Company Details
sutter-health
25,099
214,387
62
sutterhealth.org
120
SUT_1275121
Completed


Sutter Health Vendor Cyber Rating & Cyber Score
sutterhealth.orgSutter Health is a not-for-profit, people-centered healthcare system providing comprehensive care throughout California. Sutter Health is committed to innovative, high-quality patient care and community partnerships, and innovative, high-quality patient care. Today, Sutter Health is pursuing a bold new plan to reach more people and make excellent healthcare more connected and accessible. The health system’s 57,000+ staff and clinicians and 12,000+ affiliated physicians currently serve more than 3 million patients with a focus on expanding opportunities to serve patients, people and communities better. Sutter Health provides exceptional, affordable care through its hospitals, medical groups, ambulatory surgery centers, urgent care clinics, telehealth, home health and hospice services. Dedicated to transforming healthcare, at Sutter Health, getting better never stops. Learn more about how Sutter Health is transforming healthcare at sutterhealth.org and vitals.sutterhealth.org.
Company Details
sutter-health
25,099
214,387
62
sutterhealth.org
120
SUT_1275121
Completed
Between 650 and 699

Sutter Health Global Score (TPRM)XXXX

Description: Sutter Health, Lemonaid Health, and Redeemer Health Settle Pixel Data Breach Lawsuits Three healthcare providers Sutter Health, Lemonaid Health, and Redeemer Health have reached settlements in class action lawsuits alleging unauthorized disclosures of patient data via website tracking technologies, including pixels, cookies, and web beacons. These tools, commonly used for analytics and marketing, were accused of transmitting protected health information (PHI) to third parties like Meta and Google without proper consent or compliance with HIPAA regulations. Sutter Health The California-based nonprofit health system faced consolidated lawsuits (*Jane Doe I and Jane Doe II v. Sutter Health*) over claims that its website and patient portal shared PHI with third parties. The case proceeded on allegations of violating the California Invasion of Privacy Act (CIPA) and breaching express and implied contracts. A $21.5 million settlement was approved, with no admission of wrongdoing. Class members California residents who accessed Sutter’s MyHealthOnline portal between June 10, 2020, and March 20, 2020 may receive up to $90 each. Remaining funds will go to privacy-focused nonprofits. The final fairness hearing is set for February 27, 2026, with a claim deadline of January 28, 2026. Lemonaid Health The telemedicine provider, owned by 23andMe, settled a lawsuit (*A.J. v. Lemonaid Health*) alleging its website shared PHI with Meta and Google via tracking pixels. The case was transferred to bankruptcy court after the defendants filed for Chapter 11. A $3.25 million settlement fund was established, with approximately 35,000 class members eligible for one-time payments. The final fairness hearing is scheduled for January 20, 2026, with objections due by January 5, 2026, and claims by February 23, 2026. Redeemer Health The Pennsylvania-based Catholic healthcare provider settled consolidated lawsuits (*Doe v. Redeemer Health*) over allegations that its websites and patient portals transmitted PHI to third parties without consent. The settlement offers class members a $25 cash payment and a year of dark web monitoring via CyEx Privacy Shield Pro. The final approval hearing is set for February 9, 2026, with claims due by January 9, 2026. All three cases highlight the risks of tracking technologies in healthcare, where PHI exposure can lead to legal and regulatory scrutiny. The settlements reflect ongoing concerns over compliance with HIPAA and state privacy laws.
Description: The U.S. healthcare services business Welltok revealed a data breach that affected around 8.5 million patients. The business was one among the targets of a widespread hacking campaign that took advantage of a zero-day vulnerability in the MOVEit Transfer programme. The exposed information includes patient information, including phone numbers, physical addresses, email addresses, and full names. Threat actors also obtained specific health insurance details, Medicare/Medicaid ID numbers, and Social Security numbers (SSNs) for some of the affected individuals. The following organisations, on behalf of which Welltok is delivering notice to affected individuals, are Asuris Northwest Health, BridgeSpan Health, Blue Cross and Blue Shield of Minnesota, Blue Cross and Blue Shield of Alabama, Blue Cross and Blue Shield of Kansas, Blue Cross and Blue Shield of North Carolina, Corewell Health, Faith Regional Health Services, Mass General, Brigham Health Plan, Priority Health, Regence BlueCross BlueShield of Oregon, Regence BlueShield, Regence BlueCross BlueShield of Utah, Regence Blue Shield of Idaho, St. Bernards Healthcare, and Sutter Health.
Description: The California Office of the Attorney General disclosed a data breach affecting Sutter Health, a major healthcare provider, on November 3, 2023. The incident originated on May 30, 2023, when an unidentified threat actor exploited a vulnerability in the MOVEit Transfer server, a third-party file transfer tool used by the organization. The attacker successfully exfiltrated sensitive personal data, including patient names and other personally identifiable information (PII). While the breach exposed confidential records, no evidence of misuse or further malicious activity (e.g., financial fraud, identity theft, or ransom demands) has been reported as of the disclosure.The breach highlights vulnerabilities in third-party software supply chains, which cybercriminals increasingly target to access high-value data. Sutter Health, which operates a network of hospitals and medical facilities, likely faced operational and reputational risks due to the exposure of patient data, though the immediate financial or systemic impact appears contained. The incident aligns with broader trends in healthcare cyberattacks, where protected health information (PHI) remains a prime target for exploitation in underground markets or follow-on attacks. Regulatory scrutiny and potential compliance penalties (e.g., under HIPAA) may follow, given the sensitive nature of the compromised data.
Description: A Sutter Health employees were fired for accessing medical information without permission. However, they declined to state how many employees were fired and whose medical records they allegedly looked up. Their privacy auditing and monitoring technology have detected inappropriate access, and the individuals involved are no longer employed by Sutter Health. They are notifying the person, or persons, whose data was accessed.
Description: On February 7, 2018, the California Office of the Attorney General reported a data breach involving Sutter Health that occurred on October 11-12, 2017. The breach was the result of a phishing attack on a vendor, Salem and Green, allowing unauthorized access to personal information, including names, Social Security numbers, and California driver’s license numbers, for individuals affiliated with Sutter Health.


