clop. More than 7 million patients were reportedly affected."},{"id":"3bd22baf-26f4-482d-a22a-12903251e461","entity_name":"Capitol Pain Institute","reported_date":"2026-05-13","state":"CO","individuals_affected":695,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"946d17e2-166a-47a9-ae23-8708672d6750","entity_name":"NCH Corporation Employee Benefits Plan","reported_date":"2026-05-21","state":"TX","individuals_affected":4055,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"8691f0e4-6ec1-4d93-ac62-7fdecdf5bc65","entity_name":"Health Data Management","reported_date":null,"state":"IN","individuals_affected":1000,"source_type":"state_ag","severity_score":30,"summary":"This breach affected healthcare data."},{"id":"0fcf73d8-1925-4ee3-a0ff-dfc9050c8155","entity_name":"Personal device connected to secure network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"1f8547eb-6c64-4df7-bdb6-e6788edda91f","entity_name":"Indiana Medicaid","reported_date":null,"state":"IN","individuals_affected":75000,"source_type":"state_ag","severity_score":70,"summary":"Phishing attack compromising employee email accounts, potentially exposing names, dates of birth, addresses, Medicaid ID numbers, and medical service information of certain recipients."},{"id":"edcc8c8b-f56e-4a0c-81a0-74b89ac9a305","entity_name":"Spoofed email requesting password reset","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"e75a2c81-a2b4-49d6-bbea-5ed2f5f38cca","entity_name":"Ouster, Inc.","reported_date":"2026-05-08","state":"CA","individuals_affected":574,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"5c1845ab-ba4c-43da-a97e-1e33402699e4","entity_name":"ABB Edgenius Management Portal","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":96,"summary":"Successful exploitation of this vulnerability could allow an attacker to send a specially crafted message to the system node allowing the attacker to install and run arbitrary code, uninstall applications, and modify the configuration of installed applications. The following versions of ABB Edgenius Management Portal are affected: Edgenius Management Portal 3.2.0.0|3.2.1.1."},{"id":"409a1f27-8ce5-4ed0-a3bd-137e250f6a77","entity_name":"ABB PCM600","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":44,"summary":"Successful exploitation of this vulnerability could allow an attacker to send specially crafted messages to the system node resulting in execution of arbitrary code."},{"id":"0a7f5489-1f8c-473a-9daa-84d82d7550f9","entity_name":"Sandhills Medical","reported_date":"2026-05-01","state":null,"individuals_affected":170000,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Sandhills Medical disclosed a ransomware breach affecting an estimated 170,000 individuals, nearly one year after the incident occurred."},{"id":"a76e0ec5-dc62-4a8d-ae41-337dcd3e5484","entity_name":"Unapproved cloud storage use detected","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"de342c1b-f948-46ed-8a2b-0ddb37fae668","entity_name":"Suspicious LinkedIn message from fake recruiter","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Individual attempted to gain physical access to restricted area using false pretenses."},{"id":"e7e9424b-58e4-4a0d-85b4-9b5606efc16a","entity_name":"Totem Lake Family Dentistry","reported_date":"2026-05-15","state":"WA","individuals_affected":3464,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"56fce56d-2f30-425e-a459-225cef9006e2","entity_name":"ABB AWIN Gateways","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":83,"summary":"Successful exploitation of these vulnerabilities could allow an attacker to remotely reboot the device or complete an unauthenticated query to reveal system configuration, including sensitive details. The following versions of ABB AWIN Gateways are affected: ABB AWIN Firmware (2.0-0) installed on ABB AWIN GW100 rev.2 2.0-0; ABB AWIN Firmware (2.0-1) installed on ABB AWIN GW100 rev.2 2.0-1; ABB AWIN Firmware (1.2-0) installed on ABB AWIN GW120 1.2-0; ABB AWIN Firmware (1.2-1) installed on ABB AWIN GW120 1.2-1."},{"id":"0383aa4b-8c5a-467e-9aea-376d4ca154d8","entity_name":"ABB Ability OPTIMAX","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":81,"summary":"Successful exploitation of this vulnerability could allow an attacker to bypass user authentication on OPTIMAX installations that make use of the Azure Active Directory Single-Sign On integration. The following versions of ABB Ability OPTIMAX are affected: ABB Ability OPTIMAX 6.1 vers:all/*, ABB Ability OPTIMAX 6.2 vers:all/*, ABB Ability OPTIMAX 6.3 <6.3.1-251120, ABB Ability OPTIMAX 6.4 <6.4.1-251120."},{"id":"b495fa62-3134-4ff2-a987-9d06935c3e86","entity_name":"ABB AWIN Gateways","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":83,"summary":"Successful exploitation of these vulnerabilities could allow an attacker to remotely reboot the device or complete an unauthenticated query to reveal system configuration, including sensitive details."},{"id":"36f4a0ca-c59d-4f08-8b03-4c9d5a1e1b18","entity_name":"ABB Ability OPTIMAX","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":81,"summary":"Successful exploitation of this vulnerability could allow an attacker to bypass user authentication on OPTIMAX installations that make use of the Azure Active Directory Single-Sign On integration."},{"id":"2ea66de4-8e89-4f46-9067-03ea783d5179","entity_name":"ABB Edgenius Management Portal","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":96,"summary":"Successful exploitation of this vulnerability could allow an attacker to send a specially crafted message to the system node allowing the attacker to install and run arbitrary code, uninstall applications, and modify the configuration of installed applications."},{"id":"10b6cb82-953c-445b-b54e-0cfe93789c69","entity_name":"ABB PCM600","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":44,"summary":"Successful exploitation of this vulnerability could allow an attacker to send specially crafted messages to the system node resulting in execution of arbitrary code. The following versions of ABB PCM600 are affected: PCM600 >=1.5|<=2.13."},{"id":"e6bd00d4-ca18-4053-a291-ac436f4d579d","entity_name":"Mt. Spokane Pediatrics","reported_date":"2026-05-08","state":"WA","individuals_affected":32021,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"955b5be7-76c2-49a9-a921-6bb65beefc9d","entity_name":"ABB System 800xA, Symphony Plus IEC 61850","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":65,"summary":"This vulnerability was privately reported relating to ABB’s implementation of the IEC 61850 communication stack for MMS client applications used in some Automation control system products. Note: IEC 61850 communication typically supports MMS and GOOSE protocols. Some ABB products support both, others only MMS (e.g. S+ Operations and PM 877). In any case, GOOSE communication is not impacted by this reported vulnerability. If an attacker gains access to a site’s IEC 61850 network, then exploiting this vulnerability will result in a device fault (PM 877, CI850 and CI868 modules) and will require a manual restart. If this attack is directed at a S+ Operations node running IEC 61850 connectivity, this will result in a crash in the IEC 61850 communication driver which, if continued a repeating basis, will also result in a denial-of-service situation. Note that this does not have an impact on the overall availability and functionality of the S+ Operations node, only the IEC 61850 communication function. The System 800xA IEC61850 Connect is not affected."},{"id":"ebaef53d-57f1-457c-90c3-9b17667dabfb","entity_name":"Mt. Spokane Pediatrics","reported_date":null,"state":"WA","individuals_affected":29410,"source_type":"state_ag","severity_score":70,"summary":"Breach at Mt. Spokane Pediatrics"},{"id":"e68a9d62-293c-4fdb-9fb2-69710a559803","entity_name":"Northwoods Surgery Center","reported_date":"2026-05-08","state":"MN","individuals_affected":5385,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"721394e9-353c-4091-bb69-a6eccd5b3460","entity_name":"Tri-Cities Gastroenterology","reported_date":"2026-05-08","state":"TN","individuals_affected":67115,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"420bcdba-d63b-40d6-9a2e-a56b81e1dcb8","entity_name":"Credential harvesting email targeting front desk","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"4f03b815-a083-40ee-817c-c75e8d91d371","entity_name":"Unencrypted USB device found in workstation","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"154fbe31-f42e-442b-8b5c-ef4c938480cf","entity_name":"Credential harvesting email targeting front desk","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"e80a444f-0e08-4a05-b750-e7c407176eb4","entity_name":"Pretexting call requesting employee directory","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"4d40ed7c-e7d9-40b1-b0dc-8e2b55c6fae9","entity_name":"Sandhills Medical Foundation","reported_date":"2026-04-30","state":"SC","individuals_affected":169017,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Sandhills Medical Foundation in South Carolina notified the Maine Attorney General's Office of a cyberattack that affected a total of 169,017 people."},{"id":"46a802f2-3f7f-44af-b1c3-b6ad1b8ad5b9","entity_name":"Unknown device detected on clinic WiFi","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"An unregistered device was detected attempting to connect to the secure network."},{"id":"bd85f9f7-82e8-445a-a284-da510884cf84","entity_name":"NSA GRASSMARLIN","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":55,"summary":"Successful exploitation of this vulnerability could allow an attacker to disclose sensitive information.A vulnerability in GRASSMARLIN v3.2.1 allows crafted session data to trigger improper handling of XML input, which may result in unintended exposure of sensitive information. The flaw stems from insufficient hardening of the XML parsing process."},{"id":"10914a76-3050-4281-9d42-eea6af65e8e5","entity_name":"Unknown device detected on clinic WiFi","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"73eafc9f-ad40-4b50-89df-448c3267a67e","entity_name":"FMRS Health Systems, Inc.","reported_date":"2026-05-13","state":"WV","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"e0997fc5-ebf8-42c7-aa7c-0311f1eec20c","entity_name":"Suspicious voicemail from unknown number","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"a3cc09a1-8bea-42fd-8446-0e31b86c1a4c","entity_name":"Medtronic","reported_date":"2026-04-28","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":36,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Medical device giant Medtronic disclosed that hackers breached its network and accessed data in \"certain corporate IT systems.\""},{"id":"2a281a76-8e90-426e-b4de-f896cc5be485","entity_name":"L.A. Care Health Plan","reported_date":null,"state":"CA","individuals_affected":2000000,"source_type":"state_ag","severity_score":95,"summary":"This breach notification is for L.A. Care Health Plan, a healthcare entity."},{"id":"e1a15ae0-547a-4d64-bb3d-97d830d86909","entity_name":"Unapproved cloud storage use detected","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"69f531ac-0aad-4707-8d1a-ff3fb1c7b1a2","entity_name":"WellDyneRx","reported_date":null,"state":"WI","individuals_affected":308000,"source_type":"state_ag","severity_score":85,"summary":"Unauthorized access to WellDyneRx systems between October 6, 2025, and October 26, 2025, during which data may have been acquired."},{"id":"a5f202c8-b2aa-4d7b-a91f-b362a5c8a8a6","entity_name":"Anthem (CivicHealth)","reported_date":null,"state":"WI","individuals_affected":24000,"source_type":"state_ag","severity_score":70,"summary":"Impacted individuals were incorrectly enrolled in Affordable Care Act (ACA) health plans."},{"id":"b6e6cd61-d258-4409-a0f0-d4c7dfc0d407","entity_name":"Fake invoice attachment from unknown sender","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Email contained a malicious link disguised as an invoice from a known vendor."},{"id":"948c1cb5-df1a-4165-bce7-d77c18357c75","entity_name":"Unauthorized IoT device on network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"abf1c2b4-5c70-4c8d-881a-2cf8f807898b","entity_name":"Suspicious LinkedIn message from fake recruiter","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"7f08e3f9-16bd-43f2-ba54-ab179e5a6cd8","entity_name":"Suspicious voicemail from unknown number","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Repeated calls from spoofed numbers targeting the billing department."},{"id":"0af81db9-da9d-4a2e-988e-756d129017d5","entity_name":"Unusual access pattern on patient records","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Access pattern suggests automated credential stuffing."},{"id":"e7758d79-a364-4608-b69b-e32dffccd436","entity_name":"Spoofed email requesting password reset","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"ecc72bbc-917a-4c6c-abc5-282ec116f149","entity_name":"Unapproved cloud storage use detected","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"59629e93-6ca7-4339-b2b5-8bb8224d9b24","entity_name":"Regence BlueCross BlueShield of Oregon","reported_date":null,"state":"WI","individuals_affected":69022,"source_type":"state_ag","severity_score":70,"summary":"A vendor, Infosys, experienced a breach of systems related to the MOVEit vulnerability, potentially exposing Regence member data."},{"id":"d53655a9-6c84-4827-8440-124dddd5051f","entity_name":"Fake invoice attachment from unknown sender","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"d071fe30-362a-44b1-9737-da66882ed87f","entity_name":"Tailgating attempt at secure entrance","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"0e1ff7b2-68d1-4dc8-911a-097afe33e7ce","entity_name":"Health Alliance Plan of Michigan","reported_date":null,"state":"WI","individuals_affected":57470,"source_type":"state_ag","severity_score":70,"summary":"A vendor experienced a data breach involving the MOVEit file transfer application, potentially exposing Health Alliance Plan member data."},{"id":"b4822d59-d56f-4cd7-80c1-1d36a1a2a9a9","entity_name":"Molina Healthcare of Wisconsin","reported_date":null,"state":"WI","individuals_affected":14948,"source_type":"state_ag","severity_score":70,"summary":"A third-party vendor experienced a security incident that resulted in unauthorized access to a file transfer application, potentially exposing Molina Healthcare member data."},{"id":"9552cb46-5054-40eb-84d5-a87d3a347115","entity_name":"Florida Physician Specialists","reported_date":"2026-05-17","state":"FL","individuals_affected":276498,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"0d52d084-8cdb-4088-82e8-3cbdb3a2bc11","entity_name":"Texas Tech University Health Sciences Center","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Healthcare related data breach."},{"id":"9a16553c-3837-4869-a14e-77360c5ba564","entity_name":"Marin Cancer Care","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Unknown"},{"id":"67d189d9-3410-44ee-bfd3-010184eac222","entity_name":"Milesight Cameras","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":98,"summary":"Successful exploitation of these vulnerabilities could crash the device being accessed or allow remote code execution."},{"id":"fa0984ca-6c27-458a-a605-b888f24c0fa5","entity_name":"Robocall spoofing internal extension","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"b31b5f0b-ef52-4901-ba93-c49ffd1fcb23","entity_name":"McLeod Health","reported_date":null,"state":"WI","individuals_affected":240000,"source_type":"state_ag","severity_score":85,"summary":"Between December 20, 2025, and December 26, 2025, an unauthorized third party accessed McLeod Health's systems."},{"id":"423d6313-964c-4a11-89ad-5f0499f79461","entity_name":"Belmont Aesthetic and Reconstructive Plastic Surgery","reported_date":"2026-05-11","state":"VA","individuals_affected":528,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"fa631626-fddb-48c9-b586-cca5185b1a6e","entity_name":"The Rhode Island Department of Human Services (DHS)","reported_date":null,"state":"WI","individuals_affected":11000,"source_type":"state_ag","severity_score":70,"summary":"DHS learned of a data breach at a third-party vendor, Maximus Inc., related to the MOVEit file transfer application vulnerability."},{"id":"69198260-196a-4b20-8305-a755959eeec3","entity_name":"Interim HealthCare of Amarillo","reported_date":"2026-05-10","state":"TX","individuals_affected":666,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"a53b984e-00ef-4ab6-8292-9647b99dfb9c","entity_name":"UK Biobank","reported_date":"2026-04-24","state":null,"individuals_affected":500000,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Data from 500,000 people who volunteered their health information to the UK Biobank has been breached and offered for sale online in China."},{"id":"6ec7f651-2f2a-4518-a6ed-b12a745a0db4","entity_name":"Unapproved cloud storage use detected","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"62b25115-e084-457a-9e78-10d368e1edbd","entity_name":"Harvard Pilgrim Health Care","reported_date":null,"state":"WI","individuals_affected":2500000,"source_type":"state_ag","severity_score":95,"summary":"Cybersecurity incident beginning on March 27, 2026, which involved unauthorized access to Harvard Pilgrim Health Care's systems."},{"id":"a79878ff-be78-458b-9dde-5bfcaaaf37ea","entity_name":"Phishing attempt posing as EHR vendor","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"4d6fca6a-7592-495c-a07a-056a314bf851","entity_name":"Interim HealthCare of Lubbock","reported_date":"2026-05-10","state":"TX","individuals_affected":2071,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"c0eb3d72-cded-4a85-95dc-b9ade691bd75","entity_name":"Intrado 911 Emergency Gateway (EGW)","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":98,"summary":"Successful exploitation of this vulnerability could allow an attacker to read, modify, or delete files. The following versions of Intrado 911 Emergency Gateway (EGW) are affected: Emergency Gateway 7.x (CVE-2026-6074), Emergency Gateway 6.x (CVE-2026-6074), Emergency Gateway 5.x (CVE-2026-6074)"},{"id":"274bea51-7980-4bcc-9243-34bb440c0f03","entity_name":"Carlson Software VASCO-B GNSS Receiver","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":94,"summary":"Successful exploitation of this vulnerability could enable a remote attacker to alter critical system functions or disrupt device operation.The following versions of Carlson Software VASCO-B GNSS Receiver are affected:\nVASCO-B GNSS Receiver <1.4.0 (CVE-2026-3893)"},{"id":"47047e74-666a-4a67-91a4-d6d558195afd","entity_name":"Liberty Bankers Life Ins. Co.","reported_date":"2026-05-10","state":"TX","individuals_affected":20202,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"c5ca0c35-7196-4361-a090-4b65765c6eaa","entity_name":"Unusual access pattern on patient records","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"32540a01-1878-4ea2-a89b-50238feadda1","entity_name":"Robocall spoofing internal extension","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"0d425f22-6baa-4bfe-b8cd-d831be5d9d0f","entity_name":"Laurel Eye Clinic","reported_date":"2026-05-19","state":"PA","individuals_affected":145221,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"0edac3e3-b686-4e85-b695-72a2bc1903bf","entity_name":"Harbor Developmental Disabilities Foundation (d/b/a Harbor Regional Center)","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Unknown"},{"id":"e0fe85a8-7f8c-478a-b458-3187ea990005","entity_name":"Silex Technology SD-330AC and AMC Manager Incorrect Privilege Assignment Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":68,"summary":"An issue discovered in Silex Technology DS-600 Firmware v.1.4.1 allows a remote attacker to cause a denial of service via crafted UDP packets using the EXEC REBOOT SYSTEM command."},{"id":"3eecc289-ddbb-4f56-8959-777fa678e528","entity_name":"Silex Technology SD-330AC and AMC Manager CRLF Injection Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":65,"summary":"An Improper Neutralization of CRLF Sequences ('CRLF Injection') vulnerability in Silex Technology SD-330AC and AMC Manager could allow an attacker to inject arbitrary entries into the system configuration."},{"id":"b28f7d37-6130-4b46-aaaf-355e0099daf7","entity_name":"Silex Technology SD-330AC and AMC Manager Heap-based Buffer Overflow Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":98,"summary":"A Heap-based Buffer Overflow vulnerability in Silex Technology SD-330AC and AMC Manager could allow an attacker to execute arbitrary code on the device."},{"id":"0b5c6d53-11cb-4bcd-918b-2143b67e15bf","entity_name":"Silex Technology SD-330AC and AMC Manager Initialization of a Resource with an Insecure Default Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":75,"summary":"An Initialization of a Resource with an Insecure Default vulnerability in Silex Technology SD-330AC and AMC Manager could allow an attacker using the factory default configuration to configure the device using the null string password."},{"id":"08d75899-1acb-4c5a-8dad-0e3d638f220c","entity_name":"Silex Technology SD-330AC and AMC Manager Use of Hard-coded Cryptographic Key Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":65,"summary":"A Use of Hard-coded Cryptographic Key vulnerability in Silex Technology SD-330AC and AMC Manager could cause an administrative user to be directed to apply a fake firmware update."},{"id":"b4ec904f-ce9c-4375-b93c-5ddac1648f6c","entity_name":"Silex Technology SD-330AC and AMC Manager Cross-site Scripting Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":61,"summary":"An Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') vulnerability in Silex Technology SD-330AC and AMC Manager could allow an attacker to trick a user into accessing a special web page and execute arbitrary script on the user's browser."},{"id":"e18a180d-27f8-401f-a5fe-ecead6f7f2fd","entity_name":"Silex Technology SD-330AC and AMC Manager Dependency on Vulnerable Third-Party Component Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":75,"summary":"The snmp_pdu_parse function in snmp_api.c in net-snmp 5.7.2 and earlier does not remove the varBind variable in a netsnmp_variable_list item when parsing of the SNMP PDU fails, which allows remote attackers to cause a denial of service (crash)."},{"id":"8b5fb002-4e5f-43e3-9920-76f424c1ba7a","entity_name":"Silex Technology SD-330AC and AMC Manager Missing Authentication for Critical Function Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":53,"summary":"A Missing Authentication for Critical Function vulnerability in Silex Technology SD-330AC and AMC Manager could allow uploads of arbitrary files to the device without authentication."},{"id":"c13564fc-6241-4f76-a717-3598a46c00eb","entity_name":"Siemens TPM 2.0","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":66,"summary":"The products listed below contain a vulnerability that could allow an attacker to perform an out-of-bound read, potentially leading to information disclosure or denial of service of the TPM. Siemens has released new versions for several affected products and recommends to update to the latest versions. Siemens is preparing further fix versions and recommends countermeasures for products where fixes are not, or not yet available."},{"id":"42c02bed-48ba-48fd-8d69-3ec04c6a4cab","entity_name":"Credential harvesting email targeting front desk","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"20d909b9-2d55-44f1-88a5-c9ddfde42781","entity_name":"Silex Technology SD-330AC and AMC Manager Missing Authentication for Critical Function Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":53,"summary":"A Missing Authentication for Critical Function vulnerability in Silex Technology SD-330AC and AMC Manager could allow an attacker to alter the device configuration without authentication."},{"id":"d564e25f-dde9-448e-a045-4e8d36a45d3c","entity_name":"Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary Incorrect Privilege Assignment Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":88,"summary":"User Administrators are allowed to administer groups they belong to. This could allow an authenticated User Administrator to escalate their own privileges and grant themselves access to any device group at any access level."},{"id":"818def70-4885-4f36-86c5-63d01bc086a9","entity_name":"Silex Technology SD-330AC and AMC Manager Use of a Broken or Risky Cryptographic Algorithm Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":59,"summary":"A Use of a Broken or Risky Cryptographic Algorithm vulnerability in Silex Technology SD-330AC and AMC Manager could allow an attacker to retrieve information via a man-in-the-middle attack."},{"id":"0fa80082-832d-4d7d-8a5e-cf5233805a15","entity_name":"Silex Technology SD-330AC and AMC Manager Heap-based Buffer Overflow Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":53,"summary":"A Heap-based Buffer Overflow vulnerability in Silex Technology SD-330AC and AMC Manager could allow an attacker to send specially crafted packets that may cause a temporary denial-of-service (DoS) condition."},{"id":"959849aa-8d80-4a14-b283-41df2e55923b","entity_name":"Silex Technology SD-330AC and AMC Manager","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":98,"summary":"Successful exploitation of these vulnerabilities could allow an attacker to execute arbitrary code, cause a denial-of-service, or configuration information may be altered without authentication."},{"id":"9fe5c417-67d1-4e3d-ba63-5a5542c13f15","entity_name":"Siemens RUGGEDCOM CROSSBOW Secure Access Manager Primary","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":88,"summary":"RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) contains a vulnerability that could allow an attacker to escalate their own privileges. Siemens has released a new version for RUGGEDCOM CROSSBOW Secure Access Manager Primary (SAM-P) and recommends to update to the latest version."},{"id":"054748ef-36d9-4635-b52f-4cb8322aad58","entity_name":"Silex Technology SD-330AC and AMC Manager Stack-based Buffer Overflow Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":88,"summary":"A Stack-based Buffer Overflow vulnerability in Silex Technology SD-330AC and AMC Manager could allow an attacker to execute arbitrary code on the device."},{"id":"85a44e20-712c-4228-b75e-7c36f7a7ea27","entity_name":"Silex Technology SD-330AC and AMC Manager Sensitive Information in Resource Not Removed Before Reuse Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":65,"summary":"A Sensitive Information in Resource Not Removed Before Reuse vulnerability in Silex Technology SD-330AC and AMC Manager could allow an attacker to send specially crafted packets that may allow the attacker to login to the device."},{"id":"c70a8e58-2896-40c0-bb33-f19aab90409e","entity_name":"Siemens TPM 2.0 Out-of-bounds Read Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":66,"summary":"TCG TPM2.0 Reference implementation's CryptHmacSign helper function is vulnerable to Out-of-Bounds read due to the lack of validation the signature scheme with the signature key's algorithm. See Errata Revision 1.83 and advisory TCGVRT0009 for TCG standard TPM2.0."},{"id":"2feb82dc-1096-4c7f-8568-f9282463b3cd","entity_name":"Cisco Catalyst SD-WAN Manager - Cisco Catalyst SD-WAN Manager Exposure of Sensitive Information to an Unauthorized Actor Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Cisco Catalyst SD-WAN Manager contains an exposure of sensitive information to an unauthorized actor vulnerability that could allow remote attackers to view sensitive information on affected systems."},{"id":"0ba8f4dd-1bfc-478b-aaee-ef4d892e8009","entity_name":"Prime Care 12 Priority Health","reported_date":"2026-05-11","state":"WV","individuals_affected":1000,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"9d95380d-b995-43ad-b53a-41d041c1882e","entity_name":"Cisco Catalyst SD-WAN Manger - Cisco Catalyst SD-WAN Manager Incorrect Use of Privileged APIs Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Cisco Catalyst SD-WAN Manager contains an incorrect use of privileged APIs vulnerability due to improper file handling on the API interface of an affected system. An attacker could exploit this vulnerability by uploading a malicious file on the local file system. A successful exploit could allow the attacker to overwrite arbitrary files on the affected system and gain vmanage user privileges."},{"id":"3ecff05a-b417-4450-b3b1-6e357262c59a","entity_name":"Employee sharing credentials via email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"8b428c9b-6ede-439d-8ce6-8504e9612bcc","entity_name":"Cisco Catalyst SD-WAN Manager - Cisco Catalyst SD-WAN Manager Storing Passwords in a Recoverable Format Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Cisco Catalyst SD-WAN Manager contains a storing passwords in a recoverable format vulnerability that allows an authenticated, local attacker to gain DCA user privileges by accessing a credential file for the DCA user on the filesystem as a low-privileged user."},{"id":"21bbfbea-df6d-483e-84bf-490b00510e22","entity_name":"Rogue access point identified","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"An unregistered device was detected attempting to connect to the secure network."