Skip to content
  Thursday 22 May 2025
Trending
January 22, 2024Why do you believe poker should be legalized and regulated? February 23, 2024Updated: Top Cyber Actions for Securing Water Systems October 29, 2024<h3>Ultimate 2024 Guide Unveiled!</h3> December 6, 2024Shocking Discoveries: Major Flaws Found in Top Machine Learning Tools December 30, 2024Key Insights from the Browser Extension Campaign May 22, 2025FBI and Europol Bust Massive Malware Network with 10 Million Infections October 7, 2024Cybersecurity Analyst February 19, 2025<h3>South Korea Blocks DeepSeek AI Chatbot from App Stores</h3> January 3, 2022Top 12 Best Thermometer Apps For Android and iPhone 2022 November 7, 2024<h3>Microsoft Battles 600 Million Daily Cyberattacks!</h3>
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
Mister Cybersecurity
  • Home
  • News
    • Daily Update
    • Industry News
    • Threat Advisories
  • Simulators
    • Exam Simulators
      • CompTIA Security+
      • CompTIA Advanced Security Practitioner (CASP+)
      • Certified Ethical Hacker (CEH)
      • Certified Information Systems Security Professional (CISSP)
      •  Certified Information Systems Auditor (CISA)
      • Certified Information Security Manager (CISM)
      • Systems Security Certified Practitioner (SSCP)
      • GIAC Security Essentials Certification (GSEC)
      • GIAC Certified Incident Handler (GCIH)
      • Offensive Security Certified Professional (OSCP)
    • Training Simulators
      • Blue Team Simulator
      • Red Team Simulator
  • Tools
    • VulnVisor – Vulnerability Explorer
    • Takedown Request Generator
    • Dark Coder – Auto Code Generator
    • SKY VPN
  • Courses
    • SQL Injection Fundamentals with Kali Linux
    • Web Application Hacking
    • Session Hijacking
    • DoS & DDoS Attacks for Beginners
    • Cryptography for Cybersecurity & Hacking
    • Evasion Tactics – IDS, Firewalls & Honeypots
  • Tutorials
    • Security
    • Malware
    • Virus
    • Social Media Security
    • Wireless Security
    • Linux
    • Privacy
    • Windows
      • Windows 11
    • Android
    • iPhone
  • Software
    • Antivirus
    • Android APK
    • Best Free VPN
    • Encryption Tools
    • Hacking Tools
    • Network Utilities
    • Pentesting Tools
    • Themes and Skins
    • Operating Systems
  • More
    • Alternative Sites
    • Cloud Storage
    • Chrome OS
    • Encryption
    • Email Security
    • Ethical Hacking Books
    • Firewall
    • Hacking
    • Web
    • Ransomware
  • Careers
  • Store
  • Account
    • Log In
    • Your Profile
    • Membership Billing
    • Membership Account
Mister Cybersecurity
  Industry News  

Cyber Attack on Infusion Software Hits 118,000 Patients

Industry News

Cyber Attack on Infusion Software Hits 118,000 Patients

SecuredyouadmSecuredyouadm—May 5, 20250
FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail
More stories

Google Cloud Unleashes Next-Gen AI Power with 6th-Gen TPUs

October 30, 2024

4 Educational Analyses of Data Downtime and Loss

March 1, 2024

New York Times Files Copyright Lawsuit Against OpenAI and Microsoft

December 29, 2023

Intensifying Competition Spurs M&A Surge in MDR and EDR Markets

February 21, 2025



A software developer in Maine, Endue Software, is alerting over 118,000 individuals about a potential data theft incident that took place in February. This breach, affecting users of their medication infusion therapy software, has already led to at least five proposed federal class action lawsuits. The company reported the breach to authorities by April 11, after discovering unauthorized access to its systems on February 17. An investigation revealed that an intruder had briefly accessed certain computer systems on February 16, during which files from internal systems were copied without authorization.

