25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

Imagine360 Settles Data Breach Lawsuit for $475,000
May09

Imagine360 Settles Data Breach Lawsuit for $475,000

A settlement has received preliminary approval from a judge to resolve a class action complaint against Imagine360 over a 2023 hacking incident involving its Citrix file-sharing solution. Imagine360 is a Chesterbrook, Pennsylvania-based company that offers health plan administration and telemedicine services. On or around January 30, 2023, suspicious activity was identified within its Citrix file-sharing solution. The solution was used by Imagine360 to securely transfer files with self-insured health plans. The investigation confirmed that sensitive data had been stolen, including names, medical information, health insurance information, and Social Security numbers. The breach was initially reported to the HHS’ Office for Civil Rights as affecting 112,611 individuals, although the total was later updated to 132,807 individuals. A lawsuit was filed on February 19, 2025, Collins v. Imagine360, in the Circuit Court for the 17th Judicial Circuit in and for Broward County, Florida, over the data breach. The plaintiff alleged Imagine360 was negligent by failing to implement appropriate...

Read More
NIST Privacy Framework Updated to Incorporate Latest Cybersecurity Guidelines
May09

NIST Privacy Framework Updated to Incorporate Latest Cybersecurity Guidelines

The National Institute of Standards and Technology (NIST) has issued a draft update to its Privacy Framework to incorporate the latest cybersecurity guidelines and practices. The NIST Privacy Framework: A Tool for Improving Privacy through Enterprise Risk Management is a voluntary tool that provides a set of strategies for organizations to adopt to improve their approach to protecting personal data. First released in January 2020, the framework is modeled on and developed to complement the NIST Cybersecurity Framework. While organizations can adopt the NIST CSF to improve their security posture, adopting the NIST CSF will not necessarily address all privacy risks. The NIST Privacy Framework is divided into three sections: Core, Profiles, and Implementation Tiers. Core specifies privacy protection activities, Profiles can be used to determine which Core activities should be pursued to achieve privacy goals most effectively, and the Implementation Tiers section can be used to optimize the resources for managing privacy risks. It has now been five years since the Privacy Framework was...

Read More
Vulnerabilities Identified in Pixmeo OsiriX MD DICOM Viewer
May09

Vulnerabilities Identified in Pixmeo OsiriX MD DICOM Viewer

Three vulnerabilities have been identified in Pixmeo OsiriX MD, the most widely used DICOM medical image viewing software in the world, including a critical remotely exploitable flaw that could result in credential theft. The most serious vulnerability is due to credentials being transmitted in cleartext by the Osirix MD Web Portal. The lack of encryption for the transmitted credentials means they could be intercepted by a threat actor.  The vulnerability is tracked as CVE-2025-27720 and has a CVSS v4 severity score of 9.3 (CVSS v3.1: 7.4). A high-severity use-after-free vulnerability has been identified that could be exploited by an attacker by uploading a specially crafted DICOM file. Successful exploitation of the vulnerability would cause memory corruption, resulting in a denial-of-service condition. The vulnerability is tracked as CVE-2025-27578 and has a CVSS v4 base score of 8.7 (CVSS v3.1: 7.5). The third flaw is a medium-severity vulnerability that could be exploited by a threat actor to cause memory corruption or a system crash. The use-after-free vulnerability could be...

Read More
LockBit Ransomware Group Hacked; Operations Database Leaked
May09

LockBit Ransomware Group Hacked; Operations Database Leaked

The LockBit ransomware group, one of the most active ransomware operations in recent years with thousands of attacks to its name, has suffered its own hacking and data leak incident. An unknown hacker managed to gain access to the control panel used by the group’s affiliates, defaced it with the message “Don’t do crime CRIME is BAD xoxo from Prague,” and added a download link for an SQL database. The database contains sensitive internal operations data from December 2024 to April 2025, including a log of 75 affiliates and admins who have used the affiliate panel, including their plaintext passwords. The database also includes victim profiles, domains, estimated revenues, and 4,492 chat messages between LockBit and its victims about ransom negotiations; custom ransomware builds used by affiliates in their attacks; 59,975 Bitcoin addresses; encryption references, and a list of the group’s victims between the start of December 2024 and the end of April 2024. The hack was identified by a threat actor with the moniker Rey, who disclosed the discovery on X on May 7, 2025. The operator of...

Read More
Outsourced HIPAA Compliance
May08

Outsourced HIPAA Compliance

Outsourced HIPAA compliance is when a HIPAA-regulated entity engages external consultants to manage part, or all, of the organization’s HIPAA compliance obligations in order to support an existing in-house compliance team, as an alternative to building an in-house team, or in response to a HIPAA security incident. Outsourced HIPAA compliance services can be structured in various ways. Some external consultants function as a full-service operation, effectively replacing – or becoming an extension of – the organization’s in-house compliance team. Others offer on-demand consulting for specific compliance issues, or – for example – to help an organization recover from a HIPAA security incident. By outsourcing HIPAA compliance, HIPAA-regulated entities benefit from the expertise of professionals who are up to date with regulatory requirements and industry best practices. This approach can also be cost-effective for smaller organizations that might not have the resources to build an in-house compliance team or employ key workforce members such as a cybersecurity...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist