Historical breach coverage Patient Protect has published — 1,334 articles indexed and discoverable. Ongoing editorial coverage now lives at hipaapulse.com; this archive preserves the historical record. Each article page may eventually 301-redirect to its HIPAA Pulse counterpart as that publication’s coverage matures.
Yesterday
From the U.S. Attorney's Office, District of Maryland: A Maryland man is facing federal indictment stemming from an unauthorized computer access scheme involving a Maryland medical system. Matthew Bathula, 41, of Clarksville, is charged with two counts of unauthorized access to a protected computer, and one count of aggravated identity theft while working as a... Source
Anna Tkach reports: Russian hacker Artem Revensky has admitted to orchestrating cyberattacks targeting critical infrastructure in Ukraine, the United States, and several other nations. He now faces a potential sentence of up to 27 years behind bars. Revensky was a member of the hacking group Sector16, which is allegedly linked to Russian authorities, and carried... Source
Still under development, Bluekit provides users with automated domain registration and an AI Assistant. The post New Bluekit Phishing Kit Features AI Assistant appeared first on SecurityWeek.
This Week
Caitlyn Rosen reports: A class of Michiganders asserted in a federal lawsuit filed Thursday that a Thomson Reuters search engine wrongfully published their Social Security numbers. In an 11-page lawsuit filed in the U.S. District Court for the Eastern District of Michigan, the class claims Reuters search engines publicly displayed plaintiffs’ social security numbers in... Source
There is an update regarding the 2023 Delta Dental breach involving MOVEit software. Delta Dental was one of many customers whose patient data was exposed after Clop exploited a zero-day vulnerability to attack MOVEit and acquire its clients' data. More than 7 million patients were reportedly affected by the breach, although the number specific to New... Source
South Central Regional Medical Center is a Mississippi health system that offers a wide range of medical services and specialties and strives to deliver compassionate care with superior patient outcomes.THE CHALLENGEThe health system faced the challenge of coordinating a large-scale EHR implementation across five diverse geographical and operational areas while maintaining patient care continuity.
Lewiston, Maine-based Central Maine Healthcare is laying off 38 IT employees as part of a series of new technology updates. The health system said on its website that it is transitioning to a new electronic medical record, which includes Epic's MyChart portal, expected to go live for patient scheduling on Friday.
In memoriam. Ayrton Senna, the greatest Formula One driver of all times, lost to this world on May 1, 1994 in a terrible crash at Imola. In the years following his death, some have matched or exceeded his record, but none of them could hold a candle to him. (Image credit: Getty Images)   Source
What happens when the first clinical interaction a patient has is not with their doctor, but with an artificial intelligence agent?In healthcare, it is no secret that AI is moving beyond back-end support and into the patient-facing clinical encounter. For Emirates Health Services (EHS) in the United Arab Emirates, that shift is already underway, with agentic AI engaging patients before they see their clinician, supporting care in real time.
DysruptionHub reports: Kentwood Public Schools said districtwide Wi-Fi was disrupted after a student used malicious software designed to interfere with the school system’s network. The district said outside experts helped isolate the issue, which affected Wi-Fi connectivity across its schools, and that the problems “appear” to have been resolved. Kentwood Public Schools serves students in... Source
Tyler Bridegan, Scott Hyman, Patrick Strubbe, and Sarah Wilk of Womble Bond Dickinson write: In a first of its kind, a California federal judge allowed claims against Bain Capital to proceed based on a data breach at its subsidiary, PowerSchool. Notably, many of the claims are based on conduct that occurred before Bain’s acquisition of PowerSchool. Although... Source
The stealthy Python-based backdoor framework deploys a persistent Windows implant likely designed for espionage. The post Sophisticated Deep#Door Backdoor Enables Espionage, Disruption appeared first on SecurityWeek.
