Imagine360 Settles Data Breach Lawsuit for $475,000
A settlement has received preliminary approval from a judge to resolve a class action complaint against Imagine360 over a 2023 hacking incident involving its Citrix file-sharing solution. Imagine360 is a Chesterbrook, Pennsylvania-based company that offers health plan administration and telemedicine services. On or around January 30, 2023, suspicious activity was identified within its Citrix file-sharing solution. The solution was used by Imagine360 to securely transfer files with self-insured health plans. The investigation confirmed that sensitive data had been stolen, including names, medical information, health insurance information, and Social Security numbers. The breach was initially reported to the HHS’ Office for Civil Rights as affecting 112,611 individuals, although the total was later updated to 132,807 individuals. A lawsuit was filed on February 19, 2025, Collins v. Imagine360, in the Circuit Court for the 17th Judicial Circuit in and for Broward County, Florida, over the data breach. The plaintiff alleged Imagine360 was negligent by failing to implement appropriate...
NIST Privacy Framework Updated to Incorporate Latest Cybersecurity Guidelines
The National Institute of Standards and Technology (NIST) has issued a draft update to its Privacy Framework to incorporate the latest cybersecurity guidelines and practices. The NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management is a voluntary tool that provides a set of strategies for organizations to adopt to improve their approach to protecting personal data. First released in January 2020, the framework is modeled on and developed to complement the NIST Cybersecurity Framework. While organizations can adopt the NIST CSF to improve their security posture, adopting the NIST CSF will not necessarily address all privacy risks. The NIST Privacy Framework is divided into three sections: Core, Profiles, and Implementation Tiers. Core specifies privacy protection activities, Profiles can be used to determine which Core activities should be pursued to achieve privacy goals most effectively, and the Implementation Tiers section can be used to optimize the resources for managing privacy risks. It has now been five years since the Privacy Framework was...
Vulnerabilities Identified in Pixmeo OsiriX MD DICOM Viewer
Three vulnerabilities have been identified in Pixmeo OsiriX MD, the most widely used DICOM medical image viewing software in the world, including a critical remotely exploitable flaw that could result in credential theft. The most serious vulnerability is due to credentials being transmitted in cleartext by the Osirix MD Web Portal. The lack of encryption for the transmitted credentials means they could be intercepted by a threat actor. The vulnerability is tracked as CVE-2025-27720 and has a CVSS v4 severity score of 9.3 (CVSS v3.1: 7.4). A high-severity use-after-free vulnerability has been identified that could be exploited by an attacker by uploading a specially crafted DICOM file. Successful exploitation of the vulnerability would cause memory corruption, resulting in a denial-of-service condition. The vulnerability is tracked as CVE-2025-27578 and has a CVSS v4 base score of 8.7 (CVSS v3.1: 7.5). The third flaw is a medium-severity vulnerability that could be exploited by a threat actor to cause memory corruption or a system crash. The use-after-free vulnerability could be...
LockBit Ransomware Group Hacked; Operations Database Leaked
The LockBit ransomware group, one of the most active ransomware operations in recent years with thousands of attacks to its name, has suffered its own hacking and data leak incident. An unknown hacker managed to gain access to the control panel used by the group’s affiliates, defaced it with the message “Don’t do crime CRIME is BAD xoxo from Prague,” and added a download link for an SQL database. The database contains sensitive internal operations data from December 2024 to April 2025, including a log of 75 affiliates and admins who have used the affiliate panel, including their plaintext passwords. The database also includes victim profiles, domains, estimated revenues, and 4,492 chat messages between LockBit and its victims about ransom negotiations; custom ransomware builds used by affiliates in their attacks; 59,975 Bitcoin addresses; encryption references, and a list of the group’s victims between the start of December 2024 and the end of April 2024. The hack was identified by a threat actor with the moniker Rey, who disclosed the discovery on X on May 7, 2025. The operator of...
Outsourced HIPAA Compliance
Outsourced HIPAA compliance is when a HIPAA-regulated entity engages external consultants to manage part, or all, of the organization’s HIPAA compliance obligations in order to support an existing in-house compliance team, as an alternative to building an in-house team, or in response to a HIPAA security incident. Outsourced HIPAA compliance services can be structured in various ways. Some external consultants function as a full-service operation, effectively replacing – or becoming an extension of – the organization’s in-house compliance team. Others offer on-demand consulting for specific compliance issues, or – for example – to help an organization recover from a HIPAA security incident. By outsourcing HIPAA compliance, HIPAA-regulated entities benefit from the expertise of professionals who are up to date with regulatory requirements and industry best practices. This approach can also be cost-effective for smaller organizations that might not have the resources to build an in-house compliance team or employ key workforce members such as a cybersecurity...



