Texas Rheumatologist Sentenced to 10 Years in Jail for Falsely Diagnosing Patients in $118M Fraud Scheme
A Texas rheumatologist who participated in a $118 million healthcare fraud scheme that involved falsely diagnosing patients with chronic illnesses in order to bill Medicare, Medicaid, TRICARE, and Blue Cross Blue Shield for unnecessary tests and treatments has been sentenced to 10 years in jail, 3 years of supervised release, and must forfeit $28,245,454, which includes 13 real estate properties, a jet, and a Maserati GranTurismo. Felony convictions also result in mandatory exclusion from federal healthcare programs. Over two decades, Jorge Zamora-Quezada, M.D., 68, of Mission, Texas, falsified patient records to support rheumatoid arthritis diagnoses. Patients were led to believe that they had a lifelong, incurable health condition that required regular treatments at Zamora-Quezada’s medical practice. The patients were administered toxic medications and were required to undergo further tests, including injections, infusions, x-rays, and MRIs, the costs of which were fraudulently billed to insurers. Some of the treatments were harmful and caused potentially deadly side effects....
April 2025 Healthcare Data Breach Report
April saw a 17.9% month-over-month increase in healthcare data breaches, with 66 data breaches of 500 or more records reported to the HHS’ Office for Civil Rights (OCR). Last month, it looked like data breach numbers were starting to reduce; however, April’s figures are well above the 12-month average of 57 data breaches per month, with breaches reported in similar numbers to April 2024. There’s further bad news, as April saw a massive increase in the number of individuals affected by healthcare data breaches, which increased by 371% month-over-month from 2.7 million in March to 12.9 million in April, largely due to two massive data breaches at Yale New Haven Health System and Blue Shield of California, which combined affected more than 10.26 million individuals. Excluding the massive data breach at Change Healthcare as an outlier, over the past 12 months, an average of 5,992,343 individuals have been affected by large healthcare data breaches each month. April’s total is more than twice that number, although well below the 17 million individuals affected by healthcare data...
Harbin Clinic: 210,000 Individuals Affected by Nationwide Recovery Service Data Breach
Harbin Clinic has been affected by a cyberattack on the debt collection agency Nationwide Recovery Service, Gardner Health Services has fallen victim to a cyberattack by the Cl0p group, and Gilead Sciences has reported a data breach at a mailing vendor. Harbin Clinic, Georgia Harbin Clinic, a primary healthcare provider with locations throughout Northwest Georgia, Northeast Alabama, and Southeast Tennessee, is one of the latest healthcare providers to confirm that they have been affected by a data breach at the debt recovery vendor, Nationwide Recovery Service (NRS). Harbin Clinic uses Nationwide Recovery Service for delinquent accounts, services related to bankruptcies, lawsuits, and patient estate matters. In July 2024, NRS identified suspicious activity within its network. The forensic investigation confirmed that there had been unauthorized access to its network between July 5, 2024, and July 11, 2024. During that time, files and folders were copied from its network without authorization. NRS completed the review in February 2025 and informed Harbin Clinic that some of the...
Anne Arundel County Department of Health Confirms February Ransomware Attack
The Anne Arundel County Department of Health in Maryland has confirmed that health data was compromised in a February ransomware attack, and a phishing attack on Salus Group has exposed the PHI of 40,000 individuals. Anne Arundel County Department of Health, Maryland The Anne Arundel County Department of Health in Maryland has shared further information on a February 2025 cyberattack that forced government buildings in the county to temporarily close. Government officials had previously announced that it was dealing with “an ongoing cyber incident of external origin impacting public services”, and that officials were working around the clock to get critical services back online as quickly as possible. County officials have provided an update, confirming that they first became aware of the security incident on February 22, 2025, and launched an investigation to determine the nature and scope of the unauthorized computer activity, with assistance provided by third-party cybersecurity professionals, law enforcement partners, and state agencies. It has now been confirmed...
Rhode Island Releases Details of RIBridges Hacking Investigation
The state of Rhode Island has released a summary of the findings of an investigation by the cybersecurity firm CrowdStrike into the hacking of the Rhode Island state benefit system, known as RIBridges, by the Brain Cipher threat group. Brain Cipher members were able to gain access to 28 of the 338 environments that comprise the RIBridges system and stole sensitive data such as names, addresses, birth dates, Social Security numbers, and health information. The affected individuals had previously signed up to receive public benefits such as food stamps or private health insurance through the HealthSource RI portal. The state issued notification letters to around 657,000 individuals in January informing them that their sensitive data may have been compromised in the incident. The forensic investigation determined that 114,879 individuals who received the notifications in January had not in fact been affected, although an additional 107,757 individuals had been affected but were not notified in January. They include approximately 30,000 individuals whose data was collected during...