Earlier today, DataBreaches was contacted on Signal by someone who saw a ransom note on Naturalsciences.org. Shortly thereafter, the site was down with a message that it was down for construction (not even "maintenance," but "construction"). The site is somewhat or partially back online as of this writing. Whether they paid the anonymous hacker(s) who... Source
The Department of Justice had a pretty good day today in terms of cybercrime. In addition to two men being sentenced for using BlackCat ransomware to try to extort U.S. entities, a German national living in Colombia has now been extradited to the United States on charges that he owned and operated “The Versus Project,”... Source
There is an update on the criminal cases against Ryan Goldberg and Kevin Martin, security professionals who turned to the dark side and cut a deal with ALPHV/BlackCat operators to use their ransomware and pay BlackCat 20% of whatever they collected in ransom. From the DOJ's press release today: Two American cybersecurity professionals were sentenced... Source
NISOS writes: Last month, our research on DPRK IT worker fraud made headlines on NBC News. Security teams, hiring managers, and executives all came back with the same reaction: this is happening, and many organizations aren’t equipped to detect it. This isn’t a traditional cyber threat. It’s a human one and it’s not going away.... Source
A new phishing kit named Bluekit offers more than 40 templates targeting popular services and includes basic AI features for generating campaign drafts. [...]
Technology has expanded the role that physician assistants, regulated by state medical boards, can play in healthcare delivery. Spurred by the Rural Health Transformation Program, more states that have been dealing with the pain of physician shortages are taking action to give PAs more autonomy in primary care practice.Proponents argue these changes would quickly increase their healthcare workforces, reduce patient wait times and fulfill promises made under the federal RHTP.
France has arrested numerous young hackers in the past decade. You'd think — or hope — that they might have developed an effective diversion program by now. Have they? That's not to imply that other countries like the U.K. and U.S. have effective diversion programs, because as far as this blogger knows, they don't have... Source
The single most critical issue facing health systems today is governing and securing artificial intelligence, which is moving quickly from passive insights to active execution within clinical and operational workflows.That's the view of Sunil Dadlani, chief information and digital transformation officer at Atlantic Health, a Morristown, New Jersey-based health system.
At the University of Toledo Health, one of the most persistent challenges was the growing documentation burden placed on clinicians.THE CHALLENGEThe electronic health record has been essential for data capture and care coordination, of course, but it has also shifted a significant portion of a clinician's time away from direct patient care and toward administrative tasks.
Flaws in OpenEMR's platform — used by more than 100,000 healthcare providers — enabled database compromise, remote code execution, and data theft.
A coalition of hospitals, healthcare organizations, healthcare providers, patient advocacy organizations and tech companies is forming under the Telehealth Voters Pledge, which advocates for permanent Medicare telehealth.The plan is to march the signed pledge to Congress in July, according to the Alliance for Connected Care, which is spearheading the effort to effect permanent telehealth policies.WHY IT MATTERS
Check Point Researchers recently dug into all three versions of VECT's ransomware. And what they found should concern anyone who discovers they have been locked by it. From their blog post: Ransomware is supposed to be reversible. The attacker locks your files, holds the key, and returns it when you pay. That’s the business model. VECT’s software... Source
CardioMEMS – an implantable wireless sensor that monitors pulmonary artery pressure in heart failure patients who have been hospitalized in the past year – was one of the most promising tools in Kettering Health's heart failure toolkit. Clinically, it was delivering. The data it collected was helping the Ohio health system's specialty care teams make better decisions about volume management.THE CHALLENGE
A coalition of hospitals, healthcare organizations, healthcare providers, patient advocacy organizations and tech companies is forming under the Telehealth Voters Pledge, which advocates for permanent Medicare telehealth.The plan is to march the signed pledge to Congress in July, according to the Alliance for Connected Care, which is spearheading the effort to effect permanent telehealth policies.WHY IT MATTERS
On April 28, Sandhills Medical Foundation in South Carolina notified the Maine Attorney General's Office of a data breach that affected a total of 169,017 people, only 8 of whom are Maine residents. Their notification to the state and those affected comes almost a year to the day since they first experienced the breach. According... Source
Michael Martin reports: Cherry Health says it is dealing with ongoing technology issues, but days into the disruption, officials have not explained what’s causing them. In a notice posted to their website, the health system said it is “experiencing technology issues across Cherry Health, including our phone system." Their clinics remain open for scheduled visits.... Source
THV11 News reports: Pine Bluff School District Superintendent Dr. Jennifer Barbaree broke her silence Monday evening after a cyberattack that cost the district millions. According to district officials, the incident happened on December 17. In a statement, and now confirmed during a board meeting, officials say a wire transfer of more than $3.2 million was... Source
Some of the vulnerabilities discovered by Aisle can be exploited to access and alter sensitive patient information. The post 38 Vulnerabilities Found in OpenEMR Medical Software appeared first on SecurityWeek.