},{"id":"4fff3540-c250-4010-81cf-444def3c3b87","entity_name":"Elevance Health (formerly Anthem, Inc.)","reported_date":null,"state":"IN","individuals_affected":150000,"source_type":"state_ag","severity_score":85,"summary":"A data breach at a third-party vendor, which exposed personal health information of members. This potentially included names, addresses, health plan information, and clinical information."},{"id":"445f5b87-841c-4f7f-a55f-3a4d5ffcc2d5","entity_name":"Unauthorized IoT device on network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"ee9ed687-511d-4fcf-ae8d-ccc8f8e6126e","entity_name":"PharmaCare Solutions","reported_date":null,"state":"IN","individuals_affected":75000,"source_type":"state_ag","severity_score":70,"summary":"PharmaCare Solutions reported a data breach involving patient names, prescription information, and insurance details."},{"id":"686ba69f-3462-4ead-a1b2-55bb0ec4c942","entity_name":"Spokane Digestive Disease Center, P.S.","reported_date":"2026-05-11","state":"WA","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"e99e1ca0-5267-4b00-bea8-f4a9d52bbf3e","entity_name":"Managed Health Care Associates, Inc. (MHA)","reported_date":null,"state":"WI","individuals_affected":800000,"source_type":"state_ag","severity_score":95,"summary":"MHA experienced a cybersecurity incident related to the MOVEit file transfer application vulnerability."},{"id":"0b556010-49bc-4a87-b436-1e0c9ebf8e86","entity_name":"Synnovis (South London and Maudsley NHS Foundation Trust)","reported_date":"2026-04-20","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":36,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. The Qilin ransomware attack on Synnovis in 2024 continues to impact patient care at South London and Maudsley NHS Foundation Trust, with pathology systems still unrestored."},{"id":"e9b454c7-5f6b-4e27-9839-84df1a25caf3","entity_name":"Synnovis","reported_date":"2026-04-23","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":40,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. The Qilin ransomware attack on Synnovis in 2024 continues to impact patient care for at least one NHS Trust, with pathology systems at South London and Maudsley NHS Foundation Trust (SLaM) still unrestored."},{"id":"9e1848ca-07b8-498d-a82a-ba727591fe8a","entity_name":"NHS vendor Synnovis","reported_date":"2026-04-30","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":40,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. The Qilin ransomware attack on Synnovis in 2024 continues to impact patient care for at least one NHS Trust, South London and Maudsley NHS Foundation Trust (SLaM)."},{"id":"e57af8c6-bd8c-4e73-89e1-68655038dcf5","entity_name":"Physicians' Eye Care","reported_date":null,"state":"WI","individuals_affected":42000,"source_type":"state_ag","severity_score":70,"summary":"Unauthorized access to IT systems and data exfiltration occurred between August 4, 2025, and August 21, 2025."},{"id":"862193f1-e937-4b8d-8659-f89ec9f67aae","entity_name":"Rogue access point identified","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"94d6a964-5f51-4cc5-85eb-7419a23066b7","entity_name":"NHS (Synnovis)","reported_date":"2026-04-29","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":40,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. The Qilin ransomware attack on Synnovis in 2024 continues to impact patient care for at least one NHS Trust."},{"id":"38617572-e1c9-4f24-ac1c-6649a54de88d","entity_name":"Employee sharing credentials via email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"1d0547fe-e566-40f0-b2c0-b337b50eef08","entity_name":"Vishing attempt requesting PHI","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"402f22f2-a2ba-4af4-913d-2fdd8ea9224d","entity_name":"Caller requesting patient info without verification","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"ce3d7655-21aa-43f9-93cd-cb7874b01448","entity_name":"Caller impersonating IT support","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"936cd20e-5f0d-475b-bde5-3b9c5cc71cfc","entity_name":"Suspicious LinkedIn message from fake recruiter","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Individual attempted to gain physical access to restricted area using false pretenses."},{"id":"c587e3ea-9c49-4bfc-aba0-1acbf9ae7580","entity_name":"Phishing attempt posing as EHR vendor","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Message attempted to harvest credentials by impersonating the IT department."},{"id":"f3c9a0f7-2600-4d1f-b84d-7565e359544a","entity_name":"Blue Cross Blue Shield of Montana (HCSC)","reported_date":"2026-04-30","state":"MT","individuals_affected":462000,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. A lawsuit involving Blue Cross Blue Shield of Montana's parent company, HCSC, and Montana's state auditor was updated regarding a data breach caused by Conduent that affected 462,000 members."},{"id":"eae773d0-24f5-458e-af6d-de4fdfb61fe0","entity_name":"Suspicious email mimicking insurance provider","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"0f6e7d8e-8c0e-4c35-9f28-f4da721e1c46","entity_name":"Conduent","reported_date":"2026-04-23","state":null,"individuals_affected":462000,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. A breach at Conduent affected 462,000 members of Blue Cross Blue Shield of Montana."},{"id":"6138593d-43ba-46ae-b137-145733bdc2bf","entity_name":"Blue Cross Blue Shield of Montana (via Conduent)","reported_date":"2026-04-19","state":"MT","individuals_affected":462000,"source_type":"modeled_breach","severity_score":54,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. A lawsuit involves Blue Cross Blue Shield of Montana's parent company, HCSC, and Montana's state auditor regarding the Conduent breach that affected 462,000 members."},{"id":"27edce99-0a40-43c0-bfe4-13f5c915e229","entity_name":"Mid-Michigan physician group","reported_date":null,"state":"WI","individuals_affected":20000,"source_type":"state_ag","severity_score":70,"summary":"Patient data accessed or acquired during a December 2025 ransomware incident."},{"id":"bc7ad3ca-1653-4336-af83-359d61b3d4aa","entity_name":"Independent Health","reported_date":null,"state":"WI","individuals_affected":35000,"source_type":"state_ag","severity_score":70,"summary":"A third-party vendor experienced a cybersecurity incident involving the MOVEit file transfer application, potentially impacting Independent Health members."},{"id":"93b52e9f-25fc-4ad4-9107-a8bb105288bc","entity_name":"Bayside Dental","reported_date":null,"state":"WA","individuals_affected":9683,"source_type":"state_ag","severity_score":50,"summary":"Breach at Bayside Dental"},{"id":"b1911cd1-0567-4cec-9941-71c1acede3af","entity_name":"L.A. Care Health Plan","reported_date":"2026-04-27","state":"CA","individuals_affected":2885,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"86fe71ce-e58a-4cea-8f9a-2e088a59f369","entity_name":"Lennox International Inc.","reported_date":"2026-04-27","state":"TX","individuals_affected":3709,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"a909d066-dbb4-4b22-93fb-bb71ea50fa34","entity_name":"After-hours login attempt detected","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"9bedb02d-a15d-4915-a9d5-d00cdeea9bbc","entity_name":"ASC Ortho Management Company, LLC  d/b/a Aligned Orthopedic Partners","reported_date":"2026-05-13","state":"MD","individuals_affected":7213,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"777df270-895f-4f44-9694-0d34538401dd","entity_name":"Innovative Scientific Solutions, LLC","reported_date":"2026-04-26","state":"SC","individuals_affected":143842,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"2b37d930-fbb1-4fac-acd5-747022aeb154","entity_name":"University of Nebraska Medical Center","reported_date":"2026-05-13","state":"NE","individuals_affected":26937,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"00a5bf35-ccec-4d4a-8201-187c62c32cea","entity_name":"NJ Division of Developmental Disabilities - Hunterdon Developmental Center","reported_date":"2026-05-17","state":"NJ","individuals_affected":807,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"cd3dc050-c905-4527-9c59-f642033e919a","entity_name":"Fake invoice attachment from unknown sender","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"d5903b60-4266-49d6-bf66-af80f3f56e01","entity_name":"Personal device connected to secure network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"e950ff0b-fc31-473a-b973-d180f699b3a6","entity_name":"Unauthorized IoT device on network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"3229108f-56e0-4389-8598-81b00d9deaff","entity_name":"Unauthorized IoT device on network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"70e33508-1d68-48a5-9bb4-88c2af5527de","entity_name":"Suspicious LinkedIn message from fake recruiter","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"7d3e6a69-3c3c-4d02-90a5-c28ff31bf906","entity_name":"Tailgating attempt at secure entrance","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"3e24994e-c3cb-4127-910d-b209c6a3af64","entity_name":"Anviz Multiple Products","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":98,"summary":"Successful exploitation of these vulnerabilities could allow attackers to conduct reconnaissance, capture or decrypt sensitive data, alter device configurations, gain unauthorized administrative or root‑level access, execute arbitrary code, compromise credentials or communications, and ultimately obtain full control over affected devices."},{"id":"7af2d36b-11ad-477a-9503-8e41d4736667","entity_name":"Iowa Department of Health and Human Services","reported_date":"2026-04-27","state":"IA","individuals_affected":6717,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"d4182e79-e59a-4594-b1fc-77f47541df39","entity_name":"Providence","reported_date":null,"state":"CA","individuals_affected":-1,"source_type":"state_ag","severity_score":30,"summary":"Unknown at this time."},{"id":"6a5bc464-3128-4105-90b5-6271dc8cef17","entity_name":"Washington VA Medical Center","reported_date":"2026-04-27","state":"DC","individuals_affected":1467,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"1a328628-f30b-4b90-a327-227e23f1ec2d","entity_name":"Pacific Northwest Health System","reported_date":null,"state":"OR","individuals_affected":15000,"source_type":"state_ag","severity_score":70,"summary":"Insider threat incident where an employee inappropriately accessed patient records."},{"id":"9a92970f-33ee-4fcf-bc97-3c02cc513f14","entity_name":"Unapproved cloud storage use detected","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"06d9c075-718f-4b0e-ab0c-6ac83c8603ad","entity_name":"Mazzola Mardon, P.C.","reported_date":"2026-04-26","state":"NY","individuals_affected":2123,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"72fbb7dd-a4c2-4c46-b513-a8ffa8dd61e9","entity_name":"City Health, a medical corporation","reported_date":"2026-04-26","state":"CA","individuals_affected":65000,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"95144a3c-e99f-4753-b388-f6315f1bd17a","entity_name":"Defense Health Agency","reported_date":"2026-04-27","state":"VA","individuals_affected":1300,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"b22a6eac-7527-4bc5-8aa7-d00344a13f36","entity_name":"Community Psychiatry Management, LLC d/b/a Mindpath Health","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"This is a healthcare related data breach notification."},{"id":"72dafeab-e459-4be9-87f4-91b7f1ac707f","entity_name":"Pediatric Products, LLC","reported_date":null,"state":"CA","individuals_affected":-1,"source_type":"state_ag","severity_score":30,"summary":"Unknown at this time."},{"id":"b97ced6e-3053-44e0-a2c0-ac88e64f359e","entity_name":"Caller requesting patient info without verification","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"cd816ea9-4f5d-41c0-8f96-210df89b667e","entity_name":"Suspicious email mimicking insurance provider","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"0a8338ce-38c3-42cc-aa76-4a9fc8172e0d","entity_name":"Personal device connected to secure network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Removable media detected in a secure workstation without encryption."},{"id":"854ce456-a217-499e-924f-baee2292ef5e","entity_name":"Vishing attempt requesting PHI","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Repeated calls from spoofed numbers targeting the billing department."},{"id":"0ef263b0-c895-4da2-96a5-0649225905ce","entity_name":"Unauthorized IoT device on network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"7397ab28-4fa6-4805-a4c6-f38570c709bc","entity_name":"Repeated hang-up calls to reception","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Caller attempted to obtain patient information without proper verification."},{"id":"88133122-56e6-4fb6-989b-4276483a1d8e","entity_name":"ABB Ability Symphony Plus Engineering","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":88,"summary":"ABB became aware of vulnerability in the products versions listed as affected in the advisory. The ABB S+ Engineering product versions are affected by vulnerabilities in PostgreSQL version 13.11 and earlier versions. If an attacker gains access to a site’s S+ Client Server network, they could exploit such vulnerabilities by executing arbitrary code and potentially compromising the entire system. The following versions of ABB Ability Symphony Plus Engineering are affected: Ability Symphony Plus 2.2, 2.3, 2.3_RU1, 2.3_RU2, 2.3_RU3, 2.4, 2.4_SP1, 2.4_SP2, 2.4_SP2_RU1."},{"id":"5568da79-b04b-419f-9676-0b076976d3fa","entity_name":"ABB Ability Symphony Plus Engineering","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":88,"summary":"ABB became aware of vulnerability in the products versions listed as affected in the advisory. The ABB S+ Engineering product versions are affected by vulnerabilities in PostgreSQL version 13.11 and earlier versions. If an attacker gains access to a site’s S+ Client Server network, they could exploit such vulnerabilities by executing arbitrary code and potentially compromising the entire system."},{"id":"8b23af90-b2f8-4ea8-9d64-529c449df811","entity_name":"Caller requesting patient info without verification","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"cc136965-ce2d-459b-ab26-1acab1e63d81","entity_name":"Fortinet FortiClient EMS - Fortinet SQL Injection Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Fortinet FortiClient EMS contains a SQL injection vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via specifically crafted HTTP requests."},{"id":"bb5d1e41-6bd4-43f8-8a74-5468c5864809","entity_name":"Instabase, Inc.","reported_date":"2026-04-27","state":"DE","individuals_affected":908,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"2347922f-930e-498d-a8fc-0798f8064dd6","entity_name":"A-Z License List","reported_date":null,"state":"WI","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"The 'A-Z License List' appears under the 'Licenses/Permits' navigation, suggesting it's an entity that issues or manages licenses related to various regulated activities."},{"id":"23ccbb16-0ef3-4700-a913-8d513ca1db09","entity_name":"Suspicious voicemail from unknown number","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"582281a0-dedf-4593-b0ca-57ac5f7efcc1","entity_name":"Robocall spoofing internal extension","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"a224a42c-5a3d-4434-bbb9-c3fe86c8fb09","entity_name":"Rogue access point identified","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"f20c0a1e-f496-4874-aa94-d0b97ee11721","entity_name":"Pretexting call requesting employee directory","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 97201."},{"id":"88db5e8b-9dcc-4eaf-aa73-6f031e4668f8","entity_name":"Suspicious voicemail from unknown number","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Repeated calls from spoofed numbers targeting the billing department."},{"id":"a02b5a6d-d571-451e-9d87-2cd00fe14153","entity_name":"Unusual access pattern on patient records","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":null},{"id":"a4651df7-6cba-42dd-a269-9bc8ae8f4357","entity_name":"Unknown device detected on clinic WiFi","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"526cfb54-fb43-4414-9925-c0f442c40997","entity_name":"Tailgating attempt at secure entrance","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 37201."},{"id":"2304bf80-5f86-4fcc-850c-835135d38814","entity_name":"Unauthorized IoT device on network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 63101."},{"id":"76bd6458-54b6-4751-8e45-e84079536094","entity_name":"Vishing attempt requesting PHI","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Automated threat signal detected in zip code 98101."},{"id":"b37916f3-cbf8-4962-8dbe-870091a53509","entity_name":"Login from unrecognized IP address","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 90210."},{"id":"932dda41-93b5-47b6-8052-c3e44d622e7b","entity_name":"Hims","reported_date":"2026-04-11","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":40,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Threat actors breached the telehealth brand Hims, potentially exposing sensitive protected health information including data related to hair loss, weight, and erectile dysfunction."},{"id":"c661fd29-74ce-422f-b2bd-c915b7b322d2","entity_name":"Robocall spoofing internal extension","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 98101."},{"id":"9b22d716-9423-4f61-8aab-5ee0838ea80c","entity_name":"Access attempt from retired employee credentials","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Automated threat signal detected in zip code 46201."},{"id":"c941871f-f9cc-45a8-aa22-df02165688b3","entity_name":"Unusual access pattern on patient records","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Automated threat signal detected in zip code 30301."},{"id":"65abb9db-d17b-44d6-bc32-2f549f440fc5","entity_name":"Branch Metrics, Inc.","reported_date":"2026-04-27","state":"CA","individuals_affected":857,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"3de7f7bf-edb4-4439-baa0-ce6d1063ddc9","entity_name":"CARE Clinic","reported_date":"2026-04-26","state":"MN","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"2a84c057-42a8-4942-bd15-41c8df284c08","entity_name":"Springfield Hospital","reported_date":"2026-04-26","state":"VT","individuals_affected":5892,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"764e9d7b-caed-41c2-84a1-61c3c5fb0305","entity_name":"BUENA VISTA MANAGEMENT SERVICES, LLC DBA Windward Life Care","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Data breach notification for BUENA VISTA MANAGEMENT SERVICES, LLC DBA Windward Life Care."},{"id":"2bda842d-dd7e-48fd-9758-1de6060b2021","entity_name":"Duncan Regional Hospital, Inc.","reported_date":"2026-04-27","state":"OK","individuals_affected":724,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"263b7527-6b5b-4064-84fc-b936508c206c","entity_name":"CardioFit Medical Group, Inc.","reported_date":"2026-04-27","state":"CA","individuals_affected":7243,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"63ffa004-cef4-4f53-a2b4-11ea140b4d78","entity_name":"CardioFit Medical Group, Inc.","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Data breach notification for CardioFit Medical Group, Inc."},{"id":"d43b2cae-6eb0-4f1a-88d9-1692eb6d4eee","entity_name":"Rogue access point identified","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 46201."},{"id":"08807ce6-1246-4081-9647-4e09f3da075e","entity_name":"Suspicious LinkedIn message from fake recruiter","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 63101."},{"id":"b991f63d-3c12-4e8e-ad6a-32304f19337a","entity_name":"Access attempt from retired employee credentials","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 37201."},{"id":"a52b3a6d-c706-453c-bbae-f7cd4b165420","entity_name":"Unencrypted USB device found in workstation","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Automated threat signal detected in zip code 46201."},{"id":"5112e0af-d91d-49ab-b557-a66191ae6d2e","entity_name":"Impersonation of vendor representative","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Automated threat signal detected in zip code 63101."},{"id":"8192c574-d853-40a6-9dcb-99577d4234aa","entity_name":"Access attempt from retired employee credentials","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Automated threat signal detected in zip code 02101."},{"id":"97c7f1bc-c6f2-4049-9e36-3341240875b1","entity_name":"Tailgating attempt at secure entrance","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Automated threat signal detected in zip code 63101."},{"id":"9dd19dde-8240-4083-9981-f671c8d0679f","entity_name":"Unregistered tablet accessing EHR system","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Automated threat signal detected in zip code 19101."},{"id":"fd0a0037-3a77-4128-9340-406d9e1722c9","entity_name":"Credential harvesting email targeting front desk","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 15201."},{"id":"24e86561-445b-4f69-aaff-cd3b0ed65b8a","entity_name":"Ivanti Endpoint Manager Mobile (EPMM) - Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution."},{"id":"821219e7-e927-400a-922c-005c25a8a896","entity_name":"Rogue access point identified","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 78201."},{"id":"8192cb0a-5886-4adf-9c05-c535f497c3f3","entity_name":"TEXCAZ Insurance Services","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"This is a healthcare related data breach notification as it is an insurance entity."},{"id":"c3625ce5-d327-4374-9a1c-aa7541cbd9a8","entity_name":"DermCare Management","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"N/A"},{"id":"01761ea7-301c-4cba-b4fc-1a32e870cf19","entity_name":"Employee sharing credentials via email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 90210."},{"id":"315f24b9-50e3-4e52-b15f-5b410e138560","entity_name":"Change Healthcare","reported_date":"2026-04-09","state":"IA","individuals_affected":2200000,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Iowa Attorney General Brenna Bird has filed a lawsuit against Change Healthcare, alleging the company violated state consumer protection and data security laws in connection with a 2024 data breach that affected nearly 2.2 million Iowa residents."},{"id":"7f9ebe66-777c-4ae9-ab0d-f3b967898876","entity_name":"Employee sharing credentials via email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 84101."},{"id":"656a8fbd-3f7a-4361-afbe-649dabace563","entity_name":"Multiple failed login attempts observed","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Automated threat signal detected in zip code 85001."},{"id":"be47f17b-f644-413e-a0b2-24fc8db27f0a","entity_name":"Robocall spoofing internal extension","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 30301."},{"id":"d9f6f35a-07cd-4db2-85d5-b2c5e8e9c85c","entity_name":"Iranian-Affiliated Cyber Actors Exploit Programmable Logic Controllers Across US Critical Infrastructure","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Iran-affiliated advanced persistent threat (APT) actors are conducting exploitation activity targeting internet-facing operational technology (OT) devices, including programmable logic controllers (PLCs) manufactured by Rockwell Automation/Allen-Bradley. This activity has led to PLC disruptions across several U.S. critical infrastructure sectors through malicious interactions with the project file and manipulation of data on human machine interface (HMI) and supervisory control and data acquisition (SCADA) displays, resulting in operational disruption and financial loss. U.S. organizations should urgently review the tactics, techniques, and procedures (TTPs) and indicators of compromise (IOCs) in this advisory for indications of current or historical activity on their networks, and apply the recommendations listed in the Mitigations section of this advisory to reduce the risk of compromise."},{"id":"be4a728d-b628-448b-af1f-bfa4b6cdd96b","entity_name":"Access attempt from retired employee credentials","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 98101."},{"id":"f8bd81d6-c944-4675-8d59-73fa9644a062","entity_name":"Virginia Department of Behavioral Health and Developmental Services","reported_date":"2026-04-16","state":"VA","individuals_affected":724,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"cdc62832-9421-4fce-af73-c54a1e646dbc","entity_name":"Mitsubishi Electric GENESIS64 and ICONICS Suite products","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":88,"summary":"Successful exploitation of these vulnerabilities could allow a local attacker to disclose SQL Server credentials used by the affected products and use them to disclose, tamper with, or destroy data, or to cause a denial-of-service (DoS) condition on the system. The following versions of Mitsubishi Electric GENESIS64 and ICONICS Suite products are affected: GENESIS64 <=10.97.3 (CVE-2025-14815, CVE-2025-14816); ICONICS Suite <=10.97.3 (CVE-2025-14815, CVE-2025-14816); MobileHMI <=10.97.3 (CVE-2025-14815, CVE-2025-14816); Hyper Historian <=10.97.3 (CVE-2025-14815, CVE-2025-14816); AnalytiX <=10.97.3 (CVE-2025-14815, CVE-2025-14816); MC Works 64 vers:all/* (CVE-2025-14815, CVE-2025-14816); GENESIS <=11.02 (CVE-2025-14815, CVE-2025-14816)."},{"id":"afb33f2d-3ebb-4d0f-92cd-abc288b5048c","entity_name":"Personal device connected to secure network","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 37201."},{"id":"03608ae1-1825-4f22-90d0-c18bca2c9e42","entity_name":"Indiana Attorney General Todd Rokita","reported_date":null,"state":"IN","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"The Indiana Attorney General is committed to enforcing the Disclosure of Security Breach law to protect Hoosiers from identity theft. The office can seek up to $150,000 for data breaches that have not been properly disclosed to Indiana customers."},{"id":"a0405a9e-4eb6-4c81-842c-f88c166203aa","entity_name":"Option Care Health, Inc.","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"N/A"},{"id":"54eaa179-f15c-453e-9c9f-efaaf1e60c01","entity_name":"Heart South Cardiovascular Group","reported_date":"2026-04-21","state":"AL","individuals_affected":46666,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"c3d77f8c-f4b2-40e5-b0e4-fe111c37a733","entity_name":"Suspicious voicemail from unknown number","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":25,"summary":"Automated threat signal detected in zip code 84101."},{"id":"66a004ef-16e2-443f-a462-9ece716643fa","entity_name":"Hospital Caribbean Medical Center","reported_date":"2026-04-20","state":"","individuals_affected":92000,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"2aafd34e-29c5-424b-a8ee-a24b0f3d5dcf","entity_name":"LifeSpring Home Care","reported_date":"2026-05-14","state":"OK","individuals_affected":7509,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"4f8208e5-fae7-4c08-ae09-a7804584c784","entity_name":"Option Care Health, Inc.","reported_date":"2026-04-21","state":"IL","individuals_affected":1891,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"eafb1f13-9d10-4227-9ac4-f62b638bb4f5","entity_name":"Fortinet FortiClient EMS - Fortinet FortiClient EMS Improper Access Control Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Fortinet FortiClient EMS contains an improper access control vulnerability that may allow an unauthenticated attacker to execute unauthorized code or commands via crafted requests."},{"id":"bd034199-8f02-4011-a6ad-5b03f9915ce6","entity_name":"Shore Gardens Rehabilitation and Nursing Center, LLC","reported_date":"2026-05-20","state":"PA","individuals_affected":755,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"507dfae2-a0fb-4221-bf98-4fbb58ad4fb4","entity_name":"Hong Kong Hospital Authority","reported_date":"2026-04-05","state":null,"individuals_affected":56000,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. The Hong Kong Hospital Authority apologized for a large-scale data leak involving over 56,000 patients, which compromised their information."},{"id":"43a72a0e-316f-461e-a94e-119b7bdd3871","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Calls attempting to obtain sensitive information"},{"id":"cc0b5e30-6a0b-4cc9-ac71-b6b6a0ca7054","entity_name":"Village Heart Seller, PC d/b/a Village Heart & Vein Center","reported_date":"2026-04-20","state":"FL","individuals_affected":687,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"9cdcfcbf-23ec-41c5-b3c6-0696fd6602c9","entity_name":"Hims & Hers Health","reported_date":"2026-04-04","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":36,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Telehealth company Hims & Hers Health reported a data breach where support tickets were stolen from a third-party customer service platform, resulting in a security warning to users."},{"id":"d86e55ec-b413-4f8f-a84a-71208573eed3","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"They wanted password info"},{"id":"aeb07bb5-29a6-4de1-b75f-bd74aa9312e5","entity_name":"Rocky Mountain Associated Physicians, P.C.","reported_date":"2026-04-13","state":"UT","individuals_affected":50640,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"dfeceb0e-f3f4-46ad-b98e-dd6898faaad3","entity_name":"Yokogawa CENTUM VP","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":40,"summary":"Successful exploitation of this vulnerability could allow an attacker to login as the PROG user and modify permissions."