Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What You Need to Know about the QualDerm Partners Data Breach

QualDerm Partners, LLC is a healthcare management services provider headquartered in Brentwood, Tennessee. The company offers comprehensive administrative, clinical, and operational support to dermatology practices nationwide. QualDerm provides management resources, funding, and operational services, including patient records management, billing, insurance processing, and other essential services to improve efficiency and care quality across its network of clinics.

What You Need to Know about the Navia Benefit Solutions Data Breach

Navia Benefit Solutions, Inc. is a consumer-focused benefits administrator headquartered in Renton, Washington. Founded in 1989, the company provides comprehensive employee benefits administration services to more than 10,000 employers across the United States. Navia manages tax-advantaged healthcare and dependent care accounts, serving more than 1 million participants nationwide.

What You Need to Know about the Healthcare Interactive Data Breach

Healthcare Interactive, Inc., also known as HCIactive, is an Ellicott City, Maryland-based provider of AI-powered software solutions for insurance enrollment and benefits administration. Founded in 2006, the privately held company has fewer than 100 employees but serves healthcare organizations and insurers nationwide. As a HIPAA business associate, HCIactive processes and stores protected health information for multiple covered entities, giving it access to large volumes of sensitive patient data.

What You Need to Know about the LexisNexis Data Breach

LexisNexis Legal & Professional is a global provider of legal, regulatory, and business information used by lawyers, corporations, governments, and academic institutions. A division of RELX Group based in London, the company was founded in 1970 and is headquartered in Atlanta, Georgia. LexisNexis operates 40 offices worldwide with approximately 11,000 employees, serving customers in more than 180 countries.

What You Need to Know about the Stryker Cyberattack

Stryker Corporation is a Fortune 500 medical technology company headquartered in Kalamazoo, Michigan. Founded in 1941, Stryker manufactures surgical equipment, orthopedic implants, neurotechnology, hospital beds, and robotic surgery systems. The company employs approximately 56,000 people globally and reported over $25 billion in revenue for 2025. Stryker's products reach more than 150 million patients annually across 61 countries.

What You Need to Know about the Bell Ambulance Data Breach

Bell Ambulance, Inc. is the largest ambulance service provider in Wisconsin, headquartered in Milwaukee. Founded in 1977, the company operates a fleet of 86 ambulances from 11 stations and employs more than 750 medical professionals who respond to approximately 140,000 service calls annually throughout Milwaukee, Waukesha, and Racine counties in Southeastern Wisconsin. The company provides Basic Life Support, Advanced Life Support, and Critical Care transport services.

What You Need to Know about the Ericsson Data Breach

Ericsson Inc. is the U.S. subsidiary of Telefonaktiebolaget LM Ericsson, a Swedish multinational telecommunications company founded in 1876. Headquartered in Stockholm, the parent company is a global leader in mobile connectivity hardware, software, and services for telecommunications operators and enterprises. Ericsson specializes in 5G, 6G, Internet of Things, artificial intelligence, cloud computing, and serves public safety, utilities, manufacturing, government, and military sectors.

What You Need to Know about the University of Hawaii Cancer Center Data Breach

The University of Hawaii Cancer Center is the only National Cancer Institute-designated cancer center in Hawaii. Located in Honolulu, the center employs over 300 faculty and staff conducting critical epidemiological research studying cancer risks across diverse populations. In August 2025, the Cancer Center fell victim to a ransomware attack that exposed Social Security numbers of up to 1.15 million people.