An Indigenous approach to implementing an AI-powered productivity assistant within Hauora Māori Service could offer a blueprint for scaling generative AI across Te Whatu Ora Health New Zealand's 80,000-strong public health workforce.Hauora Māori's digital team adapted Microsoft 365 Copilot — internally dubbed BroPilot — to reflect tikanga Māori (an Indigenous practice) and support daily reporting, governance, and programme work. The tool is now being used by both Māori and non-Māori staff a
UNN reports: Moldova’s Cybersecurity Agency has reported a large-scale attack on the country’s main medical database, resulting in damage to around 30% of the information, according to Point, as reported by UNN. The agency’s deputy director said the attackers had been targeting the platform over the past month. The database is a key hub collecting data... Source
Despite the historical exclusion of behavioral health from federal IT incentives, new initiatives are utilizing artificial intelligence and standardized data exchange to bridge interoperability gaps, reduce provider burnout and foster clinical collaboration across federal and private healthcare systems.
Johns Hopkins Health System recognized an opportunity to evolve how nursing care was delivered in response to mounting clinical and operational complexity – and without compromising quality or patient experience. Evolving workforce dynamics required ongoing attention to staffing consistency at the bedside, while patient acuity, regulatory requirements and documentation demands continued to rise.THE CHALLENGE
Legitimate-looking emails coming from Robinhood systems lured recipients to phishing websites. The post Robinhood Vulnerability Exploited for Phishing Attacks appeared first on SecurityWeek.
A DataBreaches.net Editorial The "BlueLeaks 2.0" data breach may be the worst privacy and data security breach affecting students that DataBreaches has seen in 20 years of reporting on breaches affecting the education sector. If people thought the Power School incident was the worst ever, hold my coffee. Who will hold P3 Global Intel ("P3")... Source
This podcast provides a clear look at 2026 healthcare trends and explores how health systems are breaking down traditional silos to integrate finance, clinical delivery, and consumer strategy. Healthcare organizations are generating more data than ever, and AI can help turn that data into information that can drive operational improvements. Join Carrie Koslowski, General Manager of Patient Engagement at Health Catalyst, as she discusses how AI can be used to boost patient trust and loyalty while
Jason Meisner reports: The high-tech cyber hacker who goes by the online moniker “Bouquet” jetted around the world, from Dubai to Thailand to New York, staying in five-star hotels and flashing cash and jewels, federal authorities allege. As his internet attacks grew bolder and more sophisticated, he taunted the FBI for being a step behind,... Source
Federal prosecutors have been conducting a preliminary investigation since mid-February 2026 into alleged cyberattacks on Signal accounts. The post Germany Suspects Russia Is Behind Signal Phishing That Targeted Top Officials appeared first on SecurityWeek.
Lawrence Abrams reports: A Chinese national accused of carrying out cyberespionage operations for China's intelligence services has been extradited from Italy to the United States to face criminal charges. According to a DOJ announcement, Xu Zewei is alleged to be a contract hacker for China's Ministry of State Security (MSS) who conducted breaches between February... Source
Melanie Waddell reports: William Galvin, Massachusetts' top securities regulator, ordered Fidelity Brokerage Services on Monday to pay $1.25 million for failing to enforce appropriate cybersecurity controls that resulted in a data breach affecting about 77,000 customers. "After learning of the breach, Fidelity also failed to notify many impacted residents, including the relatives and minor children... Source
Canadian authorities have arrested three men for operating an "SMS blaster" device that pretends to be a cellular tower to send phishing texts to nearby phones. [...]
Healthcare interoperability is materially better than it was even three to five years ago, even if it is still far from seamless. The industry has made real structural progress. Hospitals are far more capable of sending, receiving, finding and integrating outside information than they were a decade ago. API-based patient access is now mainstream. TEFCA has moved from being a policy concept to live exchange infrastructure.
The Utah Medical Licensing Board sent a letter to the state's Department of Commerce this past week, requesting suspension of a pilot testing automation of prescription renewals. In its letter, the board says that it has a duty to ensure any technology-driven prescription refills do not compromise patient safety."We must not allow AI or other financial motivations to override this obligation, yet that is precisely what occurred here," board members said.WHY IT MATTERS
Kenneth Araullo reports: A single ransomware crew exploiting a single brand of firewall is now driving nearly half of all cyber insurance claims, At-Bay has warned, in a finding that recasts how underwriters and brokers should be thinking about risk selection. The cyber carrier's 2026 InsurSec Report, drawn from more than 6,500 claims and 100,000... Source
The tech giant found that many indirect prompt injection attempts are harmless, but some malicious exploits have also been identified. The post Malicious AI Prompt Injection Attacks Increasing, but Sophistication Still Low: Google appeared first on SecurityWeek.