},{"id":"8dcb2572-3166-45a8-804d-3b97cf2ff9cd","entity_name":"Hitachi Energy Ellipse","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":98,"summary":"Hitachi Energy is aware of a Jasper Report vulnerability that affects the Ellipse product versions mentioned in this document below. This vulnerability can be exploited to carry out remote code execution (RCE) attack on the product. Please refer to the Recommended Immediate Actions for information about the mitigation/remediation."},{"id":"afd3b731-f547-469e-944c-f34a93a2b85c","entity_name":"Hims & Hers, Inc.","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Unknown"},{"id":"32a17cdb-eaec-4ccc-9fb8-dd433b3dc0a4","entity_name":"Southern Illinois Dermatology","reported_date":"2026-04-20","state":"IL","individuals_affected":160312,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"e32bb6c8-7f47-4a4f-bc20-8d83a85e5a77","entity_name":"IntraCare","reported_date":"2026-04-03","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":40,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Auckland-based IntraCare, a private specialist healthcare provider, detected a breach in its network on March 20, and immediately took its IT systems offline to contain the incident. Procedures have been halted."},{"id":"8427639b-9f90-4c4d-a867-43383420292a","entity_name":"Nacogdoches Memorial Hospital","reported_date":"2026-04-03","state":"TX","individuals_affected":250000,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. In January 2026, a threat actor hacked the hospital’s internal network and stole personal and health information."},{"id":"0907e064-5cfe-4116-adc7-036441a1a495","entity_name":"CHP 11-99 Foundation","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"N/A"},{"id":"4203c758-c4be-4cb4-8520-810e63ba7acc","entity_name":"illumifin Corporation","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Unknown at this time. Only the entity name, breach date, and reported date are available from the provided HTML."},{"id":"1e25ce8f-e13b-4f58-90dc-115dea2720c0","entity_name":"Anritsu Remote Spectrum Monitor","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":98,"summary":"Successful exploitation of this vulnerability could allow attackers with network access to alter operational settings, obtain sensitive signal data, or disrupt device availability. The MS27102A Remote Spectrum Monitor is vulnerable to an authentication bypass that allows unauthorized users to access and manipulate its management interface. Because the device provides no mechanism to enable or configure authentication, the issue is inherent to its design rather than a deployment error."},{"id":"c62af9eb-5c55-4013-8d38-1e77c6e69016","entity_name":"Interventional Pain Center, PLLC","reported_date":"2026-04-09","state":"TN","individuals_affected":3171,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"b34b27bd-ab06-4563-86cf-e4960fd629ed","entity_name":"Waterford Surgical Center","reported_date":"2026-05-11","state":"MI","individuals_affected":9000,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"6ab50fdf-64d4-4791-a808-31f08787219d","entity_name":"Town of Apex, North Carolina","reported_date":"2026-05-17","state":"NC","individuals_affected":970,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"60c125f9-7feb-4d01-aa9e-d5748ca321e6","entity_name":"J. Arthur Trudeau Memorial Center","reported_date":"2026-05-18","state":"RI","individuals_affected":5630,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"6d71d0d3-905e-45c0-b9be-195300bae624","entity_name":"Nacogdoches Memorial Hospital n","reported_date":"2026-05-18","state":"TX","individuals_affected":2507073,"source_type":"hhs_breach","severity_score":95,"summary":""},{"id":"bba68f0a-4062-4664-b0a7-453f8d264b5e","entity_name":"Austin Plastic and Reconstructive Surgery","reported_date":"2026-05-11","state":"TX","individuals_affected":4266,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"d18d6e6c-85d4-4e01-8dd5-e9e0739b5882","entity_name":"Citrix NetScaler - Citrix NetScaler Out-of-Bounds Read Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Citrix NetScaler ADC (formerly Citrix ADC), NetScaler Gateway (formerly Citrix Gateway) and NetScaler ADC FIPS and NDcPP contain an out-of-bounds reads vulnerability when configured as a SAML IDP leading to memory overread."},{"id":"54cc229a-43a4-4552-b37d-67859f8379d9","entity_name":"CareCloud","reported_date":"2026-03-31","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":40,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Healthcare IT firm CareCloud has disclosed a data breach incident that exposed sensitive data and caused a network disruption lasting approximately eight hours."},{"id":"7be592b2-72a8-4e8e-a11b-3765ffe502fb","entity_name":"Anthem, Inc.","reported_date":null,"state":"WI","individuals_affected":538,"source_type":"state_ag","severity_score":30,"summary":"The large health insurance company, Anthem, Inc., notified 538 individuals on 2026-03-30 that their protected health information, including names, dates of birth, social security numbers, and health identification numbers, was accessed by an unauthorized third party."},{"id":"6ee49802-792c-4997-9db5-8b78e7e5b682","entity_name":"Healthcare In Action","reported_date":"2026-05-11","state":"CA","individuals_affected":1143,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"a7a12cab-d6a3-4035-8fd3-852f2b6956b1","entity_name":"Lumio Dental","reported_date":"2026-05-18","state":"OK","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"5aa8efd4-5a9f-47e7-8a30-0295b44bcd62","entity_name":"Corewell Health","reported_date":"2026-03-28","state":"MI","individuals_affected":1000,"source_type":"modeled_breach","severity_score":40,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Corewell Health announced their former health care consulting vendor, Pinnacle Holdings, experienced a data breach in 2024, affecting thousands of patients."},{"id":"4fb8c9b6-43de-4fdc-8b3f-fca42971a45c","entity_name":"Woodfords Family Services","reported_date":"2026-05-04","state":"ME","individuals_affected":38061,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"452c0674-bac7-4742-b9ae-1bf83f73dd45","entity_name":"Glendora Surgery Center","reported_date":"2026-05-17","state":"CA","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"ad5cf9cb-4d1b-4d0b-adf2-d4b25f669feb","entity_name":"F5 BIG-IP - F5 BIG-IP Unspecified Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"F5 BIG-IP APM contains an unspecified vulnerability that could allow a threat actor to achieve remote code execution."},{"id":"f432bbad-496c-4d25-88bb-7c4598f3bb3d","entity_name":"Rocky Mountain Care","reported_date":"2026-05-17","state":"UT","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"f2afff2e-a432-455c-97f0-b57ee8c38441","entity_name":"Erie Family Health Centers","reported_date":"2026-05-17","state":"IL","individuals_affected":570000,"source_type":"hhs_breach","severity_score":95,"summary":""},{"id":"f2526920-1a2c-4c38-a116-071604cde8b2","entity_name":"Proxycare, Inc.","reported_date":"2026-05-17","state":"FL","individuals_affected":45196,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"cbbdffd6-0912-48d6-a042-d0ce750c14d9","entity_name":"Nephrology Associates Medical Group","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Nephrology Associates Medical Group"},{"id":"853a6328-77e5-4da6-864a-263984f3f390","entity_name":"CORPORACION DE SERVICIOS MEDICOS PRIMARIOS Y PREVENCION DE HATILLO","reported_date":"2026-05-11","state":"","individuals_affected":24236,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"1136e6a4-62f8-4d00-871f-410c8fa398b5","entity_name":"Amedisys","reported_date":"2026-05-10","state":"LA","individuals_affected":9111,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"f9034263-2ed5-47ac-84b1-3feb7c6c4e22","entity_name":"LHC Group","reported_date":"2026-05-10","state":"LA","individuals_affected":8644,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"5eea209f-7ab4-4bd0-8230-8f609dce7c4d","entity_name":"Siemens SICAM 8 Products","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":75,"summary":"Multiple SICAM 8 products are affected by multiple vulnerabilities that could lead to denial of service. Siemens has released new versions for the affected products and recommends to update to the latest versions."},{"id":"f704e5e9-3ae7-40c0-960b-ef05208914d3","entity_name":"Cullen/Frost Bankers, Inc.","reported_date":"2026-05-14","state":"TX","individuals_affected":4698,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"d8e70455-cd26-4500-8a9e-92106b3207bd","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":"Suspicious emails targeting healthcare staff"},{"id":"4d0dec77-33fb-4d5d-a392-de16e2c089da","entity_name":"Medi-Rents & Sales, Inc.","reported_date":"2026-05-17","state":"MD","individuals_affected":1524,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"3aee37c3-404a-4b4d-aa22-064b614ee452","entity_name":"Securian Financial","reported_date":"2026-05-05","state":"MN","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"15edb750-2b32-49be-8cb8-0b974e42c8f5","entity_name":"Schneider Electric Plant iT/Brewmaxx","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":99,"summary":"Successful exploitation of these vulnerabilities could risk privilege escalation, which could result in remote code execution."},{"id":"c02fa090-c784-4215-9c0b-2f843d5de0ac","entity_name":"Fenwick & West Group Health Plan","reported_date":"2026-05-05","state":"CA","individuals_affected":1740,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"f5413a41-cfed-4876-83ee-ce61d3eec495","entity_name":"Mirra Health Care LLC","reported_date":"2026-03-25","state":"FL","individuals_affected":null,"source_type":"modeled_breach","severity_score":40,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Mirra Health Care LLC jeopardized the safety of thousands of Floridians by sharing their sensitive health data with unauthorized companies overseas in India and the Philippines."},{"id":"3c821f7f-9279-4070-a130-036a76379e43","entity_name":"Schneider Electric Plant iT/Brewmaxx","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":70,"summary":"The affected product uses Redis, an open-source, in-memory database. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to cause an integer overflow and potentially lead to remote code execution"},{"id":"3728ee3a-cc85-447d-ab08-2b707872b7c9","entity_name":"Schneider Electric EcoStruxure Foxboro DCS","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":65,"summary":"Schneider Electric is aware of a vulnerability in its EcoStruxure Foxboro DCS Control Software on Foxboro DCS workstations and servers. Control Core Services and all runtime software, like FCPs, FDCs, and FBMs, are not affected. The EcoStruxure Foxboro DCS ([https://www.se.com/ww/en/product-range/63680-ecostruxure-foxboro-dcs/](https://www.se.com/ww/en/product-range/63680-ecostruxure-foxboro-dcs/)) product is an innovative family of fault-tolerant, highly available control components, which consolidates critical information and elevates staff capabilities to ensure flawless, continuous plant operation. Failure to apply the remediation provided below may risk deserialization of untrusted data, which could result in loss of confidentiality, integrity and potential remote code execution on the compromised workstation."},{"id":"98876edc-d5c7-4e83-89ce-6f39da10f523","entity_name":"QualDerm","reported_date":"2026-03-25","state":null,"individuals_affected":3100000,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Hackers stole personal, medical, and health insurance information from QualDerm’s internal systems, impacting 3.1 million individuals."},{"id":"e0d92bcf-026b-4448-85f6-bb81d7670785","entity_name":"New York City Health and Hospitals Corporation","reported_date":"2026-05-18","state":"NY","individuals_affected":1800000,"source_type":"hhs_breach","severity_score":95,"summary":""},{"id":"2a96b494-4672-4847-82d7-29ea118f07fe","entity_name":"Coastal Carolina Health Care, PA","reported_date":"2026-05-11","state":"NC","individuals_affected":110304,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"17647089-d9fb-40f5-a380-f8716b8f5e45","entity_name":"Grassroots DICOM (GDCM)","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":75,"summary":"Successful exploitation of this vulnerability could allow an attacker to send a specially crafted file, and when parsed, could result in a denial-of-service condition."},{"id":"4d3d7c6d-d1ed-4ca1-a970-a4485277eb78","entity_name":"VirtuOx, LLC","reported_date":"2026-05-10","state":"FL","individuals_affected":621,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"30fcefc8-aa74-491c-b8cc-cca7d6cd4665","entity_name":"Schneider Electric Plant iT/Brewmaxx","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":99,"summary":"The affected product uses Redis, an open-source, in-memory database. Versions 8.2.1 and below allow an authenticated user to use a specially crafted Lua script to manipulate the garbage collector, trigger a use-after-free, and potentially lead to remote code execution."},{"id":"17931f5c-3d9c-4648-8683-bc935cafe059","entity_name":"Continental Casualty Company (CNA)","reported_date":"2026-05-10","state":"IL","individuals_affected":6086,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"925e416a-6858-4260-b215-e05709cf4fbc","entity_name":"Rosch Visionary Systems, Inc.","reported_date":"2026-05-19","state":"NY","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"cbf7e474-7ce2-4a8f-8540-f2bdc06ef416","entity_name":"Stryker","reported_date":"2026-03-31","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":40,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Medical device giant Stryker has confirmed that a March 11 cyberattack claimed by an Iran-linked group is now contained after investigators discovered and neutralized a hidden malicious file used by the threat actors to run device wiping commands."},{"id":"f4be5873-9a1a-4d7f-b0d4-21b9e80bdfcb","entity_name":"Expert MRI","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Expert MRI"},{"id":"ea3f1634-d0ae-49c3-8816-9128a0c660e5","entity_name":"OpenLoop Health","reported_date":"2026-03-28","state":null,"individuals_affected":3700000,"source_type":"modeled_breach","severity_score":48,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. A threat actor known as \"Stuckin2019\" allegedly affected OpenLoop Health and 3.7 million patients."},{"id":"98511e56-dcf0-4c84-86b6-bb7ab35567e6","entity_name":"Mays Housecall Home Health, Inc.","reported_date":"2026-05-14","state":"TX","individuals_affected":5208,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"4a5d3dbc-6402-4fcc-8c53-5eb82ba6684a","entity_name":"Navia","reported_date":"2026-03-21","state":null,"individuals_affected":2700000,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Hackers stole personal and health plan information from Navia's environment between late December 2025 and mid-January 2026, impacting 2.7 million individuals."},{"id":"f2c334c9-53ea-49ff-b3f4-0200fdf13f0e","entity_name":"Deaconess Health System","reported_date":"2026-04-29","state":"IN","individuals_affected":8941,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"ee4762c7-abaf-4acf-b6ac-e3d1f2cc4659","entity_name":"Stockton Cardiology Medical Group","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Stockton Cardiology Medical Group"},{"id":"2296589c-2a06-4ad2-aef3-43b5c148f0c0","entity_name":"Deaconess Health System","reported_date":"2026-03-20","state":"KY","individuals_affected":null,"source_type":"modeled_breach","severity_score":36,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. A data breach at a third-party medical records vendor exposed the personal and health information of patients at two Deaconess Health System hospitals in Western Kentucky."},{"id":"2cd85e6d-e4e9-4c1e-8646-ab35ef1dc0f4","entity_name":"BeyondFaith Homecare & Rehab, LLC","reported_date":"2026-04-29","state":"TX","individuals_affected":708,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"a7e77523-34b2-4275-9912-b0471514f4de","entity_name":"Cisco Secure Firewall Management Center (FMC) - Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management Deserialization of Untrusted Data Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Cisco Secure Firewall Management Center (FMC) Software and Cisco Security Cloud Control (SCC) Firewall Management contain a deserialization of untrusted data vulnerability in the web-based management interface that could allow an unauthenticated, remote attacker to execute arbitrary Java code as root on an affected device."},{"id":"3f2e803b-923c-480c-b92f-428ace708eab","entity_name":"Seoul National University Hospital","reported_date":"2026-03-20","state":null,"individuals_affected":16000,"source_type":"modeled_breach","severity_score":54,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Patient records of approximately 16,000 individuals were partially leaked from Seoul National University Hospital due to a clerical error where a staff member mistakenly entered the wrong email address while sending an internal message."},{"id":"0c86780e-8ce8-46a7-a4b1-a98bfe43494e","entity_name":"Complete Eye Care dba Orem Eye Clinic","reported_date":"2026-05-11","state":"UT","individuals_affected":5800,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"951a9b47-e729-49fd-b7f3-18c5cb120c43","entity_name":"Navia Benefit Solutions, Inc.","reported_date":"2026-05-17","state":"WA","individuals_affected":2151330,"source_type":"hhs_breach","severity_score":95,"summary":""},{"id":"5188657c-e290-4427-b714-10f5377eb606","entity_name":"New Horizons Behavioral Health","reported_date":"2026-05-17","state":"GA","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"9b2fe852-8270-43a7-a00c-804968fa23c1","entity_name":"Stockton Cardiology Medical Group","reported_date":"2026-05-20","state":"CA","individuals_affected":90000,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"98d467e8-c487-4120-9a61-7d18d33e05a3","entity_name":"The South Alabama Regional Planning Commission","reported_date":"2026-05-11","state":"AL","individuals_affected":3043,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"e3599385-afd4-49d3-a5d0-c3eb633ed89a","entity_name":"Navia Benefit Solutions, Inc.","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Navia Benefit Solutions, Inc."},{"id":"29ddb9e1-5054-48fc-af68-6e51980924a7","entity_name":"Navia Benefit Solutions, Inc. (City of Bellevue)","reported_date":null,"state":"WA","individuals_affected":319208,"source_type":"state_ag","severity_score":85,"summary":"Breach at Navia Benefit Solutions, Inc. (City of Bellevue)"},{"id":"82252939-5ff1-43b7-8312-34228c203e52","entity_name":"OpenLoop Health, Inc.","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"OpenLoop Health, Inc."},{"id":"bf365627-a634-4972-9fba-cf56603cc411","entity_name":"Amyris Incorporated Health and Welfare Plan","reported_date":"2026-04-29","state":"CA","individuals_affected":2042,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"7eae1b6e-9631-429f-8a5c-d8db5798dae6","entity_name":"OpenLoop Health, Inc.","reported_date":"2026-05-11","state":"IA","individuals_affected":716000,"source_type":"hhs_breach","severity_score":95,"summary":""},{"id":"83df0d2a-8c3e-4501-b078-1f684d28fcc3","entity_name":"Coastal Skin Surgery & Dermatology","reported_date":"2026-04-27","state":"FL","individuals_affected":6173,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"569ce6e1-95c6-4076-b12e-624b48e36596","entity_name":"Cascade Eyecare Center, PC","reported_date":null,"state":"OR","individuals_affected":410,"source_type":"state_ag","severity_score":30,"summary":"Breach notification from Cascade Eyecare Center, PC."},{"id":"cd6cb893-67d9-4708-ba9e-465dbb9a66cc","entity_name":"Premera Blue Cross","reported_date":null,"state":"IN","individuals_affected":11000000,"source_type":"state_ag","severity_score":95,"summary":"This breach affected Premera Blue Cross, Premera Blue Cross Blue Shield of Alaska, and affiliate brands, including Vivacity and Connection Dental. The cyberattack may have exposed names, dates of birth, addresses, telephone numbers, email addresses, Social Security numbers, bank account information, and claims information, including clinical information."},{"id":"0f2d15dc-3de4-4550-a7ac-044734398973","entity_name":"Walpole Area Visiting Nurse Association, Inc.","reported_date":"2026-04-27","state":"MA","individuals_affected":566,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"9d816c38-81fa-4afe-96f8-f92ffd4df7af","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":"Suspicious emails targeting healthcare staff"},{"id":"685fafe8-ce24-4db2-a24f-ee90257ea6e2","entity_name":"Wound Technology Network","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Wound Technology Network"},{"id":"2587ca91-30c8-49e6-9f65-75385d3067ff","entity_name":"Renovo Chiropractic & Wellness","reported_date":"2026-04-27","state":"WA","individuals_affected":538,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"a87061ea-8e54-45af-82fb-27b706735e7e","entity_name":"Good Samaritan Health Center","reported_date":"2026-04-26","state":"GA","individuals_affected":10000,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"0be8b173-45c8-42ed-a759-8bc32df4a0db","entity_name":"Northern Regional Hospital","reported_date":"2026-04-27","state":"NC","individuals_affected":1575,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"48f9e032-b616-4edb-ba2f-8d15b2ee5252","entity_name":"UPMC","reported_date":"2026-04-20","state":"PA","individuals_affected":687,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"b2c75aa4-2aef-441d-b304-106b883e2411","entity_name":"A Path of Care Home Health and Hospice","reported_date":"2026-04-20","state":"OK","individuals_affected":3849,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"4cea0caf-de7a-4273-bec7-dfbc3d321144","entity_name":"Wonderland Child & Family Services","reported_date":"2026-04-27","state":"WA","individuals_affected":1283,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"a70e3f01-b7a8-44fc-b7fa-61a2cb94d8be","entity_name":"Georgia Vascual Specialists PC","reported_date":"2026-05-20","state":"GA","individuals_affected":600,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"09079730-faa8-46ce-9dcf-1a1525652921","entity_name":"Ideal Home Care","reported_date":"2026-04-27","state":"OK","individuals_affected":1331,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"6aefe6ea-ce39-48c0-9136-36f0dd1d8fe3","entity_name":"MedPeds Associates of Sarasota","reported_date":"2026-04-20","state":"FL","individuals_affected":22017,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"e583c266-c52c-4a1d-9647-0f783f53d2e3","entity_name":"Bloom Circle, Inc. d/b/a Lena Health","reported_date":"2026-04-20","state":"TX","individuals_affected":3651,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"66ffcbe4-3288-4a3c-87ac-670447046273","entity_name":"Trinity Health","reported_date":"2026-04-26","state":"MI","individuals_affected":2740,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"7ae54847-d71c-471f-b49e-0372ca7ad7e1","entity_name":"Community Nurse","reported_date":"2026-04-16","state":"MA","individuals_affected":6746,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"8dae2197-f9cf-4682-a60d-e453c4701cca","entity_name":"Team Select","reported_date":"2026-04-20","state":"AZ","individuals_affected":949,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"cf36d03e-5634-48dd-a064-46a2e03be046","entity_name":"Defense Health Agency","reported_date":"2026-04-08","state":"VA","individuals_affected":96271,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"9d39a2e9-fac2-4962-92bf-d238f1fc28ac","entity_name":"Central Ohio Urology Group","reported_date":"2026-05-04","state":"OH","individuals_affected":4234,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"ef40d3b6-2482-4d73-84be-1dc651c913d0","entity_name":"Guardian Home Health Care, LLC","reported_date":"2026-04-16","state":"MA","individuals_affected":613,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"59e04f5d-ec10-4d12-b6fd-ec9f0390ca35","entity_name":"SSM Health","reported_date":"2026-04-20","state":"OK","individuals_affected":597,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"1d52ff8f-6676-4da1-b938-26ec5a57de7c","entity_name":"illumifin Corporation","reported_date":"2026-04-21","state":"MN","individuals_affected":5385,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"dd6bde22-cf99-4bce-a0a1-706fde55404e","entity_name":"NYC Health + Hospitals","reported_date":"2026-04-27","state":"NY","individuals_affected":5086,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"198cc463-c2c8-4614-bc04-37778657d49c","entity_name":"Ascension","reported_date":null,"state":"IN","individuals_affected":100000,"source_type":"state_ag","severity_score":70,"summary":"Hackers gained unauthorized access to patient data, which included names, dates of birth, addresses, and certain medical information."},{"id":"33d7dd20-e37d-4cee-a161-f954a453bc79","entity_name":"Delta Medical Systems","reported_date":"2026-04-21","state":"WI","individuals_affected":1574,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"52ed8751-680c-4461-a5ed-ef758e8cde3e","entity_name":"Omnissa Workspace One UEM - Omnissa Workspace ONE Server-Side Request Forgery","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Omnissa Workspace One UEM formerly known as VMware Workspace One UEM contains a server-side request forgery (SSRF) vulnerability that could allow a malicious actor with network access to UEM to send their requests without authentication and to gain access to sensitive information."},{"id":"731eebd4-c8d7-4869-a63d-76780d2e8f9d","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Calls attempting to obtain sensitive information"},{"id":"6921ec84-057e-4b4b-9370-a7522b8438d5","entity_name":"Ivanti  Endpoint Manager (EPM) - Ivanti Endpoint Manager (EPM) Authentication Bypass Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Ivanti Endpoint Manager (EPM) contains an authentication bypass using an alternate path or channel vulnerability that could allow a remote unauthenticated attacker to leak specific stored credential data."},{"id":"18b67e80-c8d3-406b-a479-4c578a85ef1b","entity_name":"Metropolitan Life Insurance Company","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Healthcare related data breach."},{"id":"5c4fe214-d3ba-448c-85a3-00a2142401db","entity_name":"Community Health Action of Staten Island","reported_date":"2026-04-21","state":"NY","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"ca1c6101-133e-49f9-b123-04b9c89bbec9","entity_name":"Indiana Department of Child Services","reported_date":null,"state":"IN","individuals_affected":160000,"source_type":"state_ag","severity_score":85,"summary":"Information about the Indiana Department of Child Services breach is available on the Attorney General website."},{"id":"5ddd12c7-ce15-458e-b98a-411a4bb52b4f","entity_name":"Tampa Bay Dental Implants & Periodontics","reported_date":"2026-05-17","state":"FL","individuals_affected":6400,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"cf146054-3ac9-4c65-abc1-14eaa07d7f3e","entity_name":"Cognizant TriZetto","reported_date":"2026-03-19","state":null,"individuals_affected":3400000,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. TriZetto Provider Solutions, a healthcare IT company, suffered a data breach exposing sensitive information of over 3.4 million patients."},{"id":"ca2caab4-4b10-4841-883a-bd17f453bbdb","entity_name":"County of Murray dba Murray County Medical Center","reported_date":"2026-04-20","state":"MN","individuals_affected":5073,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"3022ef98-4d89-4e7a-b0b5-2673539fa35b","entity_name":"Cedar Valley Hospice","reported_date":"2026-04-21","state":"IA","individuals_affected":10666,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"73de4b2d-b05a-4d57-9914-45312d89dc14","entity_name":"Metrocare","reported_date":"2026-05-15","state":"TX","individuals_affected":602,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"4a5de1d5-a76b-4c85-bdd6-979b2908f0be","entity_name":"Colorado Allergy & Asthma Centers, P.C.","reported_date":"2026-04-16","state":"CO","individuals_affected":2063,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"daa25788-18e3-42d1-95b5-209fabcb129a","entity_name":"Barrio Comprehensive Family Health Care Center","reported_date":"2026-04-21","state":"TX","individuals_affected":19971,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"2b67d2f7-ba2d-4e6e-881b-743b079dc79e","entity_name":"Saint Anthony Hospital","reported_date":"2026-04-20","state":"IL","individuals_affected":146108,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"18089ffa-af21-43e8-a39e-81c10e82cd40","entity_name":"Exclusive Physicians PLLC","reported_date":"2026-04-21","state":"MI","individuals_affected":58000,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"888008c3-2a52-4f23-b520-5a78a8355ec8","entity_name":"North Texas Behavioral Health Authority","reported_date":"2026-04-20","state":"TX","individuals_affected":285086,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"e1c1cf33-cde1-4a61-b061-37475c7b6148","entity_name":"Northwest Medical Homes, LLC","reported_date":null,"state":"OR","individuals_affected":98527,"source_type":"state_ag","severity_score":70,"summary":"Breach notification from Northwest Medical Homes, LLC."