Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Attacks/Breaches

11/19/2020
06:30 PM
50%
50%

Iowa Hospital Alerts 60K Individuals Affected by June Data Breach

The data breach began with a compromised employee email account.

Mercy Iowa City hospital this week reported that an internal email compromise and phishing email incident led to the exposure of personal information of some 60,473 individuals.

Related Content:

Teach Your Employees Well: How to Spot Smishing & Vishing Scams

The Changing Face of Threat Intelligence

New on The Edge: ISP Security: Do We Expect Too Much?

An attacker had compromised a hospital employee's email account and sent out phishing emails between May 15 and June 24, 2020. This ultimately led to the exposure of recipients' names, Social Security numbers, driver's license numbers, dates of birth, medical treatment information, and health insurance data. The hospital said in a letter to the affected individuals that it was not aware of any instances of fraud or identity theft as a result of the breach.

Mercy Iowa City is offering 12 months of free credit monitoring and identity theft protection for individuals whose SSNs or driver's license numbers were affected.

Read more here.

 

Dark Reading's Quick Hits delivers a brief synopsis and summary of the significance of breaking news events. For more information from the original source of the news item, please follow the link provided in this article. View Full Bio
 

Recommended Reading:

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Why Vulnerable Code Is Shipped Knowingly
Chris Eng, Chief Research Officer, Veracode,  11/30/2020
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2020-29529
PUBLISHED: 2020-12-03
HashiCorp go-slug before 0.5.0 does not address attempts at directory traversal involving ../ and symlinks.
CVE-2020-29534
PUBLISHED: 2020-12-03
An issue was discovered in the Linux kernel before 5.9.3. io_uring takes a non-refcounted reference to the files_struct of the process that submitted a request, causing execve() to incorrectly optimize unshare_fd(), aka CID-0f2122045b94.
CVE-2020-17527
PUBLISHED: 2020-12-03
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this woul...
CVE-2020-23736
PUBLISHED: 2020-12-03
There is a local denial of service vulnerability in DaDa accelerator 5.6.19.816,, attackers can use constructed programs to cause computer crashes (BSOD).
CVE-2020-23738
PUBLISHED: 2020-12-03
There is a local denial of service vulnerability in Advanced SystemCare 13 PRO 13.5.0.174. Attackers can use a constructed program to cause a computer crash (BSOD)