Medical device giant Medtronic disclosed last week that hackers breached its network and accessed data in "certain corporate IT systems." [...]
Peninsula University Hospital, formerly Frankston Hospital, in Melbourne, has reopened with a new digital patient experience.It has implemented digital patient check-in and queuing for outpatient appointments, with the solution provided by Five Faces. HOW IT WORKS
Earlier
Oh Seok-min reports: Personal information of around 100,000 customers has been leaked from a golf course, prompting a police investigation, sources said Sunday. The Korean National Police Agency is probing the case after the website of Lee & Lee Country Club in the county of Gapyeong, about 55 kilometers northeast of Seoul, was hacked, with... Source
The Bangkok Post reports: The Council of Engineers Thailand has warned about 350,000 members their personal data was stolen when its database was hacked recently, and could be misused. Prof Amorn Pimanmas, a director in the council's board, said that about a week ago a hacker breached the database containing members’ personal data when it... Source
Microsoft will roll out passkey support for phishing-resistant passwordless authentication to Microsoft Entra‑protected resources from Windows devices starting late April. [...]
A new financially motivated hacking group tracked as BlackFile has been linked to a wave of data theft and extortion attacks against retail and hospitality organizations since February 2026. [...]
Physicians are increasingly using agentic AI tools like Claude Code to build custom clinical applications, signaling a shift toward doctor-led software development within health systems. The potential is enormous. But experts warn that while these tools empower clinicians, they necessitate new security audits and professional engineering oversight to mitigate risks and protect against AI-generated vulnerabilities.
Forgotten integrations, shadow IT, SaaS, and now shadow AI and agents are everywhere, and attackers don't need sophisticated AI models to take advantage.
Health IT innovation often is associated with startups and major health systems. But what if one of the most powerful innovation engines in American healthcare is Medicaid?
In the last six months, companies have seen a significant influx of AI-powered phishing, as cyberattackers progress from small campaigns to 1-to-1 personalized attacks.
Ilsan Paik Hospital launches cognitive therapy DTxInje University Ilsan Paik Hospital in South Korea has introduced a government-approved mobile digital therapeutic device for specialist-prescribed cognitive intervention in patients aged 55 to 85 with mild cognitive impairment.
Yesterday, the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) announced settlements with four regulated entities following separate ransomware investigations under HIPAA'S Security Rule. For those keeping count: the resolutions announced mark 19 completed investigations from ransomware breaches and 13 completed investigations in OCR’s Risk Analysis Initiative. The settlements follow... Source
It's great if a hospital or health system has all the latest, great healthcare information technology. It's even fantastic just to have a well-run electronic health records system. But none of that matters if no one is using them.Adoption is one of the major health IT issues today, said Steven Travers, vice president and CIO at Broward Health, a four-hospital health system based in Fort Lauderdale, Florida, that serves the North Broward County area. He earned a PhD in business administration.
From the so-there-they-are! dept Out of sight, out of mind? It seems like ages ago that DataBreaches last reported on the Trigona ransomware group, but it was actually in September 2023. After that, DataBreaches lost track of them, and after a few months, concluded that they had disappeared or disbanded. But a check of ransomlook.io... Source
Steve Alder reports: Tempus AI, a publicly traded healthcare artificial intelligence company, is facing multiple class action lawsuits over the alleged unauthorized collection and disclosure of genetic testing results, which were derived from genetic testing by Ambry Genetics Corporation (Ambry Genetics). Tempus AI used Ambry Genetics’ genetic database to train its AI models. Tempus AI... Source
Hyun Su-a reports: Duo Info, South Korea's top matchmaking company, leaked the personal information of 430,000 members, authorities said. The leaked items went far beyond names and email addresses to include religion, hobbies, height, weight, education and remarriage history. Excluding income and asset information, virtually all of the members' personal details were exposed externally. The... Source
DysruptionHub reports: Mile Bluff Medical Center in Mauston, Wisconsin, said Tuesday that a security event involving data encryption disrupted some phone and computer functions, prompting clinical teams to shift to downtime procedures while patient care continued. The hospital said it activated security protocols immediately after detecting the issue and began an investigation with internal experts... Source
Pierluigi Paganini reports: A leaked database from RAMP gives us a rare look behind the curtain. It shows how cybercrime works when it becomes structured, commercial, and repeatable. Instead of random hackers acting alone, RAMP functioned like a business platform where criminals could sell access, recruit affiliates, advertise ransomware, and negotiate deals in private. What... Source