No incidents recorded for Sutter Health in 2026.
No incidents recorded for Sutter Health in 2026.
No incidents recorded for Sutter Health in 2026.
Sutter Health cyber incidents detection timeline including parent company and subsidiaries

Sutter Health is a not-for-profit, people-centered healthcare system providing comprehensive care throughout California. Sutter Health is committed to innovative, high-quality patient care and community partnerships, and innovative, high-quality patient care. Today, Sutter Health is pursuing a bold new plan to reach more people and make excellent healthcare more connected and accessible. The health system’s 57,000+ staff and clinicians and 12,000+ affiliated physicians currently serve more than 3 million patients with a focus on expanding opportunities to serve patients, people and communities better. Sutter Health provides exceptional, affordable care through its hospitals, medical groups, ambulatory surgery centers, urgent care clinics, telehealth, home health and hospice services. Dedicated to transforming healthcare, at Sutter Health, getting better never stops. Learn more about how Sutter Health is transforming healthcare at sutterhealth.org and vitals.sutterhealth.org.


The University Medical Center Utrecht is one of the largest academic healthcare institutions in the Netherlands. We provide the best healthcare for today’s patients, and we also work towards a healthy society in the future. Our organization has three core tasks: care, research and education. Ca

Based on our extensive expertise and know how we seek to ensure high quality, efficient and patient focused healthcare, locally as well as within an international environment. For this purpose Helios Health was founded in 2017. Helios Health combines Helios Germany (Helios Kliniken) and Helios Spa

The Ministry of Health (Malay: Kementerian Kesihatan), abbreviated MOH, is a ministry of the Government of Malaysia that is responsible for health system: health behavior, cancer, public health, health management, medical research, health systems research, respiratory medicine, health promotion, hea
UnitedHealth Group is a health care and well-being company with a mission to help people live healthier lives and help make the health system work better for everyone. We are 340,000 colleagues in two distinct and complementary businesses working to help build a modern, high-performing health syste