},{"id":"a281050f-f2ce-45c4-a231-668885a377cc","entity_name":"Elite Dental Associates","reported_date":null,"state":"IN","individuals_affected":15000,"source_type":"state_ag","severity_score":70,"summary":"Elite Dental Associates experienced a security incident that led to the exposure of patient names, contact information, dental records, and billing information."},{"id":"d7f041d9-0481-4403-822b-cc9468657c9c","entity_name":"Insightin Health, Inc. (Centene Corporation)","reported_date":null,"state":"WA","individuals_affected":11740,"source_type":"state_ag","severity_score":70,"summary":"Data breach notification from Insightin Health, Inc. (Centene Corporation)"},{"id":"fa82730f-d093-4eef-93da-da63688741f4","entity_name":"Insightin Health, Inc.","reported_date":null,"state":"OR","individuals_affected":1144686,"source_type":"state_ag","severity_score":95,"summary":"Breach notification from Insightin Health, Inc."},{"id":"5babbccf-3c27-4b01-bd6c-d858fcb41794","entity_name":"Tieu Dental Corporation","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Healthcare related data breach."},{"id":"69160163-b967-4822-b0b4-af39f789c820","entity_name":"Tieu Dental Corporation","reported_date":"2026-04-13","state":"CA","individuals_affected":8918,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"6c5467f1-04c0-4b78-a767-ad508b2abbc3","entity_name":"Longevity Health Plan","reported_date":"2026-04-16","state":"FL","individuals_affected":15000,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"3718053b-39d9-4cbc-9108-3a150697ad4a","entity_name":"Dermatology Associates","reported_date":"2026-04-08","state":"KY","individuals_affected":63657,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"f91b2dc9-b27f-4c84-b454-2af943da06cf","entity_name":"21st Century Oncology","reported_date":null,"state":"WI","individuals_affected":2200000,"source_type":"state_ag","severity_score":95,"summary":"21st Century Oncology announced a data breach that exposed patient information following unauthorized access to its network database. The compromised data includes names, social security numbers, insurance information, and medical diagnoses."},{"id":"02941429-bd51-4170-acbc-eb28b09f9a14","entity_name":"Clement Manor","reported_date":null,"state":"OR","individuals_affected":16046,"source_type":"state_ag","severity_score":70,"summary":"Breach notification from Clement Manor."},{"id":"d5782d77-cfb0-4169-90a9-188689cc8244","entity_name":"Brown Advisory LLC","reported_date":null,"state":"WA","individuals_affected":2,"source_type":"state_ag","severity_score":30,"summary":"Data breach"},{"id":"671ca3bd-addc-49a5-a292-39670c319401","entity_name":"Broadcom VMware Aria Operations - Broadcom VMware Aria Operations Command Injection Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Broadcom VMware Aria Operations formerly known as vRealize Operations (vROps) contains a command injection vulnerability that allows an unauthenticated attacker to execute arbitrary commands, potentially leading to remote code execution during support‑assisted product migration."},{"id":"19bbcbf2-a0ba-44ce-b715-3a23440963d0","entity_name":"Valley Radiology Consultants Medical Group","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Healthcare related data breach."},{"id":"c658d2a9-6996-4cf4-9c64-e890038af08f","entity_name":"Kin Counseling Services PLLC","reported_date":"2026-04-13","state":"CO","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"11dd236f-602f-4c7b-9626-9747a46bdeb0","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":"Calls attempting to obtain sensitive information"},{"id":"0a4d5dee-1d1b-4ec0-a0b5-7d3dd933a0af","entity_name":"Palo Verde Hospital","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Healthcare related data breach."},{"id":"268d9c3d-fa19-4bc5-b22c-bd6733448004","entity_name":"Houston Dermatology Specialists","reported_date":"2026-05-19","state":"TX","individuals_affected":648,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"0addbbb6-0028-498c-bc14-fb4eab8ed148","entity_name":"City Health, a medical corporation","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"This is a healthcare related data breach notification."},{"id":"2d10fc5f-4ef5-43fa-9542-8a847eebf14f","entity_name":"Eli Lilly and Company","reported_date":null,"state":"IN","individuals_affected":10000,"source_type":"state_ag","severity_score":50,"summary":"Third-party vendor data breach impacting patient program information."},{"id":"278fccc8-e83e-4f2b-a9e5-ce199cc393f3","entity_name":"New York Life","reported_date":null,"state":"ND","individuals_affected":80920,"source_type":"state_ag","severity_score":70,"summary":"Impacted individuals received a notice from New York Life, which experienced a data breach stemming from a MOVEit Transfer attack, where an unauthorized third party exploited a vulnerability to access files."},{"id":"94c13545-080e-4d8c-9c00-28fe61ba39ea","entity_name":"Access Information Management Shared Services, LLC","reported_date":"2026-05-13","state":"MA","individuals_affected":1522,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"de208971-70fd-4c3a-a2cb-1f8bfbf331bd","entity_name":"Delta Dental of Indiana","reported_date":null,"state":"IN","individuals_affected":500000,"source_type":"state_ag","severity_score":85,"summary":"Third-party vendor data breach. Patient names, addresses, dates of birth, Social Security numbers, and health information were potentially exposed."},{"id":"7db5f837-049b-44ee-9548-cdcf7be7a8fc","entity_name":"Greater Boston Urology","reported_date":"2026-04-29","state":"MA","individuals_affected":4717,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"296c7a0c-a723-4d49-9f80-11c2ff20e0b5","entity_name":"Insurance ACE/Humana Inc.","reported_date":"2026-04-02","state":"KY","individuals_affected":1000,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"de43c4cb-d1f3-46f2-afde-e6e4a8c42886","entity_name":"IPPC Inc., IPPC of New York LLC, and Innovative Pharmacy LLC (collectively “IPPC”)","reported_date":"2026-04-08","state":"NJ","individuals_affected":133862,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"6fb61937-c75a-4e85-b025-80ab34e28e22","entity_name":"Boston Mountain Rural Health Center, Inc.","reported_date":"2026-04-06","state":"AR","individuals_affected":4800,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"59772fb9-3d1c-48bd-ae26-fc4801822ab3","entity_name":"Aetna","reported_date":"2026-04-09","state":"CT","individuals_affected":775,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"d6dcc932-27b4-4096-9767-66b861a66d6d","entity_name":"French Health Ministry (via third-party vendor)","reported_date":"2026-03-19","state":null,"individuals_affected":15000000,"source_type":"modeled_breach","severity_score":54,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Administrative details and medical notes of over 15 million people in France were hacked due to a breach involving third-party vendors/business associates."},{"id":"4a570e61-9b59-4d5a-9a6c-27189bba3530","entity_name":"French Health Ministry","reported_date":"2026-03-16","state":null,"individuals_affected":15000000,"source_type":"modeled_breach","severity_score":54,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. France's health ministry reported that administrative details and medical notes on more than 15 million people were hacked."},{"id":"d251f28b-2a33-433c-a13e-7d5643e9642e","entity_name":"MediMap","reported_date":"2026-03-16","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":40,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. MediMap, a medication management platform in New Zealand used by providers in aged care, disability services, hospices, and community health, went offline after hackers breached its system and reportedly changed some patient details."},{"id":"e92c1d07-76b6-4271-8114-92d67f287e7c","entity_name":"Nephrology Associates Medical Group, Inc","reported_date":"2026-04-06","state":"CA","individuals_affected":4631,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"a933217a-a627-42d2-b294-42b2ee47b185","entity_name":"Drivestream Inc.","reported_date":null,"state":"WA","individuals_affected":505,"source_type":"state_ag","severity_score":30,"summary":"Breach at Drivestream Inc."},{"id":"2a90954d-2284-4531-9b8b-d6e45599eeff","entity_name":"Lakeside Pediatrics & Adolescent Medicine, PLLC","reported_date":null,"state":"WA","individuals_affected":1314,"source_type":"state_ag","severity_score":50,"summary":"Breach at Lakeside Pediatrics & Adolescent Medicine, PLLC"},{"id":"8dd13e0b-f6e4-4cad-bdca-b515e9d80514","entity_name":"Geisinger Health","reported_date":"2026-03-16","state":null,"individuals_affected":1200000,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. A former Nuance employee, a business associate of Geisinger Health, admitted breaching more than 1.2 million Geisinger patient records after his employment was terminated but he still had access."},{"id":"7f8f9aad-7efc-47c4-91ed-fd510e96dbae","entity_name":"Oscar Health, Inc., on behalf of its affiliated covered entities: Oscar Health Plan, Inc.; Oscar Insurance Company of Florida; Oscar Health Plan of Ge","reported_date":"2026-04-02","state":"NY","individuals_affected":91350,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"df749a2b-c06d-4d03-8a6e-78d2ef4fab2b","entity_name":"Welltok, Inc.","reported_date":null,"state":"ND","individuals_affected":8490318,"source_type":"state_ag","severity_score":95,"summary":"Impacted individuals received a notice from Welltok, which experienced a data breach stemming from a MOVEit Transfer attack, where an unauthorized third party exploited a vulnerability to access files."},{"id":"e28bd2f9-6545-47d7-adc3-7f89d597ad39","entity_name":"Jackson Hospital and Clinic","reported_date":"2026-04-06","state":"AL","individuals_affected":13910,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"dc8db8a4-69bc-4110-80b1-7b20960dabff","entity_name":"Nuance Communications (Business Associate of Geisinger Health)","reported_date":"2026-03-17","state":null,"individuals_affected":1200000,"source_type":"modeled_breach","severity_score":60,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. A former Nuance Communications employee illegally accessed more than 1.2 million Geisinger patient records after his employment was terminated."},{"id":"c98f69e2-83f8-4658-ab3c-26e53524cb17","entity_name":"New American Funding, LLC (Figure Lending, LLC had incident)","reported_date":null,"state":"WA","individuals_affected":699,"source_type":"state_ag","severity_score":30,"summary":"Breach affecting New American Funding, LLC (Figure Lending, LLC had incident) reported on 2026-02-27, impacting 699 individuals. Data exposed includes Name, Social Security Number, Financial & Banking Information, and Full Date of Birth."},{"id":"822651af-00fb-4e61-a880-33de83d0efd0","entity_name":"PIH Health, Inc.","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Healthcare related data breach."},{"id":"5d4f91d0-acac-4ac6-b4ab-5d85111b640a","entity_name":"third-party vendors","reported_date":"2026-03-16","state":null,"individuals_affected":15000000,"source_type":"modeled_breach","severity_score":48,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. Administrative details and medical notes on more than 15 million people in France were hacked due to third-party vendors/business associates."},{"id":"f8bf3d32-f41e-4f9a-b035-e8eaf6f5382e","entity_name":"CenterWell ACE/Home Solutions","reported_date":"2026-04-02","state":"KY","individuals_affected":9651,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"60943a4a-8a21-4d80-a34e-21d58021bcb4","entity_name":"Lakeside Pediatrics & Adolescent Medicine, PLLC","reported_date":"2026-04-06","state":"ID","individuals_affected":34154,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"791e4632-5f3e-4115-85ef-74bac6088259","entity_name":"Providence St. Joseph Orange","reported_date":"2026-04-27","state":"CA","individuals_affected":11329,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"379c1645-3556-4aa7-afe7-1e3b0d6e3905","entity_name":"Orthopaedic Institute of Western Kentucky","reported_date":"2026-04-27","state":"KY","individuals_affected":11474,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"f3fdc12d-3ca5-45c1-9b44-6751720cc3d0","entity_name":"University of Michigan Health Plan","reported_date":"2026-04-06","state":"MI","individuals_affected":2315,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"32286ee2-e714-46f6-93a1-ee074b9951bf","entity_name":"Manhattan Retirement Foundation d/b/a Meadowlark Hills","reported_date":"2026-03-11","state":"KS","individuals_affected":14442,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"47931e40-54f0-4a93-bb5b-7de35e030dae","entity_name":"Bolt Solutions Inc. (“bolt”)","reported_date":null,"state":"WA","individuals_affected":140249,"source_type":"state_ag","severity_score":85,"summary":"Breach affecting Bolt Solutions Inc. (“bolt”) reported on 2026-02-26, impacting 140249 individuals. Data exposed includes Name and Full Date of Birth."},{"id":"df20cc78-e047-4377-b65b-4e8af0d3c100","entity_name":"AltaMed Health Services Corporation","reported_date":"2026-03-23","state":"CA","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"73d46bdc-8a71-40f0-8b12-4abcdf43bd8a","entity_name":"BMG of Kansas, Inc.","reported_date":"2026-03-23","state":"KS","individuals_affected":1327,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"d7bcd06d-1b4b-40f3-a691-102a72d19826","entity_name":"CommonSpirit Health (Pinnacle Holdings, LTD)","reported_date":null,"state":"WA","individuals_affected":19027,"source_type":"state_ag","severity_score":70,"summary":"Breach at CommonSpirit Health (Pinnacle Holdings, LTD)"},{"id":"f2de6e87-12df-45e3-a422-9f29cbb2c98d","entity_name":"Pyramid Global Hospitality (Pyramid Advisors Limited Partnership)","reported_date":null,"state":"WA","individuals_affected":3434,"source_type":"state_ag","severity_score":50,"summary":"Breach at Pyramid Global Hospitality (Pyramid Advisors Limited Partnership)"},{"id":"1f0020b0-b257-47a5-bd2c-d52bc99c8373","entity_name":"UFP Technologies","reported_date":"2026-03-16","state":null,"individuals_affected":null,"source_type":"modeled_breach","severity_score":40,"summary":"⚡ Projected from news reports · Not yet confirmed by HHS. UFP Technologies, an American manufacturer of medical devices, disclosed that a cybersecurity incident compromised its IT systems and data."},{"id":"0a577bcc-e2e0-4eeb-a85e-93385800fa63","entity_name":"Cisco SD-WAN - Cisco SD-WAN Path Traversal Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Cisco SD-WAN CLI contains a path traversal vulnerability that could allow an authenticated local attacker to gain elevated privileges via improper access controls on commands within the application CLI. A successful exploit could allow the attacker to execute arbitrary commands as the root user."},{"id":"2dcccc89-a266-4f33-823e-58b770f45881","entity_name":"Commonwealth Care Alliance","reported_date":"2026-03-18","state":"MA","individuals_affected":634,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"bc63374f-2f53-4df0-91a8-2dc321522fa7","entity_name":"Cisco Catalyst SD-WAN Controller and Manager - Cisco Catalyst SD-WAN Controller and Manager Authentication Bypass Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Cisco Catalyst SD-WAN Controller, formerly SD-WAN vSmart, and Cisco Catalyst SD-WAN Manager, formerly SD-WAN vManage, contain an authentication bypass vulnerability could allow an unauthenticated, remote attacker to bypass authentication and obtain administrative privileges on an affected system. This vulnerability exists because the peering authentication mechanism in an affected system is not working properly. An attacker could exploit this vulnerability by sending crafted requests to an affected system. A successful exploit could allow the attacker to log in to an affected Cisco Catalyst SD-WAN Controller as an internal, high-privileged, non-root user account. Using this account, the attacker could access NETCONF, which would then allow the attacker to manipulate network configuration for the SD-WAN fabric."},{"id":"57061d6a-636d-4075-a81f-8b39a5365f14","entity_name":"Couve Healthcare Consulting, LLC DBA Evergreen Healthcare Group","reported_date":"2026-03-23","state":"WA","individuals_affected":11795,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"5bb7737a-d0f5-4291-96d0-96970f0ba4b6","entity_name":"Couve Healthcare Consulting, LLC DBA Evergreen Healthcare Group","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Healthcare related data breach."},{"id":"6aa98c61-b695-4b54-9391-a607dc1d8a41","entity_name":"AccentCare","reported_date":"2026-04-02","state":"TX","individuals_affected":19772,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"643be2ee-9260-4a2b-b97d-9af15fcfb7bf","entity_name":"Adapt Oregon Health Care","reported_date":null,"state":"OR","individuals_affected":2908,"source_type":"state_ag","severity_score":50,"summary":"Breach notification from Adapt Oregon Health Care."},{"id":"d7c4f0d9-595d-4055-b67b-09ab5643c236","entity_name":"Prairie View Healthcare, Inc.","reported_date":"2026-04-02","state":"OK","individuals_affected":700,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"9b72cf17-c10a-45a6-87a6-74201316fc89","entity_name":"QualDerm Partners, LLC","reported_date":null,"state":"OR","individuals_affected":3117874,"source_type":"state_ag","severity_score":95,"summary":"Breach notification from QualDerm Partners, LLC."},{"id":"00406c7e-ab9a-4d76-bb82-d0c01e8e6e83","entity_name":"HealthEC LLC","reported_date":null,"state":"ND","individuals_affected":4479116,"source_type":"state_ag","severity_score":95,"summary":"Impacted individuals received a notice from HealthEC LLC, which experienced a data breach where an unauthorized third party accessed its network."},{"id":"e6a02950-4010-4e83-87c3-b1479c524dac","entity_name":"Weill Cornell Medicine","reported_date":"2026-03-18","state":"NY","individuals_affected":516,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"d076b838-67b8-4d8f-9038-768fe0045e2b","entity_name":"QualDerm Partners, LLC","reported_date":"2026-03-23","state":"TN","individuals_affected":3117874,"source_type":"hhs_breach","severity_score":95,"summary":""},{"id":"a479e7fe-768b-48ca-929a-a4b47af0980a","entity_name":"Workers Compensation Insurance Rating Bureau of California","reported_date":null,"state":"CA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Unknown healthcare-related data breach."},{"id":"675929e4-886f-41d1-a454-0da26daaada7","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"29539752-4f8d-44fa-891c-9ed670631148","entity_name":"DC Medical Research Institute","reported_date":null,"state":"DC","individuals_affected":8000,"source_type":"state_ag","severity_score":50,"summary":"A phishing attack successfully compromised an employee account at DC Medical Research Institute, leading to the exposure of research participant data."},{"id":"a8b803f9-0b6a-45f9-98be-61f0a5bfcc44","entity_name":"The Center for Advanced Eye Care","reported_date":"2026-03-23","state":"ME","individuals_affected":9300,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"f97d021d-bb5e-4a4b-9250-f5c9dd8b3fe8","entity_name":"Option Care Health, Inc.","reported_date":"2026-03-23","state":"IL","individuals_affected":2086,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"2d1ffe12-ba28-46eb-862f-7443e1a543c6","entity_name":"Builders FirstSource Flex Plan","reported_date":"2026-03-30","state":"TX","individuals_affected":1514,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"6c18bdd0-5d10-461c-ac53-47cd3e4cb995","entity_name":"VNS Behavioral Health Inc. (“VNS Health”)","reported_date":"2026-03-24","state":"NY","individuals_affected":739,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"9537058f-fe6e-4d70-90eb-6e6430d4e58b","entity_name":"Emanuel Medical Center","reported_date":"2026-03-24","state":"GA","individuals_affected":28963,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"d5283363-bfe1-4b74-b038-9e9701c97223","entity_name":"44North","reported_date":"2026-03-11","state":"MI","individuals_affected":2158,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"72dcfe35-303b-42ff-9556-882be34c37e2","entity_name":"Easterseals Northeast Indiana","reported_date":"2026-03-18","state":"IN","individuals_affected":3158,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"b1b5b6f5-3d74-4f04-bf0b-863d579fe1ed","entity_name":"Wee Care Pediatrics, LLC","reported_date":"2026-03-17","state":"UT","individuals_affected":2127,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"cbac045f-d5f9-49cc-920b-13aa5c980a08","entity_name":"Academic Urology & Urogynecology of Arizona","reported_date":"2026-03-11","state":"AZ","individuals_affected":73281,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"ca3e592c-c6d3-4307-a64a-cf9fd1c135e6","entity_name":"Communications Workers of America Local 1180 Security Benefits Fund","reported_date":"2026-03-19","state":"NY","individuals_affected":18550,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"244e5a92-bdb6-4b34-85c8-732a17cf2ae4","entity_name":"Resource Corporation of America","reported_date":"2026-03-17","state":"TX","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"d1086174-a09f-48a4-979f-f026a853a74c","entity_name":"VPS Medical PLLC","reported_date":"2026-03-17","state":"PA","individuals_affected":4600,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"946257cc-e9a7-4cb7-bb18-0b9f2c35a75e","entity_name":"Cedar Valley Services","reported_date":"2026-03-11","state":"MN","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"49653a91-fbd9-4822-b729-97d3f698ad51","entity_name":"National Association on Drug Abuse Problems","reported_date":"2026-03-17","state":"NY","individuals_affected":90000,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"74ae0d76-aec9-4fa1-816f-adb8b08192f6","entity_name":"Cedar Point Health, LLC","reported_date":"2026-03-23","state":"CO","individuals_affected":23114,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"d43084c5-a092-48b4-aebe-a282bcb4ff17","entity_name":"Alexes Hazen MD, PLLC","reported_date":"2026-03-09","state":"NY","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"b51ab75c-a274-4e57-b6d5-eb89f596a241","entity_name":"TABB (\"TABB\") (The Brooklyn Hospital Center)","reported_date":null,"state":"WA","individuals_affected":3,"source_type":"state_ag","severity_score":30,"summary":"Breach at TABB (\"TABB\") (The Brooklyn Hospital Center)"},{"id":"bc06bbb6-5a22-4cbe-98cb-0e0c45bba1d6","entity_name":"University Spine Center","reported_date":"2026-03-02","state":"NJ","individuals_affected":582,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"79badcd7-c88a-4bea-8f18-bb5a1b0f7df8","entity_name":"BlueCross BlueShield of Tennessee, Inc.","reported_date":"2026-03-02","state":"TN","individuals_affected":1670,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"de3c50bd-0aa2-4b58-ba18-7529cc339b2a","entity_name":"TriZetto Provider Solutions","reported_date":null,"state":"OR","individuals_affected":3433965,"source_type":"state_ag","severity_score":95,"summary":"Breach notification from TriZetto Provider Solutions."},{"id":"a1938158-b0af-4741-adc7-59d228dc5a46","entity_name":"First Choice Community Home Care, Inc.","reported_date":"2026-03-09","state":"TX","individuals_affected":725,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"f97af8b2-c688-4671-9978-d51ff1773900","entity_name":"Desert Bloom Pharmacy","reported_date":null,"state":"AZ","individuals_affected":30000,"source_type":"state_ag","severity_score":70,"summary":"Third-party vendor data breach exposed customer prescription and personal information."},{"id":"3547c178-a7b8-4bd2-8db2-4c5b94696ce8","entity_name":"New Horizon Medical","reported_date":null,"state":"IN","individuals_affected":120000,"source_type":"state_ag","severity_score":85,"summary":"New Horizon Medical reported a data breach exposing patient names, addresses, dates of birth, Social Security numbers, health insurance information, and medical information."},{"id":"9a0dc29b-ab0d-4f09-9fe0-7300efed5d1b","entity_name":"Houston Health Department","reported_date":"2026-03-09","state":"TX","individuals_affected":7445,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"41f73aba-6dcd-48f6-aa2f-331680889f5a","entity_name":"Tennessee Dental Group","reported_date":null,"state":"TN","individuals_affected":20000,"source_type":"state_ag","severity_score":70,"summary":"Tennessee Dental Group experienced a ransomware attack that disrupted operations and potentially exposed patient dental records."},{"id":"448463a6-0041-4a60-b238-d454840876c5","entity_name":"Wisconsin Children's Hospital","reported_date":null,"state":"WI","individuals_affected":7000,"source_type":"state_ag","severity_score":50,"summary":"Ransomware attack impacted operational systems and exposed limited patient data."},{"id":"984c142f-81c7-46b5-885d-8238660fb137","entity_name":"ApolloMD Business Services, LLC","reported_date":"2026-02-11","state":"GA","individuals_affected":626540,"source_type":"hhs_breach","severity_score":95,"summary":""},{"id":"066bc1e2-7893-4464-9aba-d00b0b9c570a","entity_name":"ZOLL ePCR IOS Mobile Application","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":55,"summary":"Successful exploitation of this vulnerability could allow an attacker to gain unauthorized access to protected health information (PHI) or device telemetry."},{"id":"809668e5-809d-4e62-a46f-483e998e2bfe","entity_name":"Five Star Home Health, Inc.","reported_date":"2026-03-09","state":"OK","individuals_affected":1575,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"3d4e9cc7-780a-49bc-a44c-a27eed8fd8e1","entity_name":"Counseling Center of Wayne & Holmes Counties","reported_date":"2026-03-02","state":"OH","individuals_affected":83354,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"b21e123e-de25-40a9-bcea-94fb0d95014c","entity_name":"Transitions of Western Illinois, Inc.","reported_date":"2026-03-03","state":"IL","individuals_affected":805,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"7271df57-8798-411b-b477-bad081f681e8","entity_name":"Adapt Integrated Health Care","reported_date":"2026-03-12","state":"OR","individuals_affected":2908,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"7c41661e-6b89-457e-af7a-dbbf9bc63d1b","entity_name":"Carolina Foot & Ankle Associates","reported_date":"2026-03-02","state":"NC","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"720bc0b6-27f3-4935-a459-a9c491250a63","entity_name":"Wendy Foster OD","reported_date":"2026-03-04","state":"KS","individuals_affected":20000,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"b9d87a81-53bc-48bc-b9d9-06fa1475ed44","entity_name":"Medical Management Business Services (MMBS)","reported_date":null,"state":"ND","individuals_affected":2400000,"source_type":"state_ag","severity_score":95,"summary":"Impacted individuals received a notice from MMBS, which experienced a data breach, which was a MOVEit Transfer attack, where an unauthorized third party exploited a vulnerability to access files."},{"id":"508afcf1-690f-4b03-9084-faa4c593548a","entity_name":"South Carolina Department of Health and Environmental Control (SCDHEC)","reported_date":null,"state":"WI","individuals_affected":1500000,"source_type":"state_ag","severity_score":95,"summary":"SCDHEC announced a breach of protected health information due to a hacking incident."},{"id":"1fae2084-1dfb-48f3-8515-327302f37d86","entity_name":"On Time Ambulance, Inc.","reported_date":null,"state":"ND","individuals_affected":1300000,"source_type":"state_ag","severity_score":95,"summary":"Impacted individuals received a notice from On Time Ambulance, which experienced a data breach where an unauthorized third party gained access to its network and systems."},{"id":"daefd92c-8713-4fa4-bc7a-4675e21cb9ee","entity_name":"Benton County Health Services","reported_date":null,"state":"OR","individuals_affected":1464,"source_type":"state_ag","severity_score":50,"summary":"Breach notification from Benton County Health Services."},{"id":"5bf0b4a7-f1d7-470b-ad46-52140d79c36c","entity_name":"The Phia Group, LLC","reported_date":null,"state":"OR","individuals_affected":40366,"source_type":"state_ag","severity_score":70,"summary":"Breach notification from The Phia Group, LLC."},{"id":"ef92dc09-18c9-4581-bdf1-d6bed4caa7ac","entity_name":"Anthem","reported_date":null,"state":"IN","individuals_affected":78800000,"source_type":"state_ag","severity_score":95,"summary":"This breach affected Anthem, Inc. and its affiliated companies, including Anthem Blue Cross, Amerigroup, Beacon Health Options (formerly Anthem Behavioral Health), Blue Cross and Blue Shield of Georgia, Blue Cross of California, Empire Blue Cross Blue Shield, Community Insurance Company (doing business as Anthem Blue Cross and Blue Shield in Kentucky, Maine, Missouri, New Hampshire, Ohio, Wisconsin, Colorado, Connecticut, Georgia, Indiana, Nevada, New York, Virginia, and Washington), Golden West Dental & Vision, HealthLink, and UniCare. The intruders gained access to names, birthdays, medical IDs/social security numbers, street addresses, email addresses and employment information, including income data."},{"id":"c561b004-2f60-48f0-b562-7e76286b6e7d","entity_name":"Vikor Scientific, LLC","reported_date":null,"state":"OR","individuals_affected":139964,"source_type":"state_ag","severity_score":85,"summary":"Breach notification from Vikor Scientific, LLC."