Harry Taylor reports: Data from 500,000 people who volunteered their health information to the UK Biobank has been breached and offered for sale online in China. Technology Minister Ian Murray said that information of all half a million members had been listed for sale on the website Alibaba, as he called the breach an “unacceptable abuse” of data. He... Source
India's Union Ministry of Health and Family Welfare has unveiled a mobile application to support and streamline the clinical workflow of community health officers, as the government expands primary healthcare packages.The mobile app developed by the Indian Council of Medical Research (ICMR) is a clinical decision support and assistant tool for CHOs serving Sub-Centre Ayushman Arogya Mandirs (SC-AAMs). HOW IT WORKS
Just when I thought I might be done with work for the day, DataBreaches received an email from "Internet Yiff Machine" (IYM), the hacktivist responsible for hacking P3 Global Intel in what has been called the "Blue Leaks 2.0" breach. As most readers know by now, IYM provided a dataset of 8.3 million tips that... Source
Pediatric post-cardiac arrest care guidelines are well established. Real‑world practice, however, can vary, leading to missed opportunities for timely, evidence‑based care.THE CHALLENGEPhoenix Children's wanted to close this gap by aligning bedside practice with the established guidelines.
Not nearly as polite as the name suggests, the ransomware gang has impressed researchers with its speed in scaling up operations — and its sophistication.
Troutman Pepper Locke writes: In Part One of this series, we discussed how wellness products sit at the intersection of Food and Drug Administration (FDA), Health Insurance Portability and Accountability Act (HIPAA), Federal Trade Commission (FTC), and state privacy/breach laws. In Part Two, we analyzed FDA’s 2026 General Wellness guidance and what it means for device-level cybersecurity expectations.... Source
Atropos Health's Alexandria Real World Evidence library, which now contains 33 million pieces of precision evidence-based findings, will soon be available to about one third of U.S. physicians and about half of health systems through a growing network of clinical workflow partners, the company said this week.
Overview and Background This is the first of what will likely be several updates to this site's exclusive reporting on the "BlueLeaks 2.0" incident that exposed anonymous and sensitive tips by and about students on a platform that promised them anonymity and security. DDoSecrets.org named the incident "Blue Leaks 2.0" because, like a previous leak... Source
Pediatric post-cardiac arrest care guidelines are well established. Real‑world practice, however, can vary, leading to missed opportunities for timely, evidence‑based care.THE CHALLENGEPhoenix Children's wanted to close this gap by aligning bedside practice with the established guidelines.
The Office of the National Coordinator for Health Information Technology, using Substance Abuse and Mental Health Services Administration data, recently examined the use of health IT in behavioral health settings.The results showed that the use of electronic health records for various clinical and administrative tasks varied widely among facilities, despite the growing demand for substance use and mental health treatment services. Further, the use of EHRs for exchanging health data also lag
The pharmacy at Texas Children's Hospital faced a fundamental lack of accurate, real-time inventory visibility across the enterprise. Leaders and clinicians had no reliable way to answer a simple question, "What do we have on hand right now?"THE CHALLENGE
A 24-year-old British national and senior member of the cybercrime group "Scattered Spider" has pleaded guilty to wire fraud conspiracy and aggravated identity theft. Tyler Robert Buchanan admitted his role in a series of text-message phishing attacks in the summer of 2022 that allowed the group to hack into at least a dozen major technology companies and steal tens of millions of dollars worth of cryptocurrency from investors.
Phil Muncaster reports: Next.js developer Vercel has confirmed a cyber-incident conducted by a “highly sophisticated” attacker which may have resulted in threat actors getting hold of sensitive internal data. The US firm, which provides developer tools and cloud infrastructure, said in an updated April 21 notice that the unauthorized access originated from an employee’s use... Source
Ann-Marie Corvin reports: Cheap tech just keeps on exposing NATO warships. In the latest example, a journalist was able to send a Bluetooth tracker to a Dutch frigate. Just Vervaart, working for regional broadcaster Omroep Gelderland, hid the $5 Bluetooth tracker inside an envelope with a postcard via the military postal service. The reporter followed... Source
And then there were three.... A third man has pleaded guilty to conspiring with two other cybersecurity professionals and BlackCat to use BlackCat's ransomware and negotiation platform to target U.S. firms. Ryan Goldberg of Georgia and Kevin Martin of Texas pleaded guilty in December, and are scheduled to be sentenced on April 30. Two of... Source
Data breaches were disclosed by Southern Illinois Dermatology, Saint Anthony Hospital, and North Texas Behavioral Health Authority. The post Data Breaches at Healthcare Organizations in Illinois and Texas Affect 600,000 appeared first on SecurityWeek.