Texas Children’s Hospital is a world-class pediatric facility, nationally recognized as a top children’s hospital, and voted one of the best places to work in Houston for nine years running. We’re committed to creating a healthy community for children by providing the best pediatric care possible, t

Fairview Health Services is Minnesota’s choice for healthcare. We’re an industry-leading, award-winning, nonprofit offering a full network of healthcare services. Our broad network is designed to be ready for our patients’ every need, while delivering quality care with compassion. Our care portfoli

Ochsner Health is the leading nonprofit healthcare provider in Louisiana, Mississippi and across the Gulf South, delivering expert care at its 47 hospitals and more than 370 health and urgent care centers. Ochsner is nationally recognized for inspiring healthier lives and stronger communities thro

Emory Healthcare is the most comprehensive health care system in Georgia. We offer 11 hospitals, the Emory Clinic, more than 250 provider locations, and more than 2,800 physicians specializing in 70 different medical subspecialties. Meaning we can provide treatments and services that may not be avai
Siemens Healthineers is a leading medtech company with over 125 years of experience. We pioneer breakthroughs in healthcare. For everyone. Everywhere. Sustainably. Our portfolio, spanning in vitro and in vivo diagnostics to image-guided therapy and cancer care, is crucial for clinical decision-makin
.png)
They're looking to create a 39-hospital system. Allina would join Sutter Health, and the California system vows to invest $2 billion in...
Sutter Health's CPMC Pacific Campus in San Francisco is shown in 2018. The Northern California health giant announced Tuesday it plans to...
Judges ruled against Sutter at trial and appellate levels despite critical services provided, reversing dismissals and evidentiary...
Collaboration Kicks Off with a Girls Youth Flag Football Clinic at Palo Alto High School, 50 Embarcadero Road, on Saturday, Jan.
NORTHERN CALIF. — Two years into a digital transformation, Sutter Health has results to show and accolades to tout.
Learning and development has proven key to fighting burnout and ensuring the success of the health system's people managers, Deborah Yount...
A 19-year old is facing a maximum 95 years in prison for allegedly calling company help desks and convincing employees to reset passwords in...
Google patches sixth Chrome zero-day, Microsoft to force install Copilot app in October, Two more Scattered Spider teen suspects arrested.
Authorities say one of the suspects also hacked several U.S. healthcare firms.