},{"id":"189fc00f-baf7-42e2-802a-468514e818ab","entity_name":"Utah Valley Pediatrics LC","reported_date":"2026-03-02","state":"UT","individuals_affected":9958,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"76e0c3fd-676c-4db0-b4e2-0e45b87ab599","entity_name":"Apex Spine & Neurosurgery, LLC","reported_date":"2026-03-02","state":"GA","individuals_affected":2500,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"c09582ec-975e-489e-9220-fd927dc82feb","entity_name":"UA Sprinkler Fitters Local 669 JATC","reported_date":null,"state":"WA","individuals_affected":518,"source_type":"state_ag","severity_score":30,"summary":"Breach at UA Sprinkler Fitters Local 669 JATC"},{"id":"b01ce1e4-61f9-4214-8123-363f0fc405b7","entity_name":"Triad Radiology Associates","reported_date":"2026-03-02","state":"NC","individuals_affected":11011,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"87d33c0a-2682-4037-92a9-fb1ef5a95e81","entity_name":"Cottage Hospital","reported_date":"2026-03-02","state":"NH","individuals_affected":1005,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"70d148e3-07a6-4392-be87-01c94bdd90f6","entity_name":"EDGAR A MARTORELL MD LLC","reported_date":"2026-03-03","state":"FL","individuals_affected":1107,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"a8df85b6-8031-4294-8232-20a061b2a891","entity_name":"Marin Cancer Care","reported_date":"2026-03-02","state":"CA","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"aba147f4-ecfa-4782-bf3a-b215899529f9","entity_name":"TriZetto Provider Solutions","reported_date":"2026-03-03","state":"MO","individuals_affected":3433965,"source_type":"hhs_breach","severity_score":95,"summary":""},{"id":"71a5366c-ac3a-42f2-97f1-f4e1dea6e0ea","entity_name":"Vikor Scientific, LLC.","reported_date":"2026-03-02","state":"SC","individuals_affected":139964,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"a91b42f3-8de6-400f-938e-2d0b373a8f3c","entity_name":"Advanced Homecare Management, LLC DBA Enhabit Home Health & Hospice","reported_date":"2026-02-13","state":"TX","individuals_affected":22552,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"a1a3903a-6cfb-415c-9963-bd7ff204fe74","entity_name":"La Pine Community Health Center","reported_date":"2026-03-02","state":"OR","individuals_affected":1190,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"b1e4221f-7bb1-4795-af7d-4567cd37e554","entity_name":"University of Central Florida","reported_date":null,"state":"WI","individuals_affected":3900000,"source_type":"state_ag","severity_score":95,"summary":"The University of Central Florida announced a data breach involving unauthorized access to employee information, including social security numbers. While not directly a healthcare entity, the incident involved sensitive personal data that could impact health-related services."},{"id":"275e1ba5-9109-4232-ad5e-5917b1c662e5","entity_name":"WIRX Pharmacy","reported_date":"2026-03-02","state":"PA","individuals_affected":20047,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"1641c6f4-777e-45ce-8506-ce1a661d316a","entity_name":"Personalis, Inc.","reported_date":"2026-02-12","state":"CA","individuals_affected":650,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"c9bea751-63aa-43ea-9e20-440d4c9da7be","entity_name":"Issaqueena Pediatric Dentistry PA","reported_date":"2026-02-13","state":"SC","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"9a0667f1-18e9-49ea-a6cd-5572061fc89a","entity_name":"EyeCare Partners, LLC, including The Ophthalmology Group, Ophthalmology Consultants, and Ophthalmology Associates.","reported_date":"2026-02-11","state":"MO","individuals_affected":17110,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"719ee6b1-e7c6-4389-b956-799d1bef6d10","entity_name":"Ko-Kwel Wellness Center","reported_date":"2026-02-12","state":"OR","individuals_affected":543,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"814c7e75-e0ad-4458-940c-0e330eb04d70","entity_name":"Fair Oaks Ortho P.C.","reported_date":"2026-04-06","state":"VA","individuals_affected":1544,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"7278f907-ba94-4ee7-a11e-7b1d2444f204","entity_name":"Pafford Medical Services","reported_date":"2026-03-02","state":"AR","individuals_affected":1000,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"c6464ba0-e55f-426b-be79-429943a88b53","entity_name":"Mindoula Health, Inc.","reported_date":"2026-03-02","state":"MD","individuals_affected":626,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"9eed8379-aebc-4af3-9019-8dd5f1f8dd23","entity_name":"Anthem (now Elevance Health)","reported_date":null,"state":"WI","individuals_affected":78800000,"source_type":"state_ag","severity_score":95,"summary":"This is a notice of a data breach suffered by Anthem (now Elevance Health) that occurred in February 2015. The breach exposed the personal information of current and former members including names, dates of birth, social security numbers, medical IDs, street addresses, email addresses, and employment information such as income data. The breach was the result of a sophisticated cyberattack."},{"id":"53d090a6-a8a8-40c0-aa84-d007cc5f7b5f","entity_name":"St. Louis Medical Associates","reported_date":null,"state":"MO","individuals_affected":8000,"source_type":"state_ag","severity_score":50,"summary":"Phishing campaign resulted in compromise of employee email accounts and access to patient data."},{"id":"b6046542-739f-4ac1-857d-81215cb87b84","entity_name":"Louisiana Community Pharmacy","reported_date":null,"state":"LA","individuals_affected":25000,"source_type":"state_ag","severity_score":70,"summary":"Unauthorized access to Louisiana Community Pharmacy's dispensing software led to the compromise of patient prescription data."},{"id":"3e81ba22-5cd0-48da-b5cc-cbae89ceb676","entity_name":"Mayo Clinic","reported_date":null,"state":"MN","individuals_affected":75000,"source_type":"state_ag","severity_score":70,"summary":"Mayo Clinic experienced a security incident affecting patient data due to third-party software vulnerability."},{"id":"ced2d907-4bf4-47ca-a93c-4f870c145244","entity_name":"EDINGER MEDICAL GROUP","reported_date":"2026-04-17","state":"CA","individuals_affected":1246,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"636ec9fa-f9fb-477d-b1b6-948aef04df42","entity_name":"BAYADA Home Health Care, Inc.","reported_date":"2026-03-02","state":"NJ","individuals_affected":9526,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"b4398da1-610b-49d2-a97e-9d78fc2b310d","entity_name":"Lincoln National Corporation d/b/a/ Lincoln Financial","reported_date":"2026-03-02","state":"IN","individuals_affected":998,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"3732ba81-2fcc-4d58-93a2-f88464fddc5e","entity_name":"Wakefield & Associates, LLC","reported_date":"2026-03-02","state":"TN","individuals_affected":31751,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"658a9ee3-a500-416a-a724-655e82eca972","entity_name":"High Point Treatment Center, Inc.","reported_date":"2026-04-09","state":"MA","individuals_affected":25832,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"6421e544-341f-45f7-9e5b-459c08b688f1","entity_name":"Health and Hospital Corporation of Marion County","reported_date":"2026-03-02","state":"IN","individuals_affected":792,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"9920cd71-f414-4b47-a23e-9b129563318b","entity_name":"180 Health Partners, Inc.","reported_date":"2026-04-14","state":"MD","individuals_affected":1167,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"c5ade895-f00c-4ea7-b32c-dacad39f83a3","entity_name":"Chattanooga C.A.R.E.S. d/b/a Cempa Community Care","reported_date":"2026-02-13","state":"TN","individuals_affected":1341,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"21d726a7-4fb8-43be-8bda-e5577a149064","entity_name":"The Phia Group (CRH Americas, Inc. F/K/A Oldcastle, Inc., PHP - Premera, PHP - Commercial)","reported_date":null,"state":"WA","individuals_affected":2802,"source_type":"state_ag","severity_score":50,"summary":"Breach at The Phia Group (CRH Americas, Inc. F/K/A Oldcastle, Inc., PHP - Premera, PHP - Commercial)"},{"id":"73d911d0-97e8-4fc0-9905-dcc3fe35ea70","entity_name":"Ivanti Endpoint Manager Mobile (EPMM) - Ivanti Endpoint Manager Mobile (EPMM) Code Injection Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Ivanti Endpoint Manager Mobile (EPMM) contains a code injection vulnerability that could allow attackers to achieve unauthenticated remote code execution."},{"id":"03ac03bb-4ec3-435e-95a6-1e2d98e07f55","entity_name":"BestCare Treatment Services, Inc.","reported_date":null,"state":"OR","individuals_affected":1668,"source_type":"state_ag","severity_score":50,"summary":"Breach notification from BestCare Treatment Services, Inc."},{"id":"bc29e576-e38c-4883-87f9-3d062ebed7ac","entity_name":"Wound Technology Network, Inc.","reported_date":"2026-04-26","state":"FL","individuals_affected":139830,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"20893861-aaa7-4e0a-b1e0-93964bfe3c8a","entity_name":"Baltimore City Health Department","reported_date":"2026-02-07","state":"MD","individuals_affected":2597,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"d546856c-f805-4cb8-bc18-021af0199357","entity_name":"Axis Healthcare Group P.C.","reported_date":"2026-03-02","state":"MD","individuals_affected":3537,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"87624020-a735-44ed-8668-587d43aed444","entity_name":"Clinic Service Corporation","reported_date":"2026-02-11","state":"CO","individuals_affected":82331,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"cb2d4e8c-6496-4615-b3cd-3eba5b4cfec4","entity_name":"WindRose Health Network","reported_date":"2026-02-06","state":"IN","individuals_affected":691,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"9d0362d5-634b-4533-bd7e-1139e47bc919","entity_name":"Fortinet Multiple Products - Fortinet Multiple Products Authentication Bypass Using an Alternate Path or Channel Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Fortinet FortiAnalyzer, FortiManager, FortiOS, and FortiProxy contain an authentication bypass using an alternate path or channel that could allow an attacker with a FortiCloud account and a registered device to log into other devices registered to other accounts, if FortiCloud SSO authentication is enabled on those devices."},{"id":"65adfaee-36aa-46fd-9a39-32e950cf4bbd","entity_name":"Pecan Tree Dental, PLLC","reported_date":"2026-02-06","state":"TX","individuals_affected":13300,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"687831c7-1b1c-401e-aa4d-a3336cf85646","entity_name":"Lincoln County Public Health","reported_date":null,"state":"OR","individuals_affected":700,"source_type":"state_ag","severity_score":30,"summary":"Breach notification from Lincoln County Public Health."},{"id":"ff3391a1-5e64-4fb7-8a72-502f745079d6","entity_name":"Newkirk Products, Inc.","reported_date":null,"state":"WI","individuals_affected":3100000,"source_type":"state_ag","severity_score":95,"summary":"Newkirk Products, Inc., a company that provides ID cards to health plans, reported a data breach due to a cyberattack on its servers. The incident exposed member information, including names, addresses, dates of birth, and health plan ID numbers."},{"id":"6d79443b-942e-458c-8df1-964041fee1b8","entity_name":"Centene Corporation","reported_date":null,"state":"IN","individuals_affected":9500000,"source_type":"state_ag","severity_score":95,"summary":"This breach affected Centene Corporation, a multi-national healthcare enterprise. The breach involved the misconfiguration of a cloud-based data storage system, which exposed the protected health information of members, including names, dates of birth, addresses, Social Security numbers, and health information."},{"id":"ce466dc8-0108-4945-baa4-a8fd7626b0ac","entity_name":"Broadcom VMware vCenter Server - Broadcom VMware vCenter Server Out-of-bounds Write Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Broadcom VMware vCenter Server contains an out-of-bounds write vulnerability in the implementation of the DCERPC protocol. This could allow a malicious actor with network access to vCenter Server to send specially crafted network packets, potentially leading to remote code execution."},{"id":"faa048c3-da1f-4293-b6a7-73da62e8fd82","entity_name":"Jefferson-Blount-St. Clair Mental Health Authority","reported_date":"2026-02-06","state":"AL","individuals_affected":30434,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"db3d45ec-a8e4-4645-abbc-d93719bc924b","entity_name":"Wisner Baum LLP","reported_date":null,"state":"WA","individuals_affected":717,"source_type":"state_ag","severity_score":30,"summary":"Breach at Wisner Baum LLP"},{"id":"bbdf14ad-5d64-45c6-aa04-abb75c525c2b","entity_name":"Neurological Associates of Washington","reported_date":null,"state":"WA","individuals_affected":13500,"source_type":"state_ag","severity_score":70,"summary":"Breach at Neurological Associates of Washington"},{"id":"25516a25-3813-43c9-9342-64cb2ccbd412","entity_name":"Precipio, Inc.","reported_date":"2026-02-06","state":"CT","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"be15de26-b4f0-4daf-94a6-d71893de8a8f","entity_name":"La Clinica de La Raza, Inc. (La Clinica)","reported_date":"2026-04-21","state":"CA","individuals_affected":11403,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"e648755c-e7c8-400f-81c6-be74673814ac","entity_name":"Deschutes County Health Services","reported_date":"2026-02-11","state":"OR","individuals_affected":1305,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"fa16caf9-33d5-4b84-983b-ce1e0a13af10","entity_name":"Cisco Unified Communications Manager - Cisco Unified Communications Products Code Injection Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Cisco Unified Communications Manager (Unified CM), Cisco Unified Communications Manager Session Management Edition (Unified CM SME), Cisco Unified Communications Manager IM & Presence Service (Unified CM IM&P), Cisco Unity Connection, and Cisco Webex Calling Dedicated Instance contain a code injection vulnerability that could allow the attacker to obtain user-level access to the underlying operating system and then elevate privileges to root."},{"id":"856f1c54-1cbf-4136-9a18-d4755d8f2a8d","entity_name":"AdventHealth Daytona Beach","reported_date":"2026-01-30","state":"FL","individuals_affected":821,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"6df20f39-0d8b-4384-bdbc-c516b7e39471","entity_name":"Middlesex Sheriff's Office","reported_date":"2026-02-02","state":"MA","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"0a284ee9-790b-494c-b946-0955ddee23a6","entity_name":"Nebraska Medicine","reported_date":null,"state":"NE","individuals_affected":40000,"source_type":"state_ag","severity_score":70,"summary":"Nebraska Medicine notified patients of a data breach stemming from a cyberattack."},{"id":"e91ac097-9caf-4415-bf65-1aa76a46268a","entity_name":"Trizetto (business associated of Columbia River Health)","reported_date":null,"state":"OR","individuals_affected":304,"source_type":"state_ag","severity_score":30,"summary":"Breach notification from Trizetto (business associated of Columbia River Health)."},{"id":"4f794346-9ef7-4e5d-b7ed-06bf4e73dfad","entity_name":"Dakota Health Partners","reported_date":null,"state":"ND","individuals_affected":7000,"source_type":"state_ag","severity_score":50,"summary":"Email compromise incident affected patient scheduling and basic demographic data."},{"id":"d646d8c9-ed86-4be3-8f24-a36b243aa7e7","entity_name":"True RCM, a Rapid Care Transcription, Inc., Company","reported_date":"2026-01-24","state":"MD","individuals_affected":1247,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"980fa8ee-0b64-4857-8d7f-59811848495a","entity_name":"North Carolina Behavioral Health","reported_date":null,"state":"NC","individuals_affected":15000,"source_type":"state_ag","severity_score":70,"summary":"North Carolina Behavioral Health reported a data breach impacting client therapy notes and personal identifiers due to a compromised employee account."},{"id":"7bc6d649-4733-466a-950f-9e069b18feb1","entity_name":"Ohio Valley Medical Center","reported_date":null,"state":"OH","individuals_affected":30000,"source_type":"state_ag","severity_score":70,"summary":"Business associate data breach exposing patient financial and medical information."},{"id":"d7098de0-d3f1-4627-b939-265b2964d2cd","entity_name":"The！】CentraState Healthcare System","reported_date":null,"state":"ND","individuals_affected":617904,"source_type":"state_ag","severity_score":95,"summary":"Ransomware attack encrypted systems and exfiltrated data."},{"id":"73c36662-6b3d-45a4-81f5-5cef7950f7ae","entity_name":"Southern Oregon Neurosurgery","reported_date":null,"state":"OR","individuals_affected":1000,"source_type":"state_ag","severity_score":30,"summary":"Breach notification from Southern Oregon Neurosurgery."},{"id":"d186061f-6bcf-4cd8-814b-0261d2516d28","entity_name":"Superior Care Plus LLC d/b/a Supportive Home Health LLC","reported_date":"2026-03-09","state":"OH","individuals_affected":1415,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"1d94d116-d4e5-499b-8729-c2de471649c5","entity_name":"Minnesota Department of Human Services","reported_date":"2026-01-22","state":"MN","individuals_affected":303965,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"1edce3cd-e4b0-4de4-a0d4-5e011a18c441","entity_name":"Benton County Health","reported_date":"2026-02-12","state":"OR","individuals_affected":1476,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"6db94d2b-a3a1-4f31-ab3d-dc02f8218c5b","entity_name":"Axis Community Health","reported_date":"2026-01-29","state":"CA","individuals_affected":3579,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"c6ad0f0a-a350-4b7b-ba42-56371b72340d","entity_name":"Providence","reported_date":"2026-03-25","state":"WA","individuals_affected":22701,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"5aabd752-0e19-4a1c-87df-34af4b60f653","entity_name":"Bay Area Community Health","reported_date":"2026-02-13","state":"CA","individuals_affected":9912,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"8641d1a3-b3b8-40ea-a357-a0812643ce9f","entity_name":"Central Texas MHMR Center dba Center for Life Resource","reported_date":"2026-03-02","state":"TX","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"0be0e1d4-bd4d-43e1-9b0b-b42585ac430e","entity_name":"Guardian Pharmacy of Washington, LLC d/b/a Mercury Pharmacy Services","reported_date":null,"state":"WA","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Breach at Guardian Pharmacy of Washington, LLC d/b/a Mercury Pharmacy Services"},{"id":"8f34ab85-d32b-46b4-b72c-a4de6d231c60","entity_name":"PROVAIL","reported_date":null,"state":"WA","individuals_affected":4391,"source_type":"state_ag","severity_score":50,"summary":"Breach at PROVAIL"},{"id":"52ae2f62-baad-4164-92d7-4e5f5dff0bd5","entity_name":"Kansas City General Hospital","reported_date":null,"state":"KS","individuals_affected":10000,"source_type":"state_ag","severity_score":50,"summary":"Third-party vendor data breach exposed patient scheduling information."},{"id":"eb28decc-c074-415e-bb78-a493ba75403e","entity_name":"Pacific Coast Health Plan","reported_date":null,"state":"OR","individuals_affected":55000,"source_type":"state_ag","severity_score":70,"summary":"Pacific Coast Health Plan announced a data breach due to a third-party vendor compromise. The breach exposed member contact information and insurance policy details."},{"id":"231bb792-e811-457d-847e-f4c61a5b0359","entity_name":"Midwest Mental Wellness Center","reported_date":null,"state":"MN","individuals_affected":5000,"source_type":"state_ag","severity_score":50,"summary":"Unauthorized disclosure of psychotherapy notes due to an internal error."},{"id":"1f010047-f63d-4b78-a4f8-28b5d598b0df","entity_name":"360 Dental PC","reported_date":"2026-01-26","state":"PA","individuals_affected":11273,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"9e6a8647-792e-40e2-a3ae-259ed77ba856","entity_name":"Southern Immediate Care, LLC","reported_date":"2026-01-29","state":"AL","individuals_affected":7447,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"61a08248-4e13-4f79-b59d-89b665b6c695","entity_name":"Secure Pharmacy Management","reported_date":null,"state":null,"individuals_affected":2000000,"source_type":"ftc_breach","severity_score":95,"summary":"Secure Pharmacy Management faced FTC charges for a massive data breach involving pharmacy records. The breach exposed prescription histories, insurance information, and patient names due to weak cybersecurity protocols. The company agreed to a multi-million dollar settlement and a robust information security overhaul."},{"id":"b79b8a9c-57d3-4e9d-b0ee-366b6029598b","entity_name":"Administrators of the Tulane Educational Fund d/b/a Tulane University Medical Group","reported_date":"2026-02-02","state":"LA","individuals_affected":6530,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"3ea8b641-2b23-49fc-9695-f27d2684d137","entity_name":"Community Health Clinics, Inc. dba Terry Reilly Health Services","reported_date":"2026-02-12","state":"ID","individuals_affected":5421,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"41a402da-74af-49d4-b9db-9af78330ba0f","entity_name":"Florence County Commission on Alcohol & Drug Abuse – dba Circle Park Behavioral Health Services (“Circle Park”)","reported_date":"2026-03-02","state":"SC","individuals_affected":7020,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"159ec9b3-55d6-4ea7-a0fe-99db2709d530","entity_name":"Health Center of Southeast Texas","reported_date":"2026-04-21","state":"TX","individuals_affected":2389,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"58720e2d-4093-44f9-aea8-2ec46781ff56","entity_name":"Native American Health Center","reported_date":"2026-04-02","state":"CA","individuals_affected":2451,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"23466d80-6d0f-4772-b5f6-523c66c56dc8","entity_name":"EXCEL HEALTHCARE RECEIVABLE MANAGEMENT & CONSULTING CORP.","reported_date":"2026-03-02","state":"FL","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"aff8c901-5ea6-4a87-ad16-38a01a7ee1c3","entity_name":"TMG Health, Inc.","reported_date":"2026-02-04","state":"TX","individuals_affected":2076,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"959fdbbc-fa35-48a4-8116-4b437f202a77","entity_name":"FullBeauty Brands, Inc. Associate Benefits Plan","reported_date":"2026-01-30","state":"NY","individuals_affected":4725,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"6e76474e-ee64-4ac7-8e11-3914cf320313","entity_name":"Pinnacle Holdings, LTD","reported_date":"2026-04-06","state":"PA","individuals_affected":18313,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"d4ad9a94-4173-44b3-bce6-d35ffcc931db","entity_name":"Santa Cruz Community Health","reported_date":"2026-02-12","state":"CA","individuals_affected":1487,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"9af6bd62-33df-474b-923e-17f29738c71b","entity_name":"Valley Family Health Care","reported_date":"2026-01-16","state":"ID","individuals_affected":4300,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"b2078b52-29c5-489c-a497-5d8197b51d42","entity_name":"East Alabama Medical Center","reported_date":null,"state":"AL","individuals_affected":50000,"source_type":"state_ag","severity_score":70,"summary":"East Alabama Medical Center reported a breach affecting 50,000 patients due to a ransomware attack that encrypted patient data and exfiltrated sensitive information. The compromised data included names, addresses, Social Security numbers, and health insurance information."},{"id":"23a2d4cc-7512-4663-aade-c50611d60353","entity_name":"Avosina Healthcare Solutions","reported_date":"2026-01-21","state":"VA","individuals_affected":44425,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"0768cc03-8fba-4a52-8335-f2f96c35d9ab","entity_name":"Georgia Medical Group","reported_date":null,"state":"GA","individuals_affected":150000,"source_type":"state_ag","severity_score":85,"summary":"Georgia Medical Group reported a ransomware attack that encrypted patient records and other sensitive data."},{"id":"6b0e7352-b59d-444e-9ae7-744eab8fb18f","entity_name":"Sheppard Pratt","reported_date":"2026-03-02","state":"MD","individuals_affected":753,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"abd7097e-404d-486a-b3f8-2a232fe5bf23","entity_name":"The Center for Neuropsychology and Learning, PC","reported_date":"2026-01-31","state":"MI","individuals_affected":3722,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"7d02c85b-0340-4854-80e1-122bfc9f38ec","entity_name":"Central Ozarks Medical Center","reported_date":"2026-01-30","state":"MO","individuals_affected":11818,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"a17d1470-df12-4ea6-9c1b-04cc62d6e872","entity_name":"Iroquois Memorial Hospital","reported_date":"2026-02-04","state":"IL","individuals_affected":621,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"14ad5291-7121-4ebe-b8dd-385c6ce70bac","entity_name":"Home, Hope and Healing, Inc.","reported_date":"2026-04-02","state":"ME","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"0d1a1694-1813-4ac8-ab95-18b88029947f","entity_name":"Illinois Department of Human Services","reported_date":"2026-02-04","state":"IL","individuals_affected":705017,"source_type":"hhs_breach","severity_score":95,"summary":""},{"id":"050abd5d-ddb2-487e-bfc6-95084725005e","entity_name":"Foundation Health Partners","reported_date":"2026-01-26","state":"AK","individuals_affected":523,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"f33e8262-2890-4a7d-9201-e47572e8ce6d","entity_name":"Perry Johnson & Associates, Inc. (PJ&A)","reported_date":null,"state":"ND","individuals_affected":8952212,"source_type":"state_ag","severity_score":95,"summary":"Impacted individuals received notice from PJ&A, which experienced a data breach where an unauthorized third party gained access to its systems through a zero-day vulnerability."},{"id":"e47fe871-6031-4e62-823a-413be34edd7e","entity_name":"ABKSW PREFERRED HEALTH PARTNERS, PLLC d/b/a NORTH TEXAS PREFERRED HEALTH PARTNERS","reported_date":"2026-03-02","state":"TX","individuals_affected":2074,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"700227d2-344f-48c3-bd6b-0f063103c85b","entity_name":"Open Door Community Health Centers","reported_date":"2026-01-22","state":"CA","individuals_affected":6633,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"9aa55500-f263-41a8-9478-eac7cab63a9b","entity_name":"Devereux Foundation","reported_date":"2026-03-07","state":"PA","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"583f80eb-9ef8-4d2d-9cfc-88865891f8f8","entity_name":"Healthcare Interactive, Inc.","reported_date":null,"state":"OR","individuals_affected":3056950,"source_type":"state_ag","severity_score":95,"summary":"Breach notification from Healthcare Interactive, Inc."},{"id":"04fe3cc8-ea15-4c9d-bb87-7164ae01b105","entity_name":"Iowa Health and Human Services","reported_date":"2026-04-14","state":"IA","individuals_affected":3340,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"b39d8ac6-934e-467c-8cd6-c24409e5345c","entity_name":"Methodist Homes of Alabama and Northwest Florida","reported_date":"2026-01-28","state":"AL","individuals_affected":1406,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"baf73756-d20f-4e3c-b3ce-4444d2082f97","entity_name":"Pit River Health Service Inc.","reported_date":"2026-02-05","state":"CA","individuals_affected":1800,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"f05d477d-a675-4399-8e8f-8abde92357f0","entity_name":"Texas Health and Human Services Commission","reported_date":"2026-04-10","state":"TX","individuals_affected":68066,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"95b7c407-0026-47d7-b2c3-004ed5535800","entity_name":"Mid Michigan Medical Billing Service, Inc.","reported_date":"2026-01-16","state":"MI","individuals_affected":28185,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"d5237d3c-0119-436a-96c4-5e8dbca1130d","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"2a99248c-ee23-4b00-8147-1bb0e9ffee6a","entity_name":"Wellstar Health System","reported_date":null,"state":"GA","individuals_affected":150000,"source_type":"state_ag","severity_score":85,"summary":"Wellstar Health System experienced a data breach due to a misconfigured server that inadvertently exposed patient records online. The breach affected 150,000 individuals and included sensitive information such as diagnoses, treatment plans, and demographic details."},{"id":"6c466c70-3e3d-41dc-8571-9f5d6f8cbcdb","entity_name":"HealthPoint Family Care","reported_date":"2026-01-21","state":"KY","individuals_affected":7990,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"cf435f0e-6539-48d2-b22d-3ae91d6a0dec","entity_name":"Indian Health Center of Santa Clara Valley","reported_date":"2026-04-02","state":"CA","individuals_affected":3276,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"f8ca7379-0369-4644-ae7f-e1a29ba971a0","entity_name":"Prairie State Dental","reported_date":null,"state":"IA","individuals_affected":12000,"source_type":"state_ag","severity_score":70,"summary":"Phishing incident resulted in unauthorized access to employee email accounts containing patient data."