The stolen data varies among individuals but may include personal details such as full names, addresses, Social Security numbers, dates of birth, and medical record numbers. Despite the incident, Endue Software, which hosts its platform on Google’s Cloud, assures that its software complies with HIPAA and SOC 2 Type 1 standards, claiming robust security for patient data. Their platform is designed to integrate with various electronic medical records and pharmacy systems, including Epic, NextGen, Azalea, CareCloud, Meditab, and others.

One of the class action lawsuits accuses Endue of negligence in protecting sensitive information, arguing that the data breach exposes plaintiffs and class members to risks of identity theft and fraud. The plaintiffs are seeking financial compensation and demanding that Endue enhance its data security practices. The company has not yet responded to requests for more information about the breach or the legal actions it faces.

This incident is part of a broader trend of data breaches in the healthcare sector. As of the latest reports, the HHS Office for Civil Rights’ HIPAA Breach Reporting Tool lists 231 major health data breaches in 2025, affecting 20.3 million individuals. Notably, 84 of these breaches involve business associates, impacting nearly 8 million people, which is about 40% of the total affected individuals. Endue Software’s breach is currently the seventh largest involving a business associate this year.

The increase in data breaches highlights the pressing need for improved cybersecurity measures in the healthcare industry, especially for companies handling sensitive health information. As legal proceedings unfold, the case against Endue Software underscores the potential consequences of inadequate data protection and the vital importance of safeguarding personal and medical data against unauthorized access.

FacebookTwitterPinterestLinkedInTumblrRedditVKWhatsAppEmail

Securedyouadm

CISA Adds One Known Exploited Vulnerability to Catalog
Commvault Vulnerability CVE-2025-34028 Listed in CISA KEV Due to Confirmed Exploitation
Related posts
  • Related posts
  • More from author
Industry News

Chinese Hackers Breach U.S. Government Networks using Trimble Cityworks Vulnerability

May 22, 20250
Industry News

Unpatched Versa Concerto Vulnerabilities Allow Hackers to Break Free from Docker and Hijack Host

May 22, 20250
Industry News

Act Now: Critical Windows Server 2025 Vulnerability Puts Active Directory at Risk

May 22, 20250
Load more
Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Read also
Industry News

Chinese Hackers Breach U.S. Government Networks using Trimble Cityworks Vulnerability

May 22, 20250
Industry News

Unpatched Versa Concerto Vulnerabilities Allow Hackers to Break Free from Docker and Hijack Host

May 22, 20250
Threat Advisories

New Best Practices Guide for Securing AI Data Released

May 22, 20250
Careers

Cybersecurity Engineer (Top Secret Clearance Required)

May 22, 20250
Careers

Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

May 22, 20250
Careers

Cybersecurity Architect

May 22, 20250
Load more
Stay Social!
192Likes
4,500Followers
13Subscribers
46Followers
Recent posts
  • Chinese Hackers Breach U.S. Government Networks using Trimble Cityworks Vulnerability
  • Unpatched Versa Concerto Vulnerabilities Allow Hackers to Break Free from Docker and Hijack Host
  • New Best Practices Guide for Securing AI Data Released
  • Cybersecurity Engineer (Top Secret Clearance Required)
  • Cybersecurity Engineer, Littoral Combat Ship Software Support (San Diego, CA)

    # TRENDING

    how old is my computerhow old is my dell laptophow old is my HP laptophow old is my laptophow old is my toshiba laptophow to find computer ageverify computer agestar wars theme wallpapersThe Best Hacking Bookswiresharkusb device not found windows 10/11usb device not recognized windows 10/11 errorWhat is AIGPUSnifferuTorrentvulnerability scanner downloadWifi Hacking SoftwareWifi Hacking Appsolved windows 10/11 usb device not recognizedstar wars windows 7 theme downloadTwitter Account Security
    © Copyright Mister Cybersecurity LLC 2023, All Rights Reserved
    • About
    • Contact
    • Privacy
    • ToS
    • Disclosures