Forescout researchers discovered 20 new vulnerabilities in Lantronix and Silex products and described theoretical attack scenarios. The post Serial-to-IP Converter Flaws Expose OT and Healthcare Systems to Hacking appeared first on SecurityWeek.
Traditional Medicare denials are harming patient care in the six states where the U.S. Centers for Medicare and Medicaid Services mandated the use of the Wasteful and Inappropriate Service Reduction (WISeR) model this year, says Rep. Suzan DelBene, D-Washington."Under your leadership, CMS recently added new layers of red tape that Medicare patients need to navigate to get the care that they are entitled to," DelBene told Health and Human Services Secretary Robert F. Kennedy, Jr. during a hearing
Alberto Payo reports: A cybersecurity company based in Mexico, BePrime, was reportedly the victim of a cyberattack that allegedly resulted in the leak of 12.6 GB of data and access to network infrastructure and video surveillance, according to information published by the supposed attacker on a cybercrime forum. The company, which provides connectivity and security services to large corporations... Source
Dysruption Hub reports: Minidoka Memorial Hospital in Rupert, Idaho, said a cyber incident on Easter morning, April 5, limited imaging services and led to some emergency patient transfers, though the hospital and its clinics continued treating patients. In an April 17 social media update, the hospital said the incident temporarily affected certain internal systems and had... Source
A pro-Iran hacker group has taken credit for the attack on Bluesky, which appears to have lasted 24 hours. The post Bluesky Disrupted by Sophisticated DDoS Attack appeared first on SecurityWeek.
Apple account change notifications are being abused to send fake iPhone purchase phishing scams within legitimate emails sent from Apple's servers, increasing legitimacy and potentially allowing them to bypass spam filters. [...]
Long-term follow-ups are important, and DataBreaches is glad that Alexander Martin points out that at least one NHS Trust is still impacted by the Qilin ransomware attack on Synnovis in 2024. From his reporting: At South London and Maudsley NHS Foundation Trust (SLaM), pathology systems have not been restored as of publication, with the trust... Source
There's an update to a lawsuit involving Blue Cross Blue Shield of Montana's parent company, HCSC, and Montana's state auditor. As previously reported, after BCBSMT notified the state of the Conduent breach that had affected 462,000 members, the state auditor opened an investigation into whether the notification to the state was timely. HCSC claimed the... Source
Jason Henry reports: The Los Angeles County Office of Education is investigating the possibility that bad actors gained access to the electronic tax documents of teachers and administrators after employees at schools around the county received letters indicating fraudulent tax filings had been submitted in their names. The Southern California News Group confirmed that employees... Source
Daryna Antoniuk reports: Hackers have targeted Ukrainian hospitals and local government bodies in a new espionage campaign using a malware tool dubbed AgingFly, researchers say. Ukraine’s computer emergency response team (CERT-UA) said the activity was carried out by a group tracked as UAC-0247, which launched multiple attacks over the past two months against municipal authorities, clinical hospitals... Source
Threat actors are reusing Tycoon 2FA tools across other phishing kits following the platform’s disruption. The post Tycoon 2FA Loses Phishing Kit Crown Amid Surge in Attacks appeared first on SecurityWeek.
On November 20, 2024, the government unsealed charges against five defendants associated with Scattered Spider, One of them, Noah Michael Urban pleaded guilty in a Florida courtroom in April 2025. On August 20, 2025, "King Bob," as he was often known, was sentenced to ten years in prison and $13 million in restitution. A second man, Tyler Robert... Source
In embracing device code phishing, attackers trick victims into handing over account access by using a service's legitimate new-device login flow.