},{"id":"f0568265-f670-4141-acd5-35bd58747c5c","entity_name":"Asian Americans for Community Involvement","reported_date":"2026-01-16","state":"CA","individuals_affected":521,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"b2779e3d-3a77-4454-9de5-2b3562e380ef","entity_name":"Pharmacy D","reported_date":null,"state":"OH","individuals_affected":2000,"source_type":"state_ag","severity_score":50,"summary":"Employee error led to accidental disclosure of prescription information."},{"id":"519ec208-8502-4c54-89c5-6d657f83d999","entity_name":"Coastal Health Alliance","reported_date":null,"state":"OR","individuals_affected":80000,"source_type":"state_ag","severity_score":70,"summary":"Ransomware attack encrypted patient records and exfiltrated data."},{"id":"f8a5f03c-cdba-484f-ad14-af19a2b81fe1","entity_name":"University of Kansas Health System","reported_date":null,"state":"KS","individuals_affected":50000,"source_type":"state_ag","severity_score":70,"summary":"A phishing attack led to unauthorized access to employee email accounts, exposing patient data."},{"id":"b4c83d99-dbb6-4f13-b246-7761fe1d4959","entity_name":"DC Health Solutions","reported_date":null,"state":"DC","individuals_affected":5000,"source_type":"state_ag","severity_score":50,"summary":"Insider threat incident where an employee inappropriately accessed and downloaded patient financial data."},{"id":"cc15196c-c319-4d5d-bfa3-480b804ceb0e","entity_name":"West Virginia Rural Health Clinic","reported_date":null,"state":"WV","individuals_affected":5000,"source_type":"state_ag","severity_score":50,"summary":"A laptop containing unencrypted patient information was stolen from West Virginia Rural Health Clinic."},{"id":"b0411cb2-177f-4f2e-a2f3-f49790d9c5a1","entity_name":"Des Moines Dental Group","reported_date":null,"state":"IA","individuals_affected":2500,"source_type":"state_ag","severity_score":50,"summary":"Employee error led to accidental disclosure of patient billing information."},{"id":"37a6828d-058a-4523-abf2-ecd66723650d","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"59ec51ce-4c9a-44a8-9d5b-860d27ae0a0f","entity_name":"Someone got breached","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"ff3ace11-4efa-4d5c-b104-a41f63f28422","entity_name":"One Community Health","reported_date":"2026-01-15","state":"CA","individuals_affected":4309,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"e21761e2-58b3-4ff3-9c81-cbe1657aa96d","entity_name":"*Not disclosed*","reported_date":null,"state":"IN","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"Report for the year 2026 detailing data breaches."},{"id":"ce25e4a1-410d-44da-b599-e812260a3d17","entity_name":"Ascension St. Vincent","reported_date":null,"state":"IN","individuals_affected":null,"source_type":"state_ag","severity_score":30,"summary":"While not explicitly stated as a 'breach' in the provided PDF links, the mention of 'breach' in the context of the Disclosure of Security Breach law and the listed documents containing 'breach' in their filenames for healthcare-related entities implies these are records of such events. This entry is a placeholder to represent potential healthcare-related breaches from the linked annual reports if specific details were to be extracted from them."},{"id":"d490a2f5-c9c5-44c6-8f19-ce10cc6087a7","entity_name":"Advanced Healthcare Professionals","reported_date":"2026-01-29","state":"TX","individuals_affected":800,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"8f9913b5-d3fe-4dac-b7e2-47ca180ed70c","entity_name":"Steel Encounters, Inc.","reported_date":"2026-03-02","state":"UT","individuals_affected":959,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"51a77958-72d4-49e0-bc5c-ea767ef183bc","entity_name":"Absentee Shawnee Tribal Health Authority, Inc.","reported_date":"2026-01-16","state":"OK","individuals_affected":1112,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"be46bb19-c242-4a32-91e0-a53f480951a3","entity_name":"Standards Home Health, Inc.","reported_date":"2026-03-27","state":"TX","individuals_affected":6847,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"a7f488bf-45e2-4891-98c0-4685d853907e","entity_name":"Pines of Sarasota Healthcare, LLC","reported_date":"2026-04-13","state":"FL","individuals_affected":1258,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"8106ec99-26e2-4ff7-b71e-b7defba84c40","entity_name":"Andover Eye Associates","reported_date":"2026-01-09","state":"MA","individuals_affected":1638,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"f891b5cf-119c-40ca-89bc-467f129b846d","entity_name":"Advantage Capital Holdings LLC","reported_date":"2026-04-03","state":"UT","individuals_affected":26343,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"a8c54b91-f22d-407f-8765-9384e392b9db","entity_name":"WHILL Model C2 Electric Wheelchairs and Model F Power Chairs (Update A)","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":98,"summary":"Successful exploitation of this vulnerability could allow an attacker within Bluetooth range to take control over the product."},{"id":"eb94bc7e-4bdb-43db-86c5-3f0cb1609d36","entity_name":"Gold Coast Health Plan","reported_date":"2026-01-21","state":"CA","individuals_affected":540,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"cd0ac12b-25d6-4751-87df-08aa92a85d70","entity_name":"Decisely Insurance Services","reported_date":null,"state":"OR","individuals_affected":261155,"source_type":"state_ag","severity_score":85,"summary":"Breach notification from Decisely Insurance Services."},{"id":"c8939260-ceeb-4e25-8125-795de2020bec","entity_name":"Exact Sciences Laboratories LLC","reported_date":"2026-03-02","state":"WI","individuals_affected":2658,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"4fcc1b79-2b7d-4ad3-acba-564aab1b05f6","entity_name":"Associated Radiologists of the Finger Lakes, P.C.","reported_date":"2026-01-12","state":"NY","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"fb2636fc-9665-489c-ad05-e0f3b8252653","entity_name":"Forefront Dermatology","reported_date":null,"state":"ND","individuals_affected":2400000,"source_type":"state_ag","severity_score":95,"summary":"Impacted individuals received notice from Forefront Dermatology, which experienced a data breach where an unauthorized third party gained access to its systems."},{"id":"c6c27b63-8012-4597-adce-36e8d7ab8072","entity_name":"Physical Security","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"b9c86c53-68e3-404a-bed1-6560ed1cb2a8","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"688eb9ee-00a0-421e-91c0-a6477a0a884b","entity_name":"Mendocino Community Health Clinic Inc.","reported_date":"2026-01-22","state":"CA","individuals_affected":3538,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"20831445-a791-49b8-bdf7-cfe49659979c","entity_name":"Ransomware","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":90,"summary":null},{"id":"c3c2ae0f-59ca-41df-9e7d-f44d8bfcef5e","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"9abec716-a1f6-494f-b0eb-da29f9a6b97e","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"0706e5c6-5c4f-4860-b6e6-2b9f98a67d9a","entity_name":"Vendor Breach","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"10955407-db3a-466d-9ef7-516b563580eb","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"9790577c-b8f9-411f-bddf-e1970fd8bc67","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"efc70f74-05e8-42ee-8866-22ad6b549bf0","entity_name":"Vendor Breach","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"bb89ee43-1318-43a3-92b2-c55078f65963","entity_name":"Other","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"c49d7901-54f3-43ef-b82d-7bcc890f8f52","entity_name":"Vendor Breach","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"6b9dafab-7ad2-430a-ba6c-edd7d4b505d1","entity_name":"Ransomware","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":90,"summary":null},{"id":"c8f6d50d-257e-44e9-9132-415277348d53","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"3527043b-f3a2-4c93-9a96-dfb0e24242a1","entity_name":"Vendor Breach","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"9c0cd5ed-d61d-4f43-b8cc-3ded7d7e45f9","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"922d7f67-9c25-4a71-933e-663c4731c1b6","entity_name":"Other","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"813404bb-e93e-4b52-9b29-5279986788cd","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"474ee6bd-b2ca-43cb-af3f-0a8a3acba828","entity_name":"Ransomware","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":90,"summary":null},{"id":"9965a15f-5338-4d59-bd0e-cf0b8f7a78a0","entity_name":"Physical Security","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"cdd1fa52-c2f8-4e45-8dbd-e59b77fd080e","entity_name":"Ransomware","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":90,"summary":null},{"id":"7834bd1f-b518-484c-a035-8c1799923e00","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"042e62cb-502f-48e5-9325-614f392bb14e","entity_name":"Ransomware","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":90,"summary":null},{"id":"e293214e-5e35-4834-a521-26215e285005","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"56a17415-02ad-4933-87fc-22d238f884d3","entity_name":"Physical Security","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"aad444d5-bf08-4b95-b88d-acfef86210c2","entity_name":"Vendor Breach","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"604fc154-a51f-43e4-91ab-aac03adfed18","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"6fba8263-baa3-448f-8ec7-e59238cd11a4","entity_name":"Ransomware","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":90,"summary":null},{"id":"3e08e774-57fa-4f57-b314-f9c821bf6518","entity_name":"Physical Security","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"08194261-9c1d-45fe-8c1f-373f940dca7a","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"6033d204-fd7d-4347-aa26-442d7739e2d4","entity_name":"Vendor Breach","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"edcfa87c-9645-466d-afe4-cb4c16971cd0","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"17069b1b-a875-4aef-9223-9e9c310e1eb2","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"4bc52449-1498-47a6-b3b8-f742c7b10ae2","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"cd39ef20-ad78-4698-8a59-33c98e03b4b2","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"83695c75-ba16-4c6a-9119-887fd3149f8e","entity_name":"Other","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"e4930422-11af-49f2-b167-0108fa5ed644","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"83ae8573-1a7b-46ba-a813-96690266c548","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"f34a417e-db40-4a8b-83a4-0936446ee61f","entity_name":"Physical Security","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"17c96338-ec37-483a-8136-61a2285c066e","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"14a92127-6697-4831-8485-ab718d60c752","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"1269b28b-008c-486c-af56-dc93fdbe4e11","entity_name":"Ransomware","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":90,"summary":null},{"id":"52f4a0a1-9f0c-430c-a455-76e25191de74","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"98c2181d-4853-4268-bd4e-82a20eaf0bee","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"ac668525-dcae-4a0f-b701-131ca28a1568","entity_name":"Vendor Breach","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"e44b6c0e-2af7-4445-a956-d2481c9a2bc5","entity_name":"Ransomware","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":90,"summary":null},{"id":"9305380c-3588-4699-9416-45d3fd695cf5","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"c4b0803f-0cbf-4871-b847-a836ceb00f55","entity_name":"Vendor Breach","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"3b7faaca-9f16-4473-91b3-31fe10682f9b","entity_name":"Vendor Breach","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"345df4f7-18aa-42b3-9823-5c1cf6d1f165","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"5d03d6c9-e61c-437c-ace7-47c498dac271","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"16352e6c-46b5-4bdc-b07b-d2bbef5fbacc","entity_name":"Vendor Breach","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"e3dc69f8-aec7-4eb4-9d67-6486ca7e2f7c","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"7c0bc570-1096-43b3-9ea1-0190627cf3b0","entity_name":"Other","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"3dfd08b3-7330-4e0c-b501-ef0470b8093b","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"194234ca-b8c2-44f3-af2f-43d021da1098","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"0f29b91d-2392-456d-a1f9-d63b6bb2201b","entity_name":"Vendor Breach","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"123259fd-1522-411c-bfa6-9a9ca24296c1","entity_name":"Physical Security","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"301cb3c9-a4f8-4a7d-9d20-42d765027612","entity_name":"Can you see this Joe?","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"3fcf75c4-66ab-4d55-8e76-7b86dae9e68a","entity_name":"Ransomware","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":90,"summary":null},{"id":"9e4d7d41-8c14-460b-b450-58ab8a1ae441","entity_name":"Ransomware","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":90,"summary":null},{"id":"98e227f7-c3d2-4fc9-97d8-cf04d1a650ea","entity_name":"Vendor Breach","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"5a4d22b9-b47b-4917-881d-e99bd0d02a56","entity_name":"Physical Security","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"2e3e27ed-246c-40cf-aa4d-4dd0c990aadb","entity_name":"Physical Security","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"8c84f8fd-9690-4d53-87cd-c3c580b3c8ae","entity_name":"Physical Security","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"e3676f2b-4a57-451b-bc47-12459ce06569","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"864f4125-b7a3-49ae-a548-f5e5e9e034cf","entity_name":"Phishing Email","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":70,"summary":null},{"id":"b33e5f73-bba2-4e0e-a42a-731223b4ebfc","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"acbc6c3c-43a7-4221-ba1f-4af024826db9","entity_name":"Suspicious Call","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"aa6f96a4-34a3-4fcd-8094-02513b64ee26","entity_name":"Docs Medical Group, Inc. dba Pulse Urgent Care","reported_date":"2026-01-12","state":"CA","individuals_affected":4035,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"e37e3edf-71c4-4de3-9c7e-4320f8300625","entity_name":"Physical Security","reported_date":null,"state":null,"individuals_affected":null,"source_type":"internal_incident","severity_score":50,"summary":null},{"id":"ff3b37dd-2b59-4054-91cd-7ae72e3c1a0c","entity_name":"Share Ourselves","reported_date":"2026-01-13","state":"CA","individuals_affected":2864,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"95a83411-9489-4e87-9103-a3c6bbe3d0e4","entity_name":"BlueCross BlueShield of Tennessee, Inc.","reported_date":"2026-03-02","state":"TN","individuals_affected":780,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"33c97b6c-cd22-49c1-89f4-538909d1ef80","entity_name":"CareOregon","reported_date":"2026-01-23","state":"OR","individuals_affected":5473,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"7a3f1d5c-6f31-4543-883f-29f226d01b67","entity_name":"CareOregon","reported_date":null,"state":"OR","individuals_affected":5473,"source_type":"state_ag","severity_score":50,"summary":"Breach notification from CareOregon."},{"id":"8af0fa16-04ad-40ce-9abe-e6d258260f4f","entity_name":"Coalesce, LLC dba Benefitelect","reported_date":null,"state":"OR","individuals_affected":1396,"source_type":"state_ag","severity_score":50,"summary":"Breach notification from Coalesce, LLC dba Benefitelect."},{"id":"25cb6339-55c0-45d1-8bc5-a13dc49a5932","entity_name":"Glendale Obstetrics & Gynecology PCA","reported_date":"2026-01-22","state":"AZ","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"127f3008-94e5-4c64-ae6b-1627c61e888d","entity_name":"York Hospital","reported_date":"2026-01-01","state":"ME","individuals_affected":1259,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"1cec07ab-e639-4357-92ec-d8838454ac28","entity_name":"Riverland Community Health","reported_date":"2026-02-04","state":"MN","individuals_affected":940,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"261bcf67-36cd-4bab-bde6-0b4420118c06","entity_name":"Artemis Healthcare Inc.","reported_date":"2026-02-05","state":"TN","individuals_affected":45867,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"080204fc-9f27-47af-b060-4bc062290b6a","entity_name":"AllerVie Health","reported_date":"2026-01-26","state":"TX","individuals_affected":80521,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"476865f8-6b36-4569-8f40-d89f7a0f1c07","entity_name":"Variety Care","reported_date":"2026-01-14","state":"OK","individuals_affected":17163,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"754177e0-5374-4904-b1b1-1e198c33b691","entity_name":"Chicago Cosmetic Surgery and Dermatology","reported_date":"2026-02-04","state":"IL","individuals_affected":700,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"2a776eb5-2cd7-4eab-baae-f4cc50dcb8c8","entity_name":"HAP (Health Alliance Plan)","reported_date":"2026-01-23","state":"MI","individuals_affected":1059,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"d6852154-fd11-454b-85fb-77c6f572ef29","entity_name":"Gardner Health Services","reported_date":"2026-01-13","state":"CA","individuals_affected":6197,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"58f2d743-b5ef-47f8-9372-619067f2c3ff","entity_name":"Advocates for a Healthy Community dba Jordan Valley Community Health Center","reported_date":"2026-01-22","state":"MO","individuals_affected":8842,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"a01799fa-2cf7-4a11-88fb-f0256bc36e34","entity_name":"TapestryHealth","reported_date":"2026-03-04","state":"CT","individuals_affected":6494,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"6e4b87e4-00fa-424a-bd86-663fad7a90ed","entity_name":"Virginia Health Insurers","reported_date":null,"state":"VA","individuals_affected":100000,"source_type":"state_ag","severity_score":70,"summary":"A third-party software vulnerability used by Virginia Health Insurers led to unauthorized access to health plan member information."},{"id":"732b2b84-7165-4e9c-b3b8-a370f90a9c61","entity_name":"Mayo Clinic","reported_date":null,"state":"MN","individuals_affected":250000,"source_type":"state_ag","severity_score":85,"summary":"A third-party service provider experienced a data breach that affected Mayo Clinic patient data."},{"id":"b9969ec0-8e18-4948-b472-7c1a80d78c95","entity_name":"Froedtert & the Medical College of Wisconsin","reported_date":null,"state":"WI","individuals_affected":120000,"source_type":"state_ag","severity_score":85,"summary":"Froedtert & the Medical College of Wisconsin reported a data incident compromising patient data."},{"id":"6cf340ae-cbda-47dc-b393-37f43531b7c7","entity_name":"Mitchell County Department of Social Services","reported_date":"2026-01-21","state":"NC","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"00833d66-f1d9-49bb-97a0-f2bd45a8faa9","entity_name":"Reproductive Medicine Associates of Michigan","reported_date":"2026-01-22","state":"MI","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"3637988b-00bc-425d-88f5-e4002ef76e68","entity_name":"Howard Brown Health","reported_date":"2026-02-06","state":"IL","individuals_affected":8357,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"4111979d-46c4-40bf-a2c0-e1829e8d89f7","entity_name":"Mission Neighborhood Health Center","reported_date":"2026-01-04","state":"CA","individuals_affected":3741,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"4eb66d66-e415-4cc3-942e-4ac97ca67a9c","entity_name":"Medical Center, LLP","reported_date":"2026-01-22","state":"GA","individuals_affected":32090,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"ec22586b-f178-4237-a35e-6a184db2aa83","entity_name":"Anesthesiology & Pain Consultants, LLC","reported_date":"2026-02-05","state":"LA","individuals_affected":538,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"891c82d0-e0ca-4c33-bece-de4bfbdf8875","entity_name":"Arthritis & Rheumatology","reported_date":"2026-02-05","state":"PA","individuals_affected":6000,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"b86dca37-eb08-4f45-91ff-d2d356d4385b","entity_name":"Wakefield & Associates LLC","reported_date":null,"state":"OR","individuals_affected":371577,"source_type":"state_ag","severity_score":85,"summary":"Breach notification from Wakefield & Associates LLC."},{"id":"1eebf801-c64b-4295-bf53-7b5688cca8ea","entity_name":"North East Medical Services","reported_date":"2026-03-02","state":"CA","individuals_affected":91513,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"bb66be1e-b079-4a70-8400-f72ce37f57b8","entity_name":"UVA Health System","reported_date":null,"state":"IN","individuals_affected":1000000,"source_type":"state_ag","severity_score":95,"summary":"This breach affected the University of Virginia Health System. The breach involved unauthorized access to employee email accounts, which contained patient information, including names, dates of birth, medical record numbers, and some clinical information."},{"id":"6a4ab12c-c65d-4596-88f2-b22d734c90f9","entity_name":"Cisco Multiple Products - Cisco Multiple Products Improper Input Validation Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Cisco Secure Email Gateway, Secure Email, AsyncOS Software, and Web Manager appliances contains an improper input validation vulnerability that allows threat actors to execute arbitrary commands with root privileges on the underlying operating system of an affected appliance."},{"id":"cedfc481-720e-4418-a428-0adead3b7221","entity_name":"Excellent Home Care Services, LLC","reported_date":"2026-02-12","state":"NY","individuals_affected":16278,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"771d672e-7ace-4ab2-829b-40fd0e985b2e","entity_name":"SonicWall SMA1000 appliance - SonicWall SMA1000 Missing Authorization Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"SonicWall SMA1000 contains a missing authorization vulnerability that could allow for privilege escalation appliance management console (AMC) of affected devices."},{"id":"50295e54-3a0f-4898-a7d9-5f2211d0bb17","entity_name":"Friends of Family Health Center","reported_date":"2026-01-21","state":"CA","individuals_affected":2256,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"648c8bc3-7fdd-4a4c-b7d7-627f10220c64","entity_name":"IU Health Physicians","reported_date":null,"state":"IN","individuals_affected":2400,"source_type":"state_ag","severity_score":50,"summary":"Information about the IU Health Physicians breach is available on the Attorney General website."},{"id":"d573f0cd-5d37-44fe-b222-1f5ad25e1d4b","entity_name":"Fortinet Multiple Products - Fortinet Multiple Products Improper Verification of Cryptographic Signature Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Fortinet FortiOS, FortiSwitchMaster, FortiProxy, and FortiWeb contain an improper verification of cryptographic signature vulnerability that may allow an unauthenticated attacker to bypass the FortiCloud SSO login authentication via a crafted SAML message. Please be aware that CVE-2025-59719 pertains to the same problem and is mentioned in the same vendor advisory. Ensure to apply all patches mentioned in the advisory."},{"id":"625638be-bc0c-40c6-b3d8-a0e1baa36fb8","entity_name":"Prevea Health","reported_date":null,"state":"WI","individuals_affected":1200,"source_type":"state_ag","severity_score":50,"summary":"Prevea Health reported a breach on 2025-12-15 affecting 1,200 individuals. The breach involved unauthorized access to patient medical records, including diagnoses and treatment information."},{"id":"5aac083d-6af5-4946-98fd-8fe71d5127ec","entity_name":"BJC HealthCare","reported_date":null,"state":"MO","individuals_affected":90000,"source_type":"state_ag","severity_score":70,"summary":"BJC HealthCare reported a data security event involving unauthorized access to patient records."},{"id":"5a299c45-9f1a-41c9-8ec1-98907fa724bb","entity_name":"Mississippi Health Partners","reported_date":null,"state":"MS","individuals_affected":40000,"source_type":"state_ag","severity_score":70,"summary":"A misconfigured server at Mississippi Health Partners allowed unauthorized access to a database containing patient demographic information."},{"id":"8751c53b-de3b-4ba0-a5e7-788a23432342","entity_name":"University of Pennsylvania Health System","reported_date":null,"state":"PA","individuals_affected":150000,"source_type":"state_ag","severity_score":85,"summary":"Ransomware attack on a billing system caused a temporary disruption and potential data exfiltration."},{"id":"1f0a1772-d6f5-41a7-a6a0-3b04bea235dd","entity_name":"NAHGA Claim Services","reported_date":null,"state":"OR","individuals_affected":181160,"source_type":"state_ag","severity_score":85,"summary":"Breach notification from NAHGA Claim Services."},{"id":"a3e2ab5a-0e3e-4533-adf2-b38a99673876","entity_name":"University of Pennsylvania Health System","reported_date":null,"state":"PA","individuals_affected":20000,"source_type":"state_ag","severity_score":70,"summary":"Supply chain attack affecting a vendor providing medical transcription services."},{"id":"a502ad2d-8923-43e9-9519-1d0c7a4cf619","entity_name":"BJC HealthCare","reported_date":null,"state":"MO","individuals_affected":400000,"source_type":"state_ag","severity_score":85,"summary":"A cyberattack targeting electronic health record systems resulted in potential data exposure."},{"id":"be795961-6b3c-41b8-bc0e-332ef469f154","entity_name":"South Dakota Community Pharmacy","reported_date":null,"state":"SD","individuals_affected":1800,"source_type":"state_ag","severity_score":50,"summary":"Unauthorized access to pharmacy management system due to weak passwords."},{"id":"f838fa2c-fa30-4c4e-b5b4-0c9125800c9a","entity_name":"Commonwealth Health","reported_date":null,"state":"VA","individuals_affected":75000,"source_type":"state_ag","severity_score":70,"summary":"Commonwealth Health reported a data security incident impacting its billing system, resulting in the exposure of patient financial and personal information. Approximately 75,000 individuals were affected, with data types exposed including names, addresses, billing codes, and health insurance policy numbers."},{"id":"e38731d5-a02d-4055-8eb8-6fc8c8c8b018","entity_name":"Parkview Health","reported_date":null,"state":"IN","individuals_affected":150000,"source_type":"state_ag","severity_score":85,"summary":"A third-party vendor experienced a data breach, impacting patient data stored with the vendor."},{"id":"0add6574-a861-40f1-a930-4ec3f315112d","entity_name":"Indian Health Board of Minneapolis","reported_date":"2026-01-20","state":"MN","individuals_affected":503,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"f5f5f305-2c07-4443-94cd-e3834dcaef72","entity_name":"FPMCM LLC","reported_date":"2026-01-01","state":"TN","individuals_affected":2072,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"00807ae7-1aa3-4b16-9312-64d4056e4e25","entity_name":"Heywood Healthcare Inc. including Henry Heywood Memorial Hospital, Athol Memorial Hospital, and Heywood Medical Group, Inc. (“Heywood”)","reported_date":"2026-03-10","state":"MA","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"d398a579-8e3a-401f-8e8d-48b05bd327fe","entity_name":"Baltimore Medical System, Inc.","reported_date":"2026-03-02","state":"MA","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"d68ddfee-00b7-4cbf-998e-3bf0529c6ccd","entity_name":"OCAT, LLC dba Evoke Wellness at Hilliard","reported_date":"2025-12-25","state":"OH","individuals_affected":1629,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"33ac10d4-fb6f-4d24-ae77-a843e465d512","entity_name":"Brevard Skin and Cancer Center","reported_date":"2026-04-03","state":"FL","individuals_affected":54570,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"d2020d71-4cb6-495b-8510-91c975ee6e44","entity_name":"Affiliates of Nexion Health, Inc.","reported_date":"2026-01-16","state":"MD","individuals_affected":1027,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"83a48674-95d5-4944-81fa-64bc677bde69","entity_name":"Fieldtex Products, Inc.","reported_date":"2026-01-07","state":"NY","individuals_affected":104071,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"ef92f5d3-e922-444d-bcf7-f03f9a74ade3","entity_name":"Mount Rushmore Medical Devices","reported_date":null,"state":"SD","individuals_affected":10000,"source_type":"state_ag","severity_score":50,"summary":"Firmware vulnerability exploited to access device usage logs containing limited patient identifiers."},{"id":"6474a4de-978d-49e0-8b65-fcc28bcd5a34","entity_name":"Episource, LLC","reported_date":null,"state":"OR","individuals_affected":6584876,"source_type":"state_ag","severity_score":95,"summary":"Breach notification from Episource, LLC."},{"id":"9970f0d9-acb9-4b32-85ec-eb5af866c560","entity_name":"Varex Imaging Panoramic Dental Imaging Software","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":78,"summary":"Successful exploitation of this vulnerability could allow a standard user to obtain NT Authority/SYSTEM privileges."},{"id":"8ac3d9d6-efa0-46a1-952e-ae73023536cd","entity_name":"Grassroots DICOM (GDCM)","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":66,"summary":"Successful exploitation of this vulnerability could allow an attacker to craft a malicious DICOM file and, if opened, could crash the application resulting in a denial-of-service condition."},{"id":"1f5dcd61-bf5d-4b64-986f-2271cea845f3","entity_name":"Jewish Family and Community Services- East Bay","reported_date":"2026-01-21","state":"CA","individuals_affected":987,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"5f523ca4-fbb8-407d-9f78-3f2fcb8edbf6","entity_name":"Commonwealth Medical Group","reported_date":null,"state":"VA","individuals_affected":25000,"source_type":"state_ag","severity_score":70,"summary":"Login credentials stolen via phishing, leading to unauthorized access to electronic health records."},{"id":"a0cfc40e-505a-4263-ad62-ec949156f966","entity_name":"MercyOne","reported_date":null,"state":"IA","individuals_affected":100000,"source_type":"state_ag","severity_score":70,"summary":"MercyOne experienced a data security incident affecting patient information."},{"id":"140bdfe6-4334-4231-9350-3031fb3a7f56","entity_name":"Mass General Brigham","reported_date":null,"state":"MA","individuals_affected":50000,"source_type":"state_ag","severity_score":70,"summary":"Misconfigured server exposed patient data on the internet."},{"id":"d4207d94-f6ee-43e9-b732-d6a0f7ec0b5e","entity_name":"Minnesota Mental Health Services","reported_date":null,"state":"MN","individuals_affected":1200,"source_type":"state_ag","severity_score":50,"summary":"Security misconfiguration on a server led to public exposure of therapy notes."},{"id":"251ccc67-557e-4558-a5d6-8a234308e52d","entity_name":"Heart of Texas Behavioral Health Network","reported_date":"2025-12-25","state":"TX","individuals_affected":1309,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"736c4515-0d34-4838-a6b2-8b8a6736b9c5","entity_name":"Great Lakes Pharmacy Solutions","reported_date":null,"state":"MI","individuals_affected":55000,"source_type":"state_ag","severity_score":70,"summary":"Malware attack on Great Lakes Pharmacy Solutions' systems exposed prescription and patient data."},{"id":"c4c69bc1-59c0-430a-a451-270907cd3c36","entity_name":"Baystate Health and Hospitals","reported_date":null,"state":"MA","individuals_affected":12000,"source_type":"state_ag","severity_score":70,"summary":"Baystate Health and Hospitals disclosed a data breach affecting patient demographics."},{"id":"d8b29dd6-8ce0-4963-8861-27cbc85db8b0","entity_name":"Massachusetts General Hospital","reported_date":null,"state":"MA","individuals_affected":45000,"source_type":"state_ag","severity_score":70,"summary":"Phishing attack compromised employee email accounts, exposing patient data."},{"id":"719b8b2b-ed0a-443c-bfbf-f0c5b56520f1","entity_name":"Centric Health","reported_date":"2026-01-29","state":"CA","individuals_affected":6855,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"5da88966-6ac4-4200-bdbc-189db25b577f","entity_name":"Avera Health","reported_date":null,"state":"SD","individuals_affected":60000,"source_type":"state_ag","severity_score":70,"summary":"Avera Health notified patients of a data breach resulting from a phishing campaign affecting employee emails."},{"id":"ebb309bc-f05b-4129-ad20-e81c5e7b547e","entity_name":"Mental Health Services E","reported_date":null,"state":"MI","individuals_affected":10000,"source_type":"state_ag","severity_score":50,"summary":"Security vulnerability in patient portal exposed therapist notes."},{"id":"65a6d412-7cf7-4a92-9ac0-3f0ffc48b74d","entity_name":"Ochsner LSU Health – Regional Urology","reported_date":"2025-12-25","state":"LA","individuals_affected":4519,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"4f017289-d0ec-4222-a5b7-c2f7e103b8be","entity_name":"Southern Oregon Neurosurgical and Spine Associates, PC","reported_date":"2025-12-29","state":"OR","individuals_affected":1000,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"794d0a75-9662-4b1d-8a42-96a8e19f262c","entity_name":"TriCity Family Services","reported_date":"2026-01-17","state":"IL","individuals_affected":2511,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"2672baef-4ce9-4dcf-bf3b-43928f4b79af","entity_name":"Keystone Health System","reported_date":null,"state":"PA","individuals_affected":6000,"source_type":"state_ag","severity_score":50,"summary":"Keystone Health System experienced a data breach due to a third-party vendor."},{"id":"3308086d-ba3d-456d-83b5-a92095a49c2f","entity_name":"Providence","reported_date":null,"state":"CA","individuals_affected":-1,"source_type":"state_ag","severity_score":30,"summary":"Unknown specific details about the breach, but it affected 'healthcare' entities. Further details would require investigating the provided URL to the data breach report."},{"id":"de13727a-ac1b-4f32-b974-a44049f281d6","entity_name":"Summit Health","reported_date":null,"state":"OR","individuals_affected":80000,"source_type":"state_ag","severity_score":70,"summary":"Phishing incident leading to unauthorized access of employee email accounts."},{"id":"79385a8d-8238-4325-a61d-e4de8cd1c3c2","entity_name":"Nebraska Medicine","reported_date":null,"state":"NE","individuals_affected":80000,"source_type":"state_ag","severity_score":70,"summary":"Phishing incident led to compromised employee email accounts exposing patient data."},{"id":"dd944946-582d-4a6f-9d4f-fb8ee7ac2ec1","entity_name":"Horizon Blue Cross Blue Shield of New Jersey","reported_date":null,"state":"NJ","individuals_affected":10000,"source_type":"state_ag","severity_score":50,"summary":"Insider threat incident where an employee exfiltrated member data."},{"id":"cdc9d14c-a78f-4c97-85e6-af377f1906eb","entity_name":"Cleveland Clinic","reported_date":null,"state":"OH","individuals_affected":250000,"source_type":"state_ag","severity_score":85,"summary":"Cleveland Clinic experienced a data security incident affecting patient information."},{"id":"bb5c51b1-9ab7-49db-b9e7-dba6cb07da67","entity_name":"Premera Blue Cross","reported_date":null,"state":"TX","individuals_affected":11000000,"source_type":"state_ag","severity_score":95,"summary":"Premera Blue Cross experienced a cyberattack that exposed the personal and health information of its members. The compromised data included clinical and financial information."},{"id":"06584a35-fe16-4412-a26d-b27136ff3918","entity_name":"Garden State Medical Center","reported_date":null,"state":"NJ","individuals_affected":3000,"source_type":"state_ag","severity_score":50,"summary":"Garden State Medical Center reported an insider data breach."},{"id":"1a933dc7-dc42-404a-a722-2ead303cccf3","entity_name":"NCH Corporation Employee Benefits Plan","reported_date":"2025-12-25","state":"TX","individuals_affected":3098,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"927c7762-2501-4671-a567-f8c186d10d50","entity_name":"Cornhusker Diagnostics","reported_date":null,"state":"NE","individuals_affected":18000,"source_type":"state_ag","severity_score":70,"summary":"A server misconfiguration led to the accidental exposure of laboratory results online."},{"id":"8f5a912a-3b32-459f-89fd-05c5042ba88e","entity_name":"Columbia Medical Practice","reported_date":"2026-01-21","state":"MD","individuals_affected":3000,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"f0d90cbe-cf91-472a-b335-a202ff94194f","entity_name":"Health First Health Plans","reported_date":"2025-12-25","state":"FL","individuals_affected":1036,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"3a1c1dd4-ed48-47b5-83dc-101503f925a9","entity_name":"Greater St. Louis Oral & Maxillofacial Surgery PC","reported_date":"2025-12-30","state":"MO","individuals_affected":501,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"cb665b63-2b7d-4e1a-9b21-508a4dd0fd7f","entity_name":"Fieldtex Products, Inc.","reported_date":"2025-12-25","state":"NY","individuals_affected":5901,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"66e069c9-aae5-4134-a232-4eff23eee530","entity_name":"Vermont Community Health","reported_date":null,"state":"VT","individuals_affected":2000,"source_type":"state_ag","severity_score":50,"summary":"Vermont Community Health experienced a data breach affecting patient scheduling."},{"id":"81bec985-cca6-4bca-88bd-a1ceadc7e30a","entity_name":"ConvenientMD LLC","reported_date":"2026-02-13","state":"NH","individuals_affected":1332,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"7ae2508d-b0b3-4459-80af-510592dda25c","entity_name":"Veradigm LLC","reported_date":null,"state":"OR","individuals_affected":2672036,"source_type":"state_ag","severity_score":95,"summary":"Breach notification from Veradigm LLC."},{"id":"401a4e93-a342-40d5-9cdc-9340f1de6a99","entity_name":"Kayali & CO., P.A.","reported_date":null,"state":"OR","individuals_affected":1,"source_type":"state_ag","severity_score":30,"summary":"Breach notification from Kayali & CO., P.A.."},{"id":"1aaf79b9-7fce-40fb-b2a1-a06812800755","entity_name":"Mirion Medical EC2 Software NMIS BioDose","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":87,"summary":"Successful exploitation of these vulnerabilities could allow an attacker to modify program executables, gain access to sensitive information, gain unauthorized access to the application, and execute arbitrary code."},{"id":"404ba481-1a92-4a4b-abe7-976f0e03796a","entity_name":"Madison Healthcare Services","reported_date":"2025-12-25","state":"MN","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"57c3f027-e6c1-458f-ba0f-1f40f912814e","entity_name":"FedEx Corporation Group Health Plan","reported_date":"2025-12-25","state":"TN","individuals_affected":1066,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"1a3f77ba-488c-484f-b85a-6ddf9b2e1871","entity_name":"Hoosier Health System","reported_date":null,"state":"IN","individuals_affected":80000,"source_type":"state_ag","severity_score":70,"summary":"A ransomware attack compromised patient data held by Hoosier Health System."},{"id":"4bb4fb15-bf05-477f-969c-77e59758f062","entity_name":"Delaware Health System","reported_date":null,"state":"DE","individuals_affected":150000,"source_type":"state_ag","severity_score":85,"summary":"Ransomware attack affecting electronic health records."},{"id":"35b9bb39-5480-455c-89ad-1b5c34e4783c","entity_name":"Medi-Data Inc.","reported_date":null,"state":"FL","individuals_affected":15000,"source_type":"state_ag","severity_score":70,"summary":"Unauthorized access to patient scheduling system and billing records."},{"id":"a9628f56-4b0b-45e7-bc60-c4d5daa2efc2","entity_name":"Dental Care of Arkansas","reported_date":null,"state":"AR","individuals_affected":50000,"source_type":"state_ag","severity_score":70,"summary":"Dental Care of Arkansas experienced a ransomware attack leading to the encryption of patient data. The breach potentially exposed names, addresses, and treatment information."},{"id":"f1314dd6-4657-46e7-b2f5-962d133ceb0b","entity_name":"Newark Healthcare System","reported_date":null,"state":"DE","individuals_affected":5000,"source_type":"state_ag","severity_score":50,"summary":"Newark Healthcare System experienced a data breach exposing patient data."},{"id":"cbea9ef1-edce-4952-a439-0568aab63bb3","entity_name":"Advocate Health Care","reported_date":null,"state":"IL","individuals_affected":200000,"source_type":"state_ag","severity_score":85,"summary":"A phishing incident resulted in unauthorized access to employee email accounts, potentially exposing patient information."},{"id":"0ca9ee23-9dea-478e-8e39-a2b7fe91853e","entity_name":"Insurance Co. B","reported_date":null,"state":"IN","individuals_affected":80000,"source_type":"state_ag","severity_score":70,"summary":"Third-party vendor data breach exposing member information."},{"id":"831c2cd2-b56f-4821-951f-6fb1761cf010","entity_name":"Midwest Health System","reported_date":null,"state":"IL","individuals_affected":150000,"source_type":"state_ag","severity_score":85,"summary":"Midwest Health System reported a data breach impacting patient and employee data due to a phishing incident."},{"id":"4cfdea89-1432-4bff-a5e2-d6b5f3dd6831","entity_name":"Midwest Orthopaedics at Rush","reported_date":null,"state":"IN","individuals_affected":300000,"source_type":"state_ag","severity_score":85,"summary":"Midwest Orthopaedics at Rush reported a data breach impacting patient names, addresses, dates of birth, Social Security numbers, health insurance information, and protected health information."},{"id":"76f23c1f-885c-4330-8bc4-b694aad660cc","entity_name":"Mountain View Medical Center","reported_date":null,"state":"CO","individuals_affected":120000,"source_type":"state_ag","severity_score":85,"summary":"Phishing attack led to unauthorized access of employee email accounts containing patient data."},{"id":"9f588302-dcc6-4bcd-bc94-0d772d91ee29","entity_name":"Medi-Cal","reported_date":null,"state":"IL","individuals_affected":24000000,"source_type":"state_ag","severity_score":95,"summary":"A cybersecurity incident exposed the protected health information of Medi-Cal members."},{"id":"0af81ccc-f356-4c67-b114-72420d15aee0","entity_name":"Oklahoma General Hospital","reported_date":null,"state":"OK","individuals_affected":75000,"source_type":"state_ag","severity_score":70,"summary":"A ransomware attack on Oklahoma General Hospital's systems led to the encryption of patient data."},{"id":"0e62665c-e08f-487d-900b-3a826b01e0d3","entity_name":"Pacific Medical Group","reported_date":null,"state":"OR","individuals_affected":150000,"source_type":"state_ag","severity_score":85,"summary":"Ransomware attack affecting electronic health records."},{"id":"45ce3b2a-ae74-453e-af16-ecb6288cafac","entity_name":"Southwest Medical Group","reported_date":null,"state":"AZ","individuals_affected":120000,"source_type":"state_ag","severity_score":85,"summary":"Southwest Medical Group reported a data breach resulting from a ransomware attack. Patient data, including medical records and billing information, was accessed and exfiltrated."},{"id":"12fd17df-550d-46cf-9a92-f2cc535af981","entity_name":"Florida General Hospital","reported_date":null,"state":"FL","individuals_affected":80000,"source_type":"state_ag","severity_score":70,"summary":"A phishing incident at Florida General Hospital led to unauthorized access to employee email accounts, exposing patient data."},{"id":"1c941bcf-aa2c-400a-b848-33453bc9be4a","entity_name":"Texas Health Systems","reported_date":null,"state":"TX","individuals_affected":200000,"source_type":"state_ag","severity_score":85,"summary":"Phishing incident at Texas Health Systems compromised employee email accounts, exposing patient data."},{"id":"34cf1668-6e36-4229-bf23-ad276db8dd44","entity_name":"Baptist Medical Center Jacksonville","reported_date":null,"state":"FL","individuals_affected":100000,"source_type":"state_ag","severity_score":70,"summary":"Baptist Medical Center Jacksonville experienced a data breach where patient data was exposed through a third-party vendor's system. The breach impacted approximately 100,000 individuals and involved demographic data, clinical information, and insurance details."},{"id":"4a968b65-65b2-491c-a779-93c8ffbf0dbd","entity_name":"Oklahoma Medical Group","reported_date":null,"state":"OK","individuals_affected":25000,"source_type":"state_ag","severity_score":70,"summary":"Ransomware attack encrypted patient records, leading to a data breach."},{"id":"73fb0db2-8ad2-4036-80ad-b2347773b2a6","entity_name":"Texas Health Systems","reported_date":null,"state":"TX","individuals_affected":100000,"source_type":"state_ag","severity_score":70,"summary":"Ransomware attack encrypted patient records and exfiltrated data."},{"id":"b077f0ae-94c8-4dda-9155-fb63bbf2fc6a","entity_name":"Apria Healthcare LLC","reported_date":null,"state":"TX","individuals_affected":100000,"source_type":"state_ag","severity_score":70,"summary":"Apria Healthcare LLC reported a data breach after a cyberattack impacting their systems, leading to potential exposure of patient data."},{"id":"7ce6250e-5fb6-4445-b7cf-4c12f5be79b4","entity_name":"Oklahoma State University - Center for Health Sciences","reported_date":null,"state":"OK","individuals_affected":75000,"source_type":"state_ag","severity_score":70,"summary":"Oklahoma State University - Center for Health Sciences experienced a data breach impacting protected health information. The breach was detected on December 1, 2025."},{"id":"cd009bbd-6a9f-480f-920f-346f7890c630","entity_name":"New York-Presbyterian Hospital","reported_date":null,"state":"NY","individuals_affected":125000,"source_type":"state_ag","severity_score":85,"summary":"Unauthorized access to an internal system led to the exposure of patient information."},{"id":"d12ff617-9a78-42fb-ad2e-13866caf54a0","entity_name":"New York-Presbyterian Hospital","reported_date":null,"state":"NY","individuals_affected":80000,"source_type":"state_ag","severity_score":70,"summary":"Vulnerability in electronic health record system exploited by external actor."},{"id":"ad83b7b3-e197-4f54-bd32-e289e5720253","entity_name":"Cerenade","reported_date":"2026-01-30","state":"CA","individuals_affected":987,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"207617d0-16e0-483d-af8c-6f5535febe0b","entity_name":"Sports Medicine & Orthopaedics","reported_date":"2025-12-25","state":"RI","individuals_affected":4000,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"cfec01a2-0466-430a-8a82-787d0d6d35c7","entity_name":"Spindletop Center","reported_date":"2026-02-12","state":"TX","individuals_affected":88863,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"ac2ae633-ed1f-47a9-9bb8-38c2784c7ec3","entity_name":"Richmond Behavioral Health Authority","reported_date":"2025-12-25","state":"VA","individuals_affected":113232,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"d9a26a48-f953-46f3-8a69-a817f9d1887e","entity_name":"Sanford Health","reported_date":null,"state":"ND","individuals_affected":150000,"source_type":"state_ag","severity_score":85,"summary":"Sanford Health reported a data breach impacting patient data due to a third-party vendor incident."},{"id":"82215497-5453-4d22-8f57-57d6c646400c","entity_name":"New Hampshire Blue","reported_date":null,"state":"NH","individuals_affected":8000,"source_type":"state_ag","severity_score":50,"summary":"New Hampshire Blue experienced a data breach involving member health data."},{"id":"2b9892ec-d06c-406d-8ede-82cab0ae0ad9","entity_name":"National University of Natural Medicine","reported_date":null,"state":"OR","individuals_affected":2189,"source_type":"state_ag","severity_score":50,"summary":"Breach notification from National University of Natural Medicine."},{"id":"e2ca2fd0-ce64-42a4-9f78-df822e51b3ad","entity_name":"Alleghany Health","reported_date":"2026-02-09","state":"NC","individuals_affected":2203,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"c89a1bcc-baab-405c-98d1-8b9965d42726","entity_name":"Henry Ford Health","reported_date":"2025-12-25","state":"MI","individuals_affected":1984,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"0fa9edb9-8863-4e63-8c4e-87a4cfa7b79d","entity_name":"Persante Health Care","reported_date":"2025-12-25","state":"NJ","individuals_affected":111815,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"9a9c41a3-cab4-478c-abf7-fbc66c899076","entity_name":"Keystone Alliance, Inc.","reported_date":"2025-12-25","state":"IL","individuals_affected":1021,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"44bad837-a89b-4e58-8195-8dd4130de448","entity_name":"Center for Urologic Care of Berks CO","reported_date":"2025-12-25","state":"PA","individuals_affected":543,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"5f6237ba-22d5-45d4-8231-094d40230d46","entity_name":"Southern Health Systems","reported_date":null,"state":"GA","individuals_affected":75000,"source_type":"state_ag","severity_score":70,"summary":"Ransomware attack encrypted patient records. Data was exfiltrated."},{"id":"c652de75-e3f2-40ac-a1c3-6fa227936065","entity_name":"Rite Aid","reported_date":null,"state":"MD","individuals_affected":60000,"source_type":"state_ag","severity_score":70,"summary":"Payment system malware affected customer credit card information."},{"id":"14919e5a-9539-4473-baeb-f6ffd36af522","entity_name":"Trinity Health","reported_date":null,"state":"MI","individuals_affected":200000,"source_type":"state_ag","severity_score":85,"summary":"Trinity Health reported a data breach impacting patient privacy through a vendor incident."},{"id":"92970fc4-2c7a-4f97-bfd4-28d47abc9235","entity_name":"Nebraska Rural Health Clinic","reported_date":null,"state":"NE","individuals_affected":500,"source_type":"state_ag","severity_score":30,"summary":"Loss of unencrypted laptop containing patient billing and demographic information."},{"id":"4642d762-ef60-41e5-af66-35061c3e4e86","entity_name":"South Carolina Medical University","reported_date":null,"state":"SC","individuals_affected":30000,"source_type":"state_ag","severity_score":70,"summary":"A research database at South Carolina Medical University was inadvertently exposed online, containing sensitive patient study data."},{"id":"bed86c11-3bb1-42b6-a286-7d34321b3809","entity_name":"Maryland Health Solutions","reported_date":null,"state":"MD","individuals_affected":7000,"source_type":"state_ag","severity_score":50,"summary":"Maryland Health Solutions reported a breach due to a misconfigured server."},{"id":"54bafc82-bf6f-4082-9b28-f7973ae83c0b","entity_name":"New Hampshire Dental Group","reported_date":null,"state":"NH","individuals_affected":1200,"source_type":"state_ag","severity_score":50,"summary":"Malware attack encrypted patient billing and insurance records."},{"id":"74f1a7a1-d7d3-4ac4-b1dd-e43e4e3a888f","entity_name":"MercyOne","reported_date":null,"state":"IA","individuals_affected":300000,"source_type":"state_ag","severity_score":85,"summary":"A ransomware attack encrypted systems and may have exfiltrated patient data."},{"id":"7d41b76b-19bc-4088-b3f1-59d7316e99fb","entity_name":"Arkansas Orthopaedic Associates, PA","reported_date":null,"state":"AR","individuals_affected":18274,"source_type":"state_ag","severity_score":70,"summary":"Arkansas Orthopaedic Associates, PA reported a data breach impacting protected health information. The incident was discovered on November 25, 2025."},{"id":"9f484850-c05b-412b-be5b-ae1f1f1e2ef1","entity_name":"Banner Health","reported_date":null,"state":"AZ","individuals_affected":3700000,"source_type":"state_ag","severity_score":95,"summary":"Cyberattack affecting patient and health plan member information."},{"id":"71fb5810-dfa6-449a-ac1b-fa4cceefab23","entity_name":"Sunflower Medical Group","reported_date":null,"state":"KS","individuals_affected":30000,"source_type":"state_ag","severity_score":70,"summary":"A third-party vendor data breach impacted patient information managed by Sunflower Medical Group."},{"id":"6894847a-179d-479a-ab6a-bec66d6b147f","entity_name":"SomnoSleep Consultants, LLC","reported_date":"2025-12-25","state":"VA","individuals_affected":913,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"931d9ffc-5281-48c1-852a-7217d997d87e","entity_name":"Davies, McFarland & Carroll LLC","reported_date":"2025-12-25","state":"PA","individuals_affected":54712,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"1260831a-d4ff-4b8f-80e7-7d9583ade3d7","entity_name":"VITAS Hospice Services, LLC","reported_date":"2025-12-25","state":"FL","individuals_affected":319177,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"8855b7cc-2631-41d0-9d46-443f9c2e7318","entity_name":"Rhode Island Medical Imaging","reported_date":null,"state":"RI","individuals_affected":4000,"source_type":"state_ag","severity_score":50,"summary":"Rhode Island Medical Imaging reported a breach of imaging records."},{"id":"b5d968de-16cf-4389-a718-169762b07c7f","entity_name":"Marin Cancer Care","reported_date":null,"state":"CA","individuals_affected":-1,"source_type":"state_ag","severity_score":30,"summary":"Unknown specific details about the breach, but it affected 'healthcare' entities. Further details would require investigating the provided URL to the data breach report."},{"id":"d4ebd9af-bfa5-42e9-b9a4-cd48a9a73cd9","entity_name":"Med Atlantic, Inc.","reported_date":"2026-01-26","state":"VA","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"cb186c62-70e4-40c5-815f-c3f7c507ef2a","entity_name":"Nura PLLC","reported_date":"2025-12-29","state":"MN","individuals_affected":5207,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"92210f1d-1397-4c90-b3e0-a61aff7a0984","entity_name":"Marquis Companies","reported_date":null,"state":"OR","individuals_affected":801,"source_type":"state_ag","severity_score":30,"summary":"Breach notification from Marquis Companies."},{"id":"7fba140e-ad5f-4dbc-b3f3-248029cc2284","entity_name":"Delta Dental of Virginia","reported_date":"2025-12-25","state":"VA","individuals_affected":126953,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"9c0f2da5-905f-489f-b611-7c846fa12c3b","entity_name":"IU Health","reported_date":null,"state":"IN","individuals_affected":800000,"source_type":"state_ag","severity_score":95,"summary":"IU Health notified patients of a data breach where an unauthorized third party gained access to an IU Health vendor’s IT systems. The breach involved patient names, dates of birth, medical record numbers, and clinical information, including diagnoses and treatment information."},{"id":"848402fc-9828-4f99-ad81-c9247f6e76b1","entity_name":"Medi-Cal Dental Program","reported_date":null,"state":"CA","individuals_affected":787000,"source_type":"state_ag","severity_score":95,"summary":"The Medi-Cal Dental Program experienced a data breach where an unauthorized party gained access to protected health information. The breach occurred due to a misconfigured server.  The data exposed includes names, addresses, Social Security numbers, and health information."},{"id":"e2d42097-4cc9-42b5-b9b4-edf69b2ccf07","entity_name":"AgeRight Clinical Services","reported_date":null,"state":"OR","individuals_affected":4897,"source_type":"state_ag","severity_score":50,"summary":"Breach notification from AgeRight Clinical Services."},{"id":"294185a1-2ad2-47e0-87fd-1fe7d144137f","entity_name":"NS Support, LLC","reported_date":"2025-12-25","state":"ID","individuals_affected":92845,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"e713617a-bc97-4d98-b470-f06fc305130b","entity_name":"Millcreek Pediatrics","reported_date":"2025-12-25","state":"DE","individuals_affected":14095,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"e2f350d9-2f11-4e0b-9cf7-3d1f050b0272","entity_name":"Medi-Cal Health Plan","reported_date":null,"state":"AR","individuals_affected":150000,"source_type":"state_ag","severity_score":85,"summary":"Unauthorized access to Medi-Cal Health Plan's server resulted in the exposure of patient information."},{"id":"3ee37845-09cd-4df2-94be-10b87f92f044","entity_name":"Dr. Michael Kaplan DO PC DBA Long Island Weight Loss Institute","reported_date":"2026-02-06","state":"NY","individuals_affected":3426,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"01003029-e0bd-4e79-a360-7304346180fc","entity_name":"Anthem, Inc.","reported_date":null,"state":"CA","individuals_affected":78800000,"source_type":"state_ag","severity_score":95,"summary":"A cybersecurity incident exposed the personal information of millions of individuals, including names, dates of birth, Social Security numbers, and medical IDs."},{"id":"537dba9b-b84b-46fa-8136-e115911a7e2e","entity_name":"Fieldtex Products, Inc.","reported_date":"2025-12-25","state":"NY","individuals_affected":238615,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"9f760e52-b47b-4f33-b125-31382ebc3659","entity_name":"MediRecords Online","reported_date":null,"state":null,"individuals_affected":3000000,"source_type":"ftc_breach","severity_score":95,"summary":"The FTC has settled with MediRecords Online, an electronic health records (EHR) platform, for violating the Health Breach Notification Rule by failing to notify affected individuals and the FTC in a timely manner following a ransomware attack that compromised the medical records of 3 million patients. The company also failed to implement reasonable security measures despite handling highly sensitive medical data. The breach exposed full patient medical histories, billing information, and contact details. Under the settlement, MediRecords Online will pay a $4.5 million penalty, implement a robust information security program, and provide free credit monitoring and identity theft protection services to all affected individuals. They are also subject to 20 years of independent security audits."},{"id":"664fc2ea-8e9f-4539-8472-2f71583cc82c","entity_name":"Michigan Health & Wellness","reported_date":null,"state":"MI","individuals_affected":5000,"source_type":"state_ag","severity_score":50,"summary":"Insider threat event involving unauthorized access and exfiltration of patient data by a former employee."},{"id":"3b093797-77f2-4bd5-87f6-1ac68262eb4e","entity_name":"Medical University of South Carolina (MUSC)","reported_date":null,"state":"SC","individuals_affected":250000,"source_type":"state_ag","severity_score":85,"summary":"MUSC Health notified approximately 250,000 individuals about a data breach stemming from a phishing incident that compromised employee email accounts. The breach led to unauthorized access to patient names, dates of birth, medical record numbers, and limited clinical information."},{"id":"d9cf8737-7ee5-4401-ba89-e709f9825fee","entity_name":"Care New England Health System","reported_date":null,"state":"ND","individuals_affected":204346,"source_type":"state_ag","severity_score":85,"summary":"Unauthorized access to an employee's email account resulted in exposure of patient information."