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of Sutter Health is http://www.sutterhealth.org.
According to Rankiteo, Sutter Health’s AI-generated cybersecurity score is 664, reflecting their Weak security posture.
According to Rankiteo, Sutter Health currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, Sutter Health has not been affected by any supply chain cyber incidents, and no incident IDs are currently listed for the organization.
According to Rankiteo, Sutter Health is not certified under SOC 2 Type 1.
According to Rankiteo, Sutter Health does not hold a SOC 2 Type 2 certification.
According to Rankiteo, Sutter Health is not listed as GDPR compliant.
According to Rankiteo, Sutter Health does not currently maintain PCI DSS compliance.
According to Rankiteo, Sutter Health is not compliant with HIPAA regulations.
According to Rankiteo,Sutter Health is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
Sutter Health operates primarily in the Hospitals and Health Care industry.
Sutter Health employs approximately 25,099 people worldwide.
Sutter Health presently has no subsidiaries across any sectors.
Sutter Health’s official LinkedIn profile has approximately 214,387 followers.
Sutter Health is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
Yes, Sutter Health has an official profile on Crunchbase, which can be accessed here: https://www.crunchbase.com/organization/sutter-health.
Yes, Sutter Health maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/sutter-health.
As of March 30, 2026, Rankiteo reports that Sutter Health has experienced 5 cybersecurity incidents.
Sutter Health has an estimated 32,297 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Breach.
Total Financial Loss: The total financial loss from these incidents is estimated to be $0.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with termination of employees, and remediation measures with notification of affected individuals, and communication strategy with notification of affected individuals, and communication strategy with public disclosure via california office of the attorney general, and communication strategy with settlement announcements, legal filings..
Title: Sutter Health Employee Data Breach
Description: Sutter Health employees were fired for accessing medical information without permission. The privacy auditing and monitoring technology detected inappropriate access, and the individuals involved are no longer employed by Sutter Health. They are notifying the person, or persons, whose data was accessed.
Type: Data Breach
Attack Vector: Insider Threat
Vulnerability Exploited: Unauthorized Access
Threat Actor: Employees
Motivation: Unknown
Title: Welltok Data Breach
Description: The U.S. healthcare services business Welltok revealed a data breach that affected around 8.5 million patients. The business was one among the targets of a widespread hacking campaign that took advantage of a zero-day vulnerability in the MOVEit Transfer programme. The exposed information includes patient information, including phone numbers, physical addresses, email addresses, and full names. Threat actors also obtained specific health insurance details, Medicare/Medicaid ID numbers, and Social Security numbers (SSNs) for some of the affected individuals.
Type: Data Breach
Attack Vector: Zero-day vulnerability in MOVEit Transfer programme
Vulnerability Exploited: MOVEit Transfer programme
Title: Sutter Health Data Breach
Description: A data breach involving Sutter Health occurred on October 11-12, 2017, due to a phishing attack on a vendor, Salem and Green, resulting in unauthorized access to personal information.
Date Detected: 2018-02-07
Date Publicly Disclosed: 2018-02-07
Type: Data Breach
Attack Vector: Phishing
Vulnerability Exploited: Human
Title: Sutter Health MOVEit Transfer Data Breach
Description: The California Office of the Attorney General reported a data breach involving Sutter Health on November 3, 2023. The breach occurred on May 30, 2023, when an unknown actor accessed the MOVEit Transfer server and exfiltrated personal data, including names and other personal information, though no evidence of misuse has been reported.
Date Detected: 2023-05-30
Date Publicly Disclosed: 2023-11-03
Type: Data Breach
Attack Vector: Exploitation of MOVEit Transfer Server Vulnerability
Vulnerability Exploited: MOVEit Transfer (CVE-2023-34362 or related)
Threat Actor: Unknown
Title: Sutter Health, Lemonaid Health, & Redeemer Health Settle Pixel Data Breach Lawsuits
Description: Settlements have been agreed to resolve class action lawsuits against three healthcare providers – Sutter Health, Lemonaid Health, & Redeemer Health – that alleged unlawful disclosures of individually identifiable patient information to third parties via website tracking technologies such as pixels.
Type: Data Breach
Attack Vector: Website Tracking Technologies (Pixels, Cookies, Web Beacons, JavaScript)
Vulnerability Exploited: Improper use of tracking technologies on authenticated pages (patient portals) without HIPAA-compliant authorizations or business associate agreements
Motivation: Data Collection for Marketing/Third-Party Use
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Phishing attack on vendor and MOVEit Transfer server vulnerability.

Data Compromised: Medical Information

Data Compromised: Phone numbers, Physical addresses, Email addresses, Full names, Health insurance details, Medicare/medicaid id numbers, Social security numbers (ssns)

Data Compromised: Names, Social security numbers, California driver’s license numbers

Data Compromised: Names, Other personal information
Systems Affected: MOVEit Transfer server
Identity Theft Risk: Potential (no evidence of misuse reported)

Data Compromised: Personally identifiable health information (PHI), protected health information (HIPAA-protected data)
Systems Affected: WebsitesPatient Portals
Brand Reputation Impact: Likely negative impact due to lawsuits and settlements
Legal Liabilities: Class action lawsuits, regulatory scrutiny
Identity Theft Risk: High (exposure of PHI and PII)
Average Financial Loss: The average financial loss per incident is $0.00.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Medical Information, Personal Information, Health Insurance Details, Medicare/Medicaid Id Numbers, Social Security Numbers, , Personal Information, , Personal Data, Names, , Personally Identifiable Health Information (Phi), Protected Health Information (Hipaa-Protected Data) and .

