wp-plugin-hostgator
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114ol-scrapes
domain was triggered too early. This is usually an indicator for some code in the plugin or theme running too early. Translations should be loaded at the init
action or later. Please see Debugging in WordPress for more information. (This message was added in version 6.7.0.) in /home4/scienrds/scienceandnerds/wp-includes/functions.php on line 6114Source:https:\/\/techcrunch.com\/2023\/05\/08\/nextgen-healthcare-data-breach\/<\/a><\/br> NextGen Healthcare, a U.S.-based provider of electronic health record<\/a> software, admitted that hackers breached its systems and stole the personal data of more than 1 million patients.<\/span><\/p>\n In a data breach notification<\/a> filed with the Maine attorney general\u2019s office, NextGen Healthcare confirmed that hackers accessed the personal data of 1.05 million patients, including approximately 4,000 Maine residents. In a letter sent to those affected, NextGen Healthcare said that hackers stole patients\u2019 names, dates of birth, addresses and Social Security numbers.<\/p>\n \u201cImportantly, our investigation has revealed no evidence of any access or impact to any of your health or medical records or any health or medical data,\u201d the company added. TechCrunch asked NextGen Healthcare whether it has the means, such as logs, to determine what data was exfiltrated, but company spokesperson Tami Andrade declined to answer.<\/p>\n In its filing with Maine\u2019s AG, NextGen Healthcare said it was alerted to suspicious activity on March 30, and later determined that hackers had access to its systems between March 29 and April 14, 2023.\u00a0<\/span>The notification says that the attackers gained access to its NextGen Office system \u2014 <\/span>a cloud-based EHR and practice management solution \u2014<\/span> using client credentials that \u201cappear to have been stolen from other sources or incidents unrelated to NextGen.\u201d\u00a0<\/span><\/p>\n \u201cWhen we learned of the incident, we took steps to investigate and remediate, including working together with leading outside cybersecurity experts and notifying law enforcement,\u201d Andrade told TechCrunch in a statement. \u201cThe individuals known to be impacted by this incident were notified on April 28, 2023, and we have offered them 24 months of free fraud detection and identity theft protection.\u201d<\/p>\n NextGen was also the victim of a ransomware<\/a> attack in January this year, according to reports,<\/a> which was claimed by the ALPHV ransomware gang, also known as BlackCat. A listing on ALPHV\u2019s dark web leak site, seen by TechCrunch, shows samples of the stolen data, including employee names, addresses, phone numbers and passport scans.\u00a0<\/span><\/p>\n News of NextGen\u2019s latest breach comes as the number of patients impacted by the mass ransomware attack<\/a> targeting customers who used Fortra\u2019s GoAnywhere file-transfer software continues to grow<\/a>. Florida-based technology company NationBenefits confirmed last week<\/a> that more than 3 million members had data stolen in the cyberattack, while Brightline, a virtual therapy provider for children, said that more than 960,000 of the company\u2019s pediatric mental health patients had data stolen.\u00a0<\/span><\/p>\n
\nNextGen Healthcare says hackers accessed personal data of more than 1 million patients<\/br>
\n2023-05-08 22:00:01<\/br><\/p>\n