},{"id":"56752d98-b794-4bcc-afbe-17c50aab2a5e","entity_name":"SoonerCare Health","reported_date":null,"state":"OK","individuals_affected":25000,"source_type":"state_ag","severity_score":70,"summary":"Phishing attack led to unauthorized access of employee email accounts containing patient information."},{"id":"f6c92287-b205-40e4-bbb0-e4d807f6e39e","entity_name":"Pine Tree Medical Group","reported_date":null,"state":"ME","individuals_affected":2500,"source_type":"state_ag","severity_score":50,"summary":"A ransomware attack affected Pine Tree Medical Group, leading to data exposure."},{"id":"95d9562b-d1c2-4bcb-827b-08ddf932a5b1","entity_name":"Maine Medical Center","reported_date":null,"state":"ME","individuals_affected":7500,"source_type":"state_ag","severity_score":50,"summary":"Phishing incident leading to unauthorized access of employee email accounts."},{"id":"1e026bb4-1390-4034-93c7-4dd077490d3e","entity_name":"On-Site Dental","reported_date":null,"state":"ND","individuals_affected":218526,"source_type":"state_ag","severity_score":85,"summary":"Unauthorized access to IT systems between June 1 and June 5, 2025."},{"id":"4323e00f-5552-463a-aad6-118dea8c856e","entity_name":"Dentrust Dental Services","reported_date":null,"state":"IN","individuals_affected":80000,"source_type":"state_ag","severity_score":70,"summary":"Dentrust Dental Services experienced a security incident where patient data, including names, dates of birth, social security numbers, and health information, was exposed."},{"id":"3605d768-eba6-4b4f-a821-5a7d0cee299e","entity_name":"Texas Health Plan","reported_date":null,"state":"TX","individuals_affected":100000,"source_type":"state_ag","severity_score":70,"summary":"Third-party vendor data breach exposed member information stored on their systems."},{"id":"cc28cb9a-7b34-46b7-b2e1-932c8679f5c8","entity_name":"Kentucky Health System","reported_date":null,"state":"KY","individuals_affected":50000,"source_type":"state_ag","severity_score":70,"summary":"A vendor security incident at Kentucky Health System's third-party billing provider resulted in the exposure of patient billing information."},{"id":"d717c96f-fcc2-4b72-a44e-860861adff7c","entity_name":"Pinnacle Dental Group","reported_date":null,"state":"MI","individuals_affected":8000,"source_type":"state_ag","severity_score":50,"summary":"Pinnacle Dental Group experienced an unauthorized access to their server, compromising patient dental records."},{"id":"0284e41f-68a6-493a-b087-a5b9ce75d352","entity_name":"Premera Blue Cross","reported_date":null,"state":"WA","individuals_affected":11000000,"source_type":"state_ag","severity_score":95,"summary":"Cyberattack exposing personal and medical information."},{"id":"5aab2493-fc2e-4857-bc8f-a9964044ec4c","entity_name":"Kaiser Foundation Health Plan, Inc.","reported_date":null,"state":"CA","individuals_affected":13400000,"source_type":"state_ag","severity_score":95,"summary":"Kaiser Foundation Health Plan, Inc. reported a data breach impacting over 13 million individuals due to an error in their online services. The breach involved the unintentional sharing of user data with third-party advertisers like Google and Microsoft."},{"id":"af06bcc7-ec67-4b90-ad8b-8f8d1078d4a1","entity_name":"Medi-Science Laboratories","reported_date":null,"state":"IL","individuals_affected":25000,"source_type":"state_ag","severity_score":70,"summary":"Unauthorized access to Medi-Science Laboratories' systems led to the exposure of patient information."},{"id":"6348a959-9117-40ae-a73d-87cdd26d8e30","entity_name":"Community Health Network","reported_date":null,"state":"IN","individuals_affected":125000,"source_type":"state_ag","severity_score":85,"summary":"Third-party vendor Blackbaud experienced a ransomware attack, exposing personal information including names, addresses, dates of birth, phone numbers, email addresses, and medical information such as providers and dates of service. No financial or highly sensitive medical information was exposed."},{"id":"4b4e93d7-04dd-4397-aa49-672991155510","entity_name":"Genomix Inc.","reported_date":null,"state":null,"individuals_affected":100000,"source_type":"ftc_breach","severity_score":70,"summary":"Genomix Inc., a genetic testing company, was fined by the FTC for deceptive practices related to the handling of genetic data. The company claimed to anonymize genetic information but was found to be sharing identifiable data with research partners without consent. The settlement includes a significant penalty and ongoing privacy audits."},{"id":"f599105a-af0f-4788-87de-d799d03e795f","entity_name":"Washington State Health Care Authority","reported_date":null,"state":"WA","individuals_affected":900000,"source_type":"state_ag","severity_score":95,"summary":"Third-party vendor data breach impacting client information."},{"id":"00200963-9917-40aa-b8b8-f5009d37f10b","entity_name":"CVS Health","reported_date":null,"state":"NJ","individuals_affected":80000,"source_type":"state_ag","severity_score":70,"summary":"A third-party vendor incident resulted in the compromise of customer data."},{"id":"be1dd1e6-9670-4db9-a024-8a0159602c71","entity_name":"Wellpoint, Inc.","reported_date":null,"state":"TX","individuals_affected":77000,"source_type":"state_ag","severity_score":70,"summary":"Wellpoint, Inc. reported a data breach resulting from unauthorized access to their network, which may have compromised sensitive personal and health information."},{"id":"2ffc33f5-d41e-466f-bb23-a19d0fe60d75","entity_name":"Concentra Health Services","reported_date":null,"state":"TX","individuals_affected":399865,"source_type":"state_ag","severity_score":85,"summary":"Concentra Health Services reported a data breach impacting patient and employee information."},{"id":"35e3558e-56f1-4393-a7d7-2ae510b5daa1","entity_name":"Dental Practice C","reported_date":null,"state":"WI","individuals_affected":5000,"source_type":"state_ag","severity_score":50,"summary":"Ransomware attack encrypted patient billing and appointment data."},{"id":"f0faefcb-6895-4e56-b2ea-0781abfbb475","entity_name":"NAHGA Claim Services","reported_date":"2026-01-23","state":"ME","individuals_affected":26906,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"0c8832e2-8b74-484f-a75a-b94fe86f72da","entity_name":"Anchorage Neighborhood Health Center","reported_date":null,"state":"OR","individuals_affected":70555,"source_type":"state_ag","severity_score":70,"summary":"Breach notification from Anchorage Neighborhood Health Center."},{"id":"1168fab3-d880-42c1-ba2c-06bae3e05825","entity_name":"Centene Corporation (Managed Health Services)","reported_date":null,"state":"IN","individuals_affected":110000,"source_type":"state_ag","severity_score":85,"summary":"A misconfigured cloud storage server exposed the protected health information of MHS members, including names, dates of birth, addresses, phone numbers, and health identification numbers. No Social Security Numbers, financial information, or clinical information were exposed."},{"id":"d4a32f39-cf62-4ab0-8d75-996720517f68","entity_name":"Dental Associates, Ltd.","reported_date":null,"state":"WI","individuals_affected":472534,"source_type":"state_ag","severity_score":85,"summary":"Dental Associates, Ltd. experienced a data breach due to a cyberattack."},{"id":"4e19f136-e4b0-44de-b462-f3f6e4c0295f","entity_name":"Personic Management Company LLC","reported_date":"2025-12-25","state":"VA","individuals_affected":10929,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"edb23f25-6f5d-4d60-b972-f4cc61ca15e8","entity_name":"Anchorage Neighborhood Health Center","reported_date":"2026-01-15","state":"AK","individuals_affected":70555,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"9657bcc4-aa17-456a-8ce8-041f5ba69068","entity_name":"County of Catawba","reported_date":"2026-01-09","state":"NC","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"15c576fb-b32a-4080-9290-0ecfbf443391","entity_name":"Marrs Ear, Nose & Throat, PA","reported_date":"2026-02-05","state":"FL","individuals_affected":6376,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"b9075a68-b917-4581-b93c-3693f72681f8","entity_name":"Fortinet FortiWeb - Fortinet FortiWeb OS Command Injection Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Fortinet FortiWeb contains an OS command Injection vulnerability that may allow an authenticated attacker to execute unauthorized code on the underlying system via crafted HTTP requests or CLI commands."},{"id":"daa9b24c-4371-4b8f-a49c-56ab6d98d40d","entity_name":"Ohio Valley Medical Center","reported_date":null,"state":"OH","individuals_affected":75000,"source_type":"state_ag","severity_score":70,"summary":"Unauthorized access to electronic health records system through a compromised vendor account."},{"id":"39564c1b-1338-4567-9472-26a99f7e18ae","entity_name":"New York Presbyterian","reported_date":null,"state":"NY","individuals_affected":15000,"source_type":"state_ag","severity_score":70,"summary":"New York Presbyterian disclosed a data breach impacting medical records."},{"id":"09250bc4-4038-459b-8311-389e4e183f92","entity_name":"Indiana Health Group","reported_date":null,"state":"IN","individuals_affected":39598,"source_type":"state_ag","severity_score":70,"summary":"An unauthorized third party gained access to Indiana Health Group's systems, potentially exposing patient information."},{"id":"d1964b62-abf4-43a8-bd6e-590c4c05f832","entity_name":"Hendricks Regional Health","reported_date":null,"state":"IN","individuals_affected":13912,"source_type":"state_ag","severity_score":70,"summary":"A ransomware attack on a third-party vendor exposed patient information including names, dates of birth, and medical information."},{"id":"9ccb9ce7-af1f-46d0-ba82-5e7309664aa1","entity_name":"K Health (HK) Limited","reported_date":null,"state":"CA","individuals_affected":4000000,"source_type":"state_ag","severity_score":95,"summary":"Online health platform K Health (HK) Limited experienced a data breach exposing personal and medical information. The breach originated from a misconfigured server."},{"id":"0ef5b4a2-515c-4b9d-8472-0c1ab7128231","entity_name":"Health System A","reported_date":null,"state":"IL","individuals_affected":150000,"source_type":"state_ag","severity_score":85,"summary":"Unauthorized access to electronic medical records due to a phishing attack."},{"id":"766da61b-076a-4679-87c9-da75fd5b2a01","entity_name":"Community Health Systems (CHS)","reported_date":null,"state":"TN","individuals_affected":4500000,"source_type":"state_ag","severity_score":95,"summary":"Malware attack exposing patient data."},{"id":"6139aab4-39cb-4ee3-b2d2-a96b8e3f054f","entity_name":"Advocate Aurora Health","reported_date":null,"state":"FL","individuals_affected":3000000,"source_type":"state_ag","severity_score":95,"summary":"Advocate Aurora Health, a large integrated health system, reported a data breach impacting over 3 million individuals. The breach was due to the unauthorized disclosure of patient information through the use of tracking technologies (pixels) on its websites for marketing purposes. This included personal information and protected health information (PHI) such as names, IP addresses, medical record numbers, and information about health conditions, treatments, and appointments."},{"id":"ee6eebce-f7ab-47b8-862b-cf9b83b9d8c3","entity_name":"Oklahoma Health Care Authority","reported_date":null,"state":"OK","individuals_affected":100000,"source_type":"state_ag","severity_score":70,"summary":"The Oklahoma Health Care Authority confirmed a data breach affecting individuals enrolled in the SoonerCare program. The breach involved unauthorized disclosure of personal health details."},{"id":"ce5707ef-8a1d-4987-acdd-30ab91d10d59","entity_name":"Show-Me Health Insurers","reported_date":null,"state":"MO","individuals_affected":90000,"source_type":"state_ag","severity_score":70,"summary":"Systems compromise at Show-Me Health Insurers led to the exposure of insurance claims data."},{"id":"08b4c806-ab4b-4dcf-8e0c-b455dd6dca05","entity_name":"Southeast Health","reported_date":null,"state":"AL","individuals_affected":250000,"source_type":"state_ag","severity_score":85,"summary":"Southeast Health experienced a data breach where an unauthorized third party gained access to certain systems, potentially compromising patient information."},{"id":"9959d3b2-fd82-4f38-a40b-cf659ae0c598","entity_name":"New Hope Health","reported_date":null,"state":"CA","individuals_affected":75000,"source_type":"state_ag","severity_score":70,"summary":"Unauthorized access to patient data due to a misconfigured server."},{"id":"960ac7f1-0efc-4775-a6b6-2d94cb9215e4","entity_name":"Anthem, Inc.","reported_date":null,"state":"IN","individuals_affected":78800000,"source_type":"state_ag","severity_score":95,"summary":"Cyberattack on third-party vendor exposing personal information."},{"id":"a316cb46-a33c-45c8-b5c3-42e7692ff1fc","entity_name":"Arkansas Health System","reported_date":null,"state":"AR","individuals_affected":15000,"source_type":"state_ag","severity_score":70,"summary":"Phishing attack led to unauthorized access of employee email accounts containing patient information."},{"id":"200040d1-6da2-47ae-b56d-00e4fde5b661","entity_name":"Medi-Source Inc.","reported_date":null,"state":"OH","individuals_affected":32000,"source_type":"state_ag","severity_score":70,"summary":"Medi-Source Inc. experienced a cyberattack impacting patient information."},{"id":"486db45d-a98f-4f80-8787-a75fdc7e0503","entity_name":"Medi-Cal Managed Care Plans (various)","reported_date":null,"state":"CA","individuals_affected":3200000,"source_type":"state_ag","severity_score":95,"summary":"Third-party vendor data breach impacting multiple Medi-Cal Managed Care Plans."},{"id":"654cf601-9183-4f88-bfa7-b73ed5bf9dcc","entity_name":"Anthem PPO","reported_date":null,"state":"IN","individuals_affected":78800000,"source_type":"state_ag","severity_score":95,"summary":"Information about the Anthem PPO breach is available on the Attorney General website."},{"id":"6302086f-ad1a-489a-b2b6-341f58a0160c","entity_name":"Personalized Oncology Care","reported_date":null,"state":"WI","individuals_affected":75000,"source_type":"state_ag","severity_score":70,"summary":"Personalized Oncology Care notified patients on November 15, 2025, about a data breach stemming from a ransomware attack. This incident disrupted operations and compromised sensitive patient data."},{"id":"e0516823-abf5-4114-83ed-01f5495c1c87","entity_name":"Anthem, Inc.","reported_date":null,"state":"IN","individuals_affected":80000000,"source_type":"state_ag","severity_score":95,"summary":"Cyberattack compromised personal information of members and employees.  Information includes names, dates of birth, Social Security numbers, medical IDs, street addresses, email addresses, and employment information."},{"id":"873cea73-91ac-4d0a-b247-413610703354","entity_name":"St. John’s Riverside Hospital","reported_date":"2025-12-29","state":"NY","individuals_affected":2238,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"a8a987c6-dcba-4147-8c8a-e90bc3a0364e","entity_name":"Fortinet FortiWeb - Fortinet FortiWeb Path Traversal Vulnerability","reported_date":null,"state":null,"individuals_affected":null,"source_type":"cisa_advisory","severity_score":60,"summary":"Fortinet FortiWeb contains a relative path traversal vulnerability that may allow an unauthenticated attacker to execute administrative commands on the system via crafted HTTP or HTTPS requests."},{"id":"d308acba-bdf6-4bb1-b3cb-310f2895f0d5","entity_name":"Optum Financial Services","reported_date":"2025-12-25","state":"MN","individuals_affected":2124,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"ee20e78d-e6e2-493f-9444-b751ccefcf34","entity_name":"Adventist HealthCare","reported_date":"2025-12-25","state":"MD","individuals_affected":1300,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"11a1f08a-7142-4fd0-b817-2f22cddee56c","entity_name":"Eskenazi Health","reported_date":null,"state":"IN","individuals_affected":58319,"source_type":"state_ag","severity_score":70,"summary":"An unauthorized third party gained access to Eskenazi Health's network, potentially exposing patient information such as names, dates of birth, medical record numbers, and clinical information."},{"id":"73cabdce-b331-4ec5-b6b7-a12ceb061be4","entity_name":"St. Vincent Medical Group","reported_date":null,"state":"IN","individuals_affected":6942,"source_type":"state_ag","severity_score":50,"summary":"Email accounts were compromised via a phishing attack, leading to the exposure of patient information including names, dates of birth, medical record numbers, and clinical information."},{"id":"5c74ab3d-a962-460c-b452-da56caa65a4e","entity_name":"Elevance Health (Anthem)","reported_date":null,"state":"IN","individuals_affected":242083,"source_type":"state_ag","severity_score":85,"summary":"Third-party vendor Blackbaud experienced a ransomware attack exposing personal information including names, addresses, dates of birth, phone numbers, email addresses, and medical information such as providers and dates of service. No financial or highly sensitive medical information was exposed."},{"id":"5e5d7f18-5b7a-4d08-97d6-f2bdaa07529f","entity_name":"Elevance Health (Anthem)","reported_date":null,"state":"IN","individuals_affected":32000000,"source_type":"state_ag","severity_score":95,"summary":"Elevance Health, formerly Anthem, experienced a data breach exposing personal data of current and former members. The exposed data included names, addresses, Social Security numbers, and medical IDs."},{"id":"5643fa3b-7a23-45bf-9c73-2f224d241062","entity_name":"Wisconsin Department of Corrections","reported_date":"2025-12-25","state":"WI","individuals_affected":1723,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"aa656e35-04a2-42b3-863d-9db8a8872644","entity_name":"West Suburban Eye Surgery Center LLC","reported_date":"2025-12-25","state":"MA","individuals_affected":500,"source_type":"hhs_breach","severity_score":30,"summary":""},{"id":"fe92afe6-769d-43a2-ae24-b6e681425d4a","entity_name":"Vermont Mental Health Services","reported_date":null,"state":"VT","individuals_affected":2500,"source_type":"state_ag","severity_score":50,"summary":"Unauthorized access to a cloud-based server storing therapy session notes."},{"id":"f8addb2e-0925-4513-991e-f4b4d1c922d2","entity_name":"Springfield Medical Center","reported_date":null,"state":"IL","individuals_affected":15000,"source_type":"state_ag","severity_score":70,"summary":"Unauthorized access to patient records due to a phishing attack."},{"id":"e17b1479-fc15-4d1e-b515-3b31f93e348a","entity_name":"MultiCare Health System","reported_date":null,"state":"WA","individuals_affected":200000,"source_type":"state_ag","severity_score":85,"summary":"MultiCare Health System reported a data breach resulting from unauthorized access to an employee's email account. The breach exposed sensitive patient information."},{"id":"26fcb8dc-a489-4624-9188-dcb87583974c","entity_name":"Morton Drug Company","reported_date":"2025-12-25","state":"WI","individuals_affected":40051,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"f9b4603f-db5c-4f36-bc70-00da341341ac","entity_name":"Excellus BlueCross BlueShield","reported_date":null,"state":"NY","individuals_affected":10000000,"source_type":"state_ag","severity_score":95,"summary":"Cyberattack exposing members' personal and financial data."},{"id":"27b478bf-6bf1-492b-9819-c349c03ec109","entity_name":"Steven J. Pearlman MD PC","reported_date":"2026-01-01","state":"NY","individuals_affected":11764,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"653f29e3-2094-4949-9da1-604bacac25fa","entity_name":"Health Plan of Nevada","reported_date":null,"state":"ND","individuals_affected":2490,"source_type":"state_ag","severity_score":50,"summary":"Mailing error resulted in personal information being visible through a transparent window on an envelope."},{"id":"d3694066-cbcd-450e-b9ed-ba93a5e48a85","entity_name":"Integrated Clinical Services d/b/a Rock Family Dental","reported_date":null,"state":"AR","individuals_affected":139151,"source_type":"state_ag","severity_score":85,"summary":"Unauthorized access to IT systems containing patient data."},{"id":"f09058a0-fa9b-45f8-a149-2665409da71b","entity_name":"Independent Living Systems, LLC","reported_date":null,"state":"FL","individuals_affected":46977,"source_type":"state_ag","severity_score":70,"summary":"Independent Living Systems, LLC, a third-party vendor, experienced a data breach exposing protected health information. The breach was due to a successful ransomware attack."},{"id":"6bde8319-6690-46d5-8717-581bc6b91de0","entity_name":"Rhode Island Hospital","reported_date":null,"state":"RI","individuals_affected":500,"source_type":"state_ag","severity_score":30,"summary":"Lost or stolen unencrypted laptop containing patient information."},{"id":"16146cba-4b54-4777-87e2-675f5d4a23dc","entity_name":"CareFirst BlueCross BlueShield","reported_date":null,"state":"MD","individuals_affected":1100000,"source_type":"state_ag","severity_score":95,"summary":"Cyberattack exposing member data."},{"id":"355bfc26-f029-46ec-8209-cff3989ededc","entity_name":"Healthcare Therapy Services, Inc.","reported_date":"2025-12-25","state":"IN","individuals_affected":15027,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"668e7268-01db-4373-a08c-60f9a281a565","entity_name":"Loving and Living Center, PC dba Awakenings Center","reported_date":"2025-12-25","state":"NC","individuals_affected":17800,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"6f077bdd-7557-400e-8f1d-d8f429e4e39e","entity_name":"Marshfield Clinic Health System","reported_date":"2025-12-25","state":"WI","individuals_affected":35952,"source_type":"hhs_breach","severity_score":70,"summary":""},{"id":"1e450422-13da-4bf3-84e9-aeee0fa9dcea","entity_name":"Pediatric Associates of Dallas, P.A.","reported_date":null,"state":"TX","individuals_affected":100913,"source_type":"state_ag","severity_score":85,"summary":"Unauthorized access to network server resulting in data exfiltration."},{"id":"8ba17029-1fdf-4319-a801-e4ec9e60881e","entity_name":"Atlantic Health System","reported_date":null,"state":"NJ","individuals_affected":25000,"source_type":"state_ag","severity_score":70,"summary":"A vendor's system was breached, affecting patient data managed by Atlantic Health System."},{"id":"7c1f11f5-f809-4f72-94c8-3328c54d8089","entity_name":"Maryland Psychiatric Associates","reported_date":null,"state":"MD","individuals_affected":3000,"source_type":"state_ag","severity_score":50,"summary":"Third-party vendor data breach impacting patient scheduling software."},{"id":"a2393d49-d214-40b7-a467-2aab63f1ab6a","entity_name":"New England Orthopedic Surgeons, P.C.","reported_date":null,"state":"ND","individuals_affected":105574,"source_type":"state_ag","severity_score":85,"summary":"Impacts current and former patients of New England Orthopedic Surgeons, P.C. due to a Royal ransomware attack on Netgain Technology, LLC affecting Netgain’s systems, including those that stored New England Orthopedic Surgeons’ patient data."},{"id":"8d4548f8-e696-4f31-911d-8318cef21e60","entity_name":"Konica Minolta Business Solutions U.S.A., Inc.","reported_date":null,"state":"ND","individuals_affected":128213,"source_type":"state_ag","severity_score":85,"summary":"Impacts current and former employees and their dependents and beneficiaries of Konica Minolta Business Solutions U.S.A., Inc. The breach was a result of unauthorized access to Konica Minolta’s network and exfiltration of certain data."},{"id":"fee01d8b-50a8-44b5-9cfe-00b9e7e92b69","entity_name":"University of Vermont Medical Center","reported_date":null,"state":"VT","individuals_affected":15000,"source_type":"state_ag","severity_score":70,"summary":"A cyberattack on a third-party vendor resulted in the exposure of patient information."},{"id":"5d999248-696b-4131-a718-7bef52d0e3d7","entity_name":"Regence BlueCross BlueShield of Oregon","reported_date":null,"state":"ND","individuals_affected":30000,"source_type":"state_ag","severity_score":70,"summary":"Third-party vendor data breach exposing protected health information."},{"id":"4cdf3e76-323b-4ac0-84c0-6eaadd0fb09d","entity_name":"Northern Light Health","reported_date":null,"state":"ND","individuals_affected":640000,"source_type":"state_ag","severity_score":95,"summary":"Third-party vendor data breach exposing protected health information."},{"id":"4a7a409f-39e7-4d48-bda4-a4b78fe09580","entity_name":"Chase Affiliated Companies","reported_date":"2025-12-25","state":"NM","individuals_affected":2165,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"ee19315e-e2e1-4872-99be-63b57239d9ff","entity_name":"Archer Health","reported_date":"2025-12-25","state":"CA","individuals_affected":4285,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"2d81bfed-7f4f-43ca-9739-d98cb124f5a1","entity_name":"Denton MHMR Center","reported_date":"2025-12-30","state":"TX","individuals_affected":108967,"source_type":"hhs_breach","severity_score":85,"summary":""},{"id":"5c964847-70e7-4e19-be3a-29b26409ca9b","entity_name":"Oklahoma Management Services","reported_date":null,"state":"ND","individuals_affected":242000,"source_type":"state_ag","severity_score":85,"summary":"Ransomware attack affecting sensitive personal information."},{"id":"d2069e5c-554b-47e9-a2d3-3fc26f9333a7","entity_name":"Southwestern Vermont Medical Center","reported_date":null,"state":"ND","individuals_affected":93000,"source_type":"state_ag","severity_score":70,"summary":"Ransomware attack affecting patient data."},{"id":"e6b46260-b430-4fd9-8607-5899f7656bcb","entity_name":"Springhill Medical Center","reported_date":null,"state":"OK","individuals_affected":105000,"source_type":"state_ag","severity_score":85,"summary":"Ransomware attack affecting electronic medical record systems."},{"id":"9e100e11-0673-4bcb-b959-d7838a358d1b","entity_name":"New England Life Care, Inc.","reported_date":null,"state":"ND","individuals_affected":16400,"source_type":"state_ag","severity_score":70,"summary":"Ransomware attack affecting patient and employee data."},{"id":"3b501c7f-7fa7-4165-a754-08f9eeefaf5b","entity_name":"South Shore Hospital","reported_date":null,"state":"MA","individuals_affected":500,"source_type":"state_ag","severity_score":30,"summary":"A former employee inappropriately accessed and disclosed patient medical records."},{"id":"f66fb22b-f461-403f-b6ee-1407333a16a0","entity_name":"Indiana University Health","reported_date":null,"state":"IN","individuals_affected":789012,"source_type":"state_ag","severity_score":95,"summary":"Unauthorized access to IT systems through a third-party vendor (Regal Medical Group) due to a phishing attack."},{"id":"d965d249-24d7-4b5b-bebd-253922112dcc","entity_name":"Health Data Vision, Inc.","reported_date":null,"state":"ND","individuals_affected":329000,"source_type":"state_ag","severity_score":85,"summary":"Ransomware attack impacting protected health information."},{"id":"8ae56b87-cc98-42c5-8e7f-ec270aae5058","entity_name":"Tampa Bay Treatment Associates","reported_date":"2026-01-15","state":"FL","individuals_affected":3682,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"f6bdfa95-74d5-48ff-93e1-0d7aea4e4e9c","entity_name":"Indiana University Health","reported_date":null,"state":"IN","individuals_affected":7378,"source_type":"state_ag","severity_score":50,"summary":"Mishandling of protected health information and personally identifiable information, including names, dates of birth, medical record numbers, and clinical information, due to an error in securing a server used for research."},{"id":"b7ba57c3-142d-45c8-aab9-f7a8c72f6f03","entity_name":"Pediatric Associates","reported_date":null,"state":"ND","individuals_affected":300000,"source_type":"state_ag","severity_score":85,"summary":"Ransomware attack impacting medical and billing records."},{"id":"c57c7214-112a-45d2-9f90-742818c9ff7e","entity_name":"MaineHealth","reported_date":null,"state":"ME","individuals_affected":20000,"source_type":"state_ag","severity_score":70,"summary":"A phishing incident compromised employee email accounts, leading to unauthorized access to patient data."},{"id":"0a25cbeb-2648-44ec-bd76-e8f8df5c24b8","entity_name":"Synergy Advanced Healthcare LLC","reported_date":"2025-12-25","state":"CT","individuals_affected":1260,"source_type":"hhs_breach","severity_score":50,"summary":""},{"id":"30d01c1e-33c7-4408-98f6-8ce08313af16","entity_name":"Elderwood Administrative Services, LLC","reported_date":null,"state":"NY","individuals_affected":427000,"source_type":"state_ag","severity_score":85,"summary":"A ransomware attack impacted Elderwood's systems, leading to the exposure of patient and employee data."},{"id":"8910c722-1976-4829-92a0-ed3f706a3781","entity_name":"MCNA Insurance Company","reported_date":null,"state":"ND","individuals_affected":8923022,"source_type":"state_ag","severity_score":95,"summary":"MCNA Insurance Company experienced a data breach where an unauthorized third party accessed its network."},{"id":"bf377452-2faa-4716-a3c2-227269945f5c","entity_name":"ConnectiCare, Inc.","reported_date":null,"state":"TX","individuals_affected":328000,"source_type":"state_ag","severity_score":85,"summary":"ConnectiCare, Inc. reported a data breach impacting the personal information of Texas residents. The breach involved unauthorized access to systems containing sensitive health data."}]}