Entity Name: Sutter Health
Entity Type: Healthcare Provider
Industry: Healthcare

Entity Name: Asuris Northwest Health
Entity Type: Healthcare
Industry: Healthcare

Entity Name: BridgeSpan Health
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Blue Cross and Blue Shield of Minnesota
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Blue Cross and Blue Shield of Alabama
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Blue Cross and Blue Shield of Kansas
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Blue Cross and Blue Shield of North Carolina
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Corewell Health
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Faith Regional Health Services
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Mass General
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Brigham Health Plan
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Priority Health
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Regence BlueCross BlueShield of Oregon
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Regence BlueShield
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Regence BlueCross BlueShield of Utah
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Regence Blue Shield of Idaho
Entity Type: Healthcare
Industry: Healthcare

Entity Name: St. Bernards Healthcare
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Sutter Health
Entity Type: Healthcare
Industry: Healthcare

Entity Name: Sutter Health
Entity Type: Healthcare Provider
Industry: Healthcare
Location: California

Entity Name: Sutter Health
Entity Type: Healthcare Provider
Industry: Healthcare
Location: California, USA

Entity Name: Sutter Health
Entity Type: Non-profit Integrated Health Delivery System
Industry: Healthcare
Location: Sacramento, California, USA
Customers Affected: California residents who logged into Sutter Health MyHealthOnline portal (June 10, 2025, to March 20, 2020)

Entity Name: Lemonaid Health
Entity Type: Telemedicine Platform Provider
Industry: Healthcare/Telemedicine
Location: USA
Customers Affected: Approximately 35,000 class members

Entity Name: Redeemer Health
Entity Type: Catholic Healthcare Provider
Industry: Healthcare
Location: Huntingdon Valley, Pennsylvania, USA

Containment Measures: Termination of Employees
Remediation Measures: Notification of Affected Individuals
Communication Strategy: Notification of Affected Individuals

Communication Strategy: Public disclosure via California Office of the Attorney General

Communication Strategy: Settlement announcements, legal filings

Type of Data Compromised: Medical Information
Sensitivity of Data: High

Type of Data Compromised: Personal information, Health insurance details, Medicare/medicaid id numbers, Social security numbers
Number of Records Exposed: 8.5 million
Sensitivity of Data: High

Type of Data Compromised: Personal information
Sensitivity of Data: High
Personally Identifiable Information: namesSocial Security numbersCalifornia driver’s license numbers

Type of Data Compromised: Personal data, Names
Sensitivity of Data: Moderate (personal information)

Type of Data Compromised: Personally identifiable health information (phi), Protected health information (hipaa-protected data)
Sensitivity of Data: High (health-related, personally identifiable)
Data Exfiltration: Transmitted to third parties (Meta, Google, etc.)
Personally Identifiable Information: Yes (health information, user activity data)
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Notification of Affected Individuals.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by termination of employees.

Regulations Violated: Potential HIPAA (Health Insurance Portability and Accountability Act) violations,
Regulatory Notifications: California Office of the Attorney General

Regulations Violated: HIPAA, California Invasion of Privacy Act (CIPA), State privacy laws, Wiretapping laws,
Legal Actions: Class action lawsuits, partial vacatur of HHS guidance
Ensuring Regulatory Compliance: The company ensures compliance with regulatory requirements through Class action lawsuits, partial vacatur of HHS guidance.

Lessons Learned: Healthcare organizations must ensure compliance with HIPAA when using tracking technologies on authenticated pages (e.g., patient portals). Business associate agreements or HIPAA-compliant authorizations are required for third-party data sharing.

