25% off all training courses Offer ends May 29, 2026
View HIPAA Courses
25% off all training courses
View HIPAA Courses
Offer ends May 29, 2026

The HIPAA Journal is the leading provider of HIPAA training, news, regulatory updates, and independent compliance advice.

Steve Alder

Steve Alder is the editor-in-chief of The HIPAA Journal. Steve is responsible for editorial policy regarding the topics covered in The HIPAA Journal. He is a specialist on healthcare industry legal and regulatory affairs, and has 10 years of experience writing about HIPAA and other related legal topics. Steve has developed a deep understanding of regulatory issues surrounding the use of information technology in the healthcare industry and has written hundreds of articles on HIPAA-related topics. Steve shapes the editorial policy of The HIPAA Journal, ensuring its comprehensive coverage of critical topics. Steve Alder is considered an authority in the healthcare industry on HIPAA. The HIPAA Journal has evolved into the leading independent authority on HIPAA under Steve’s editorial leadership. Steve manages a team of writers and is responsible for the factual and legal accuracy of all content published on The HIPAA Journal. Steve holds a Bachelor’s of Science degree from the University of Liverpool. You can connect with Steve via LinkedIn or email via stevealder(at)hipaajournal.com

CISA Issues Alert About Multiple Philips Vue PACS Vulnerabilities
Jul19

CISA Issues Alert About Multiple Philips Vue PACS Vulnerabilities

More than a dozen vulnerabilities have been identified in the Philips Vue PACS image management and communication system, including critical vulnerabilities that can be remotely exploited in a low-complexity attack. Successful exploitation of the vulnerabilities could allow an unauthenticated individual to remotely execute code, install unauthorized software, eavesdrop, view, or modify data, or negatively impact the confidentiality, integrity, or availability of the system or data. The 13 vulnerabilities affect all versions prior to 12.2.8.410. Vue PACS Vulnerabilities CVE Type CVSS v3.1 CVSS v4 CVE-2017-17485 Deserialization of untrusted data 9.8 9.3 CVE-2020-11113 Deserialization of untrusted data 8.8 7.1 CVE-2020-10673 Deserialization of untrusted data 8.8 8.7 CVE-2023-40159 Exposure of sensitive information to an unauthorized actor 8.2 8.8 CVE-2020-35728 Deserialization of untrusted data 8.1 9.3 CVE-2021-20190 Deserialization of untrusted data 8.1 9.3 CVE-2020-14061 Deserialization of untrusted data 8.1 9.3 CVE-2021-28165 Uncontrolled resource consumption 7.5 8.8 CVE-2020-40704...

Read More
Memorial Sloan Kettering Cancer Center Employees Tricked by Phishing Email
Jul19

Memorial Sloan Kettering Cancer Center Employees Tricked by Phishing Email

Memorial Sloan Kettering Cancer Center (MSK) has announced that the protected health information of 12,274 individuals has been exposed in a phishing attack. On April 26, 2024, MSK identified suspicious activity in an employee email account. The account was used to send an email to many other MSK employees that contained a link to a spoofed web page that prompted users to log in to their MSK accounts and captured their credentials when they were entered. Several employees were tricked by the email because the message had been sent from a valid MSK account and appeared to be a valid internal request. An analysis of the compromised email accounts confirmed they contained some protected health information, including first and last names, medical record numbers, diagnoses, medication names, treatment types, and dates of treatment. A subset of the affected individuals also had their contact information (address, email, telephone number) and dates of birth exposed. MSK confirmed that the breach was limited to email accounts, medical records were not accessed, and Social Security numbers...

Read More
ITRC: More Than 1 Billion Individuals Affected by H1, 2024 Data Compromises
Jul18

ITRC: More Than 1 Billion Individuals Affected by H1, 2024 Data Compromises

The first half of 2024 saw a significant increase in the number of victims of data breaches, according to a recently published H1 Data Breach Analysis by the Identity Theft Resource Center. In the first 6 months of the year, there were 1,571 publicly reported compromises, up 14% from H1, 2023, and more than 1 billion victims. The size of some of the data breaches was astonishing. The two biggest attacks in terms of the number of affected individuals occurred at Ticketmaster Entertainment and Advance Auto Parts, with the former involving the personal data of 560 million individuals and the latter affecting 380 million individuals. A data breach at Dell Technologies affected 49 million individuals, a breach at LoanDepot affected 16.9 million individuals, and a healthcare data breach at Kaiser Foundation Health Plan rounded out the top 5 and affected 13.4 million individuals. Two other healthcare data breaches made the top 10 – The attack on the debt collection firm, Financial Business and Consumer Solutions, Inc., which affected 3,435,640 individuals, and the attack on the...

Read More
Ransomware Groups’ Data Leak Site Listings Increased by 20% in Q2, 2024
Jul18

Ransomware Groups’ Data Leak Site Listings Increased by 20% in Q2, 2024

An analysis of ransomware groups’ data leak sites by Reliaquest has shown a marked increase in activity in Q2, 2024, with listings increasing by 20% from Q1 with 1,237 organizations added to the data leak sites in Q2. To add some perspective, the number of new listings on data leak sites in Q1, 2024, was atypically low for two main reasons. In Q1, an international law enforcement operation disrupted the LockBit ransomware group, and following a ransomware attack on Change Healthcare, the ALPHV/Blackcat conducted an exit scam and shut down its operation. These two groups were the most prolific RaaS operations at the time. While the number of additions to data leak sites increased by 20% in Q2, ransomware actively is down 13% from Q2, 2023, with the number of victims up 1% in H1 2024 compared to H1, 2023. The shutdown of ALPHV/Blackcat has meant affiliates of that group have had to move to other RaaS groups, and several RaaS groups have been recruiting those affiliates, such as RansomHub, BlackSuit, and BlackBasta, all of which increased their activity in the quarter. RansomHub,...

Read More
Publicly Accessible Database Contained 148,000 Files Related to COVID-19 Testing
Jul18

Publicly Accessible Database Contained 148,000 Files Related to COVID-19 Testing

An InHouse Physicians database containing 148K files related to COVID-19 testing has been exposed online, and Freudenberg Medical and Fairfax Radiological Consultants have experienced cyberattacks that exposed patient data. Publicly Accessible Database Contained 148,000 Files Related to COVID-19 Testing InHouse Physicians, a provider of on-site medical services and wellness programs to organizations, has inadvertently exposed a database on the Internet that included almost 150,000 documents that contained information about individuals’ COVID-19 status – whether they had been cleared to attend an event or had tested positive for COVID-19. The exposed database was identified by researcher Jeremiah Fowler, who found 12 GB of documents in the non-password-protected database, including 148,415 PDF files that contained full names, phone numbers, the name of the event, and whether individuals had been cleared to attend or were COVID-19 positive. Fowler notified InHouse Physicians about the exposed database and it was rapidly secured. It is unclear whether the database was managed by...

Read More
x

Is Your Organization HIPAA Compliant?

Find Out With Our Free HIPAA Compliance Checklist

Get Free Checklist