Ian Duncan and Cat Zakrzewski report: Anthropic chief executive Dario Amodei is set to meet White House Chief of Staff Susie Wiles on Friday, according to a person briefed on the plan, as the federal government races to understand the national security implications of a powerful new artificial intelligence model the company says it has... Source
With nearly 100,000 Americans on the kidney transplant waitlist, the 2026 KidneyX Empower Prize Challenge from the U.S. Department of Health & Human Services seeks to nurture the development of patient-centered innovations that improve care coordination and nephrological disease and transplantation research.HHS said KidneyX's goals include reducing the long-term fiscal burden on Medicare by prioritizing transplants over chronic dialysis and improving data interoperability to enhance kidney t
University Medical Center of El Paso is the only Level 1 trauma center within a 270-mile radius and the region's only Level 1 stroke center and Joint Commission-certified comprehensive stroke center.THE CHALLENGEUMC El Paso launched a length of stay improvement initiative in March 2023 and continued to build on that foundation into 2025 with additional operational and care delivery improvements. These efforts followed a baseline review conducted from October 2022 through February 2023. 
ANCHORAGE, Alaska – The U.S. Justice Department today announced court-authorized actions taken to disrupt some of the world’s leading Distributed Denial of Service (DDoS) Internet of Things (IoT) botnet services. U.S. authorities continue to focus resources on charging DDoS botnet administrators and seizing infrastructure, like websites, that allow paying users to launch powerful DDoS attacks.... Source
Alexander Martin reports: A 16-year-old boy has been arrested in Northern Ireland after a cyberattack disrupted access to educational systems used by potentially hundreds of thousands of students. The boy, who has not been named for legal reasons, was arrested Wednesday in Portadown, County Armagh, on suspicion of offenses under the Computer Misuse Act. The... Source
Barry O'Connor provides an update on the C2K breach in Northern Ireland: The IT systems in schools targeted in a cyber attack last week have been "largely restored" the Education Authority (EA) has said. All online and IT systems in schools are provided through the C2K network, managed by the EA. The attack left all schools... Source
DataBreaches missed this one, but The Daily Hodl didn't. They reported on March 31: A US state tax agency has placed taxpayers’ personal info at risk by missing an extended data breach that lasted 18 months. The Oklahoma Tax Commission (OTC) says the breach happened between July 2024 and December 2025, per a new filing with the... Source
Siobhan Harms reports: The Ohio Auditor of State’s Office will begin evaluating school districts’ cybersecurity policies in July. As outlined by House Bill 96, districts had to implement a cybersecurity program that safeguards the district’s data, information technology and information technology resources to ensure availability, confidentiality and integrity. The law reads, “The program shall be... Source
A new report by Reliaquest considers data suggesting that former Black Basta affiliates are not only using the gang's social engineering playbook, but have been successfully honing it and targeting corporate executives: A new campaign is successfully evolving “Black Basta’s” signature social engineering playbook into a faster, more targeted, and increasingly automated intrusion method aimed at senior... Source
CPI reports: Connecticut Attorney General William Tong has issued a sweeping advisory clarifying that businesses deploying artificial intelligence systems remain fully subject to the state’s existing legal framework—even in the absence of a comprehensive, AI-specific statute. The guidance, as analyzed by Squire Patton Boggs, underscores a central message for compliance officers and in-house counsel: AI does... Source
Émile Marzolf, Ellen O'Regan, and Eliza Gkritsi report: The European Union’s unveiling of a mobile app to check people’s age online has quickly turned sour, as cybersecurity experts found glaring privacy and security problems with the code. European Commission President Ursula von der Leyen presented the age-verification tool in Brussels on Wednesday, saying it was... Source
There's a thought-provoking article on CyberScoop by Mary Catherine Sullivan and Brett Callow of FTI. They provide examples of three types of incidents in which AI has created or contributed to fake narratives that can trigger a crisis response, require allocating significant resources, damage reputation, or give journalists a professional black eye: A company wakes... Source
Cyberattacks are evolving faster than many MSP and corporate defenses can keep up, with phishing driving much of today's cybercrime. Join our upcoming webinar to learn how to combine security and recovery strategies to reduce risk and maintain business continuity. [...]
When evaluating digital maturity, healthcare organisations generally fall into one of three groups: those with inaccurate self-assessments, those lacking clear visibility into their current performance and, most commonly, those unsure of where to begin.
In Deloitte’s 2026 U.S. Health Care Outlook report, the global professional services firm emphasized the importance of healthcare organizations empowering consumer health through digital experiences and scaling artificial intelligence (AI) to modernize operations.1 Yet many providers struggle as they seek to achieve such goals because they must deal with a fragmented data ecosystem, said Sam Lambson, Vice President, Data and Ecosystem for athenahealth.