Recommendations: Review and audit website tracking technologies for compliance with HIPAA and state privacy laws., Obtain HIPAA-compliant authorizations or establish business associate agreements for third-party tracking tools on authenticated pages., Monitor regulatory guidance on tracking technologies and adjust practices accordingly., Implement enhanced monitoring and controls for data shared with third parties.Review and audit website tracking technologies for compliance with HIPAA and state privacy laws., Obtain HIPAA-compliant authorizations or establish business associate agreements for third-party tracking tools on authenticated pages., Monitor regulatory guidance on tracking technologies and adjust practices accordingly., Implement enhanced monitoring and controls for data shared with third parties.Review and audit website tracking technologies for compliance with HIPAA and state privacy laws., Obtain HIPAA-compliant authorizations or establish business associate agreements for third-party tracking tools on authenticated pages., Monitor regulatory guidance on tracking technologies and adjust practices accordingly., Implement enhanced monitoring and controls for data shared with third parties.Review and audit website tracking technologies for compliance with HIPAA and state privacy laws., Obtain HIPAA-compliant authorizations or establish business associate agreements for third-party tracking tools on authenticated pages., Monitor regulatory guidance on tracking technologies and adjust practices accordingly., Implement enhanced monitoring and controls for data shared with third parties.
Key Lessons Learned: The key lessons learned from past incidents are Healthcare organizations must ensure compliance with HIPAA when using tracking technologies on authenticated pages (e.g., patient portals). Business associate agreements or HIPAA-compliant authorizations are required for third-party data sharing.

Source: Welltok Data Breach Notice

Source: California Office of the Attorney General
Date Accessed: 2018-02-07

Source: California Office of the Attorney General
Date Accessed: 2023-11-03

Source: HIPAA Journal
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Welltok Data Breach Notice, and Source: California Office of the Attorney GeneralDate Accessed: 2018-02-07, and Source: California Office of the Attorney GeneralDate Accessed: 2023-11-03, and Source: HIPAA Journal.

Investigation Status: Completed

Investigation Status: Ongoing (no evidence of misuse reported as of disclosure)

Investigation Status: Settled (preliminary approval granted, final fairness hearings scheduled)
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notification of Affected Individuals, Public disclosure via California Office of the Attorney General, Settlement announcements and legal filings.

Customer Advisories: Notification of Affected Individuals

Customer Advisories: Class members notified of settlement terms and claim deadlines
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notification of Affected Individuals and Class members notified of settlement terms and claim deadlines.

Entry Point: Phishing attack on vendor

Entry Point: MOVEit Transfer server vulnerability

Root Causes: Unauthorized Access by Employees
Corrective Actions: Termination of Employees, Notification of Affected Individuals