23-year-old Kamerin Stokes of Memphis, Tennessee, was sentenced to 30 months in prison for selling access to tens of thousands of hacked DraftKings accounts. [...]
Following a global partnership, Singapore's National University Health System is set to expand 5G connectivity across the cluster to hasten its development of extended reality, robotics, and other emerging technologies.In late February, the healthcare cluster signed a strategic agreement with GSMA Foundry, the collaboration hub of the global mobile communications advocacy organisation GSMA, for 5G integration. Based on a media release, this involves integrating 5G private networks with digi
A virtual hospital concept developed at China's Tsinghua University has entered early clinical deployment, with eight hospitals now testing an AI-assisted consultation service for outpatients.
Sapphire Sleet uses fake job offers and phony Zoom updates to deliver ClickFix attacks that steal credentials and sensitive data from Macs.
Not everyone complies with the conditions of pre-sentencing release. After pleading guilty to a credential stuffing attack, this defendant reopened his online criminal shop and advertised what he was doing. Unsurprisingly, he was re-arrested and remanded into federal custody. Although the DOJ announcement does not name the betting site, it was reported in news as... Source
Laura Pippig reports: A security vulnerability was recently discovered in Microsoft Defender, the first-party Windows 11 antivirus tool used by millions. Attackers can exploit this vulnerability to gain elevated system privileges and cause significant damage without users noticing. The so-called “RedSun” vulnerability was discovered by security researcher Chaotic Eclipse, the same one who previously published a... Source
Kenna Hughes-Castleberry reports: Nine Mexican government agencies were hacked in an artificial intelligence (AI)-driven cyber campaign between December 2025 and mid-February 2026 in what researchers have said should "serve as a wake-up call." According to researchers at cybersecurity company Gambit Security, a small group of individuals used Claude Code and OpenAI's GPT-4.1 to breach both... Source
Back in May 2024, Healthcare IT News interviewed Jeremy Meller, CIO at Children's Healthcare of Atlanta, before the opening of the new Children's Healthcare of Atlanta Arthur M. Blank Hospital.Two years ago, Meller described the innovative technology investments that had been made there, with the goal of creating one of the most advanced children's hospitals in the U.S.
Mount Sinai Health System has begun implementing a cloud-native platform that will integrate global cancer insights and use artificial intelligence to streamline pathology processes.It's working with the genomic technology firm Sophia Genetics, which announced the new collaboration on Thursday at the American Association for Cancer Research annual meeting in San Diego.WHY IT MATTERSMount Sinai, a National Cancer Institute-designated Comprehensive Cancer Center, supports care for more than 4,000
A new cybercrime platform called ATHR can harvest credentials via fully automated voice phishing attacks that use both human operators and AI agents for the social engineering phase. [...]
Cookeville Regional Medical Center was targeted last year by the Rhysida ransomware group, which stole 500GB of data. The post Data Breach at Tennessee Hospital Affects 337,000 appeared first on SecurityWeek.
Have you been part of the shift? Many IT teams are now more influential — and necessary — in the assessment, purchase decision and implementation of healthcare software. From technological advancements that require interconnectivity to AI, cybersecurity and more, your IT team is a crucial part of the solution. Can you imagine the impact you might have if you participated early in every software and key equipment conversation?
Introduction P3 Global Intel advertises itself as a "fully integrated and state-of-the-art tip acquisition and tip management solution that has quickly become the leading choice of Crime Stoppers Programs, Law Enforcement Agencies, Campus Safety Programs, and Federal Agency Initiatives." 35,000 U.S. schools use P3 Campus, which partners with "safer school" initiatives such as Sandy Hook... Source
A new malware family named 'AgingFly' has been identified in attacks against local governments and hospitals that steal authentication data from Chromium-based browsers and WhatsApp messenger. [...]
A digitally signed adware tool has deployed payloads running with SYSTEM privileges that disabled antivirus protections on thousands of endpoints, some in the educational, utilities, government, and healthcare sectors. [...]
Nadin Knippschild, DNP, RN, is assistant vice president and CIO at Hickory, North Carolina-based Catawba Valley Health System, a small, not-for-profit independent healthcare organization. As such, she believes her health system's foremost health IT priority is to responsibly harness advanced technologies like artificial intelligence while maintaining unwavering cybersecurity – especially as the organization migrates more data and services to the cloud.
Looking for what to do about each story? See HIPAA Response →
Looking for the editorial publication? hipaapulse.com →