Root Causes: Phishing attack on vendor

Root Causes: Exploitation Of Unpatched Moveit Transfer Vulnerability,

Root Causes: Improper use of tracking technologies on patient portals without HIPAA-compliant safeguards, leading to unauthorized data sharing with third parties (Meta, Google, etc.).
Corrective Actions: Settlements include cash payments to affected individuals and, in some cases, credit monitoring services (e.g., CyEx Privacy Shield Pro for Redeemer Health).
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Termination of Employees, Notification of Affected Individuals, Settlements include cash payments to affected individuals and, in some cases, credit monitoring services (e.g., CyEx Privacy Shield Pro for Redeemer Health)..
Last Attacking Group: The attacking group in the last incident were an Employees and Unknown.
Most Recent Incident Detected: The most recent incident detected was on 2018-02-07.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2023-11-03.
Highest Financial Loss: The highest financial loss from an incident was {'Sutter Health': '$21,500,000 settlement', 'Lemonaid Health': '$3,250,000 settlement', 'Redeemer Health': None}.
Most Significant Data Compromised: The most significant data compromised in an incident were Medical Information, Phone numbers, Physical addresses, Email addresses, Full names, Health insurance details, Medicare/Medicaid ID numbers, Social Security numbers (SSNs), , names, Social Security numbers, California driver’s license numbers, , Names, Other personal information, , Personally identifiable health information (PHI) and protected health information (HIPAA-protected data).
Most Significant System Affected: The most significant system affected in an incident was MOVEit Transfer server and WebsitesPatient Portals.
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident was Termination of Employees.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Medicare/Medicaid ID numbers, Physical addresses, California driver’s license numbers, Names, Other personal information, Health insurance details, Phone numbers, Medical Information, Personally identifiable health information (PHI), protected health information (HIPAA-protected data), Social Security numbers, Email addresses, names, Full names and Social Security numbers (SSNs).
Number of Records Exposed in Most Significant Breach: The number of records exposed in the most significant breach was 8.5M.
Most Significant Legal Action: The most significant legal action taken for a regulatory violation was Class action lawsuits, partial vacatur of HHS guidance.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Healthcare organizations must ensure compliance with HIPAA when using tracking technologies on authenticated pages (e.g., patient portals). Business associate agreements or HIPAA-compliant authorizations are required for third-party data sharing.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Monitor regulatory guidance on tracking technologies and adjust practices accordingly., Implement enhanced monitoring and controls for data shared with third parties., Obtain HIPAA-compliant authorizations or establish business associate agreements for third-party tracking tools on authenticated pages. and Review and audit website tracking technologies for compliance with HIPAA and state privacy laws..
Most Recent Source: The most recent source of information about an incident are California Office of the Attorney General, Welltok Data Breach Notice and HIPAA Journal.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Completed.
Most Recent Customer Advisory: The most recent customer advisory issued were an Notification of Affected Individuals and Class members notified of settlement terms and claim deadlines.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Phishing attack on vendor and MOVEit Transfer server vulnerability.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Unauthorized Access by Employees, Phishing attack on vendor, Exploitation of unpatched MOVEit Transfer vulnerability, Improper use of tracking technologies on patient portals without HIPAA-compliant safeguards, leading to unauthorized data sharing with third parties (Meta, Google, etc.)..
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Termination of Employees, Notification of Affected Individuals, Settlements include cash payments to affected individuals and, in some cases, credit monitoring services (e.g., CyEx Privacy Shield Pro for Redeemer Health)..
.png)
A vulnerability was identified in Totolink A3300R 17.0.0cu.557_b20221024. This affects the function setLanCfg of the file /cgi-bin/cstecgi.cgi of the component Parameter Handler. The manipulation of the argument lanIp leads to command injection. Remote exploitation of the attack is possible. The exploit is publicly available and might be used.
Perl versions from 5.9.4 before 5.40.4-RC1, from 5.41.0 before 5.42.2-RC1, from 5.43.0 before 5.43.9 contain a vulnerable version of Compress::Raw::Zlib. Compress::Raw::Zlib is included in the Perl package as a dual-life core module, and is vulnerable to CVE-2026-3381 due to a vendored version of zlib which has several vulnerabilities, including CVE-2026-27171. The bundled Compress::Raw::Zlib was updated to version 2.221 in Perl blead commit c75ae9cc164205e1b6d6dbd57bd2c65c8593fe94.
Ghidra versions prior to 12.0.3 improperly process annotation directives embedded in automatically extracted binary data, resulting in arbitrary command execution when an analyst interacts with the UI. Specifically, the @execute annotation (which is intended for trusted, user-authored comments) is also parsed in comments generated during auto-analysis (such as CFStrings in Mach-O binaries). This allows a crafted binary to present seemingly benign clickable text which, when clicked, executes attacker-controlled commands on the analyst’s machine.
A critical security vulnerability in parisneo/lollms versions up to 2.2.0 allows any authenticated user to accept or reject friend requests belonging to other users. The `respond_request()` function in `backend/routers/friends.py` does not implement proper authorization checks, enabling Insecure Direct Object Reference (IDOR) attacks. Specifically, the `/api/friends/requests/{friendship_id}` endpoint fails to verify whether the authenticated user is part of the friendship or the intended recipient of the request. This vulnerability can lead to unauthorized access, privacy violations, and potential social engineering attacks. The issue has been addressed in version 2.2.0.
A Server-Side Request Forgery (SSRF) vulnerability exists in parisneo/lollms versions prior to 2.2.0, specifically in the `/api/files/export-content` endpoint. The `_download_image_to_temp()` function in `backend/routers/files.py` fails to validate user-controlled URLs, allowing attackers to make arbitrary HTTP requests to internal services and cloud metadata endpoints. This vulnerability can lead to internal network access, cloud metadata access, information disclosure, port scanning, and potentially remote code execution.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.