Company Details
tmg-health
462
3,764
62
tmghealth.com
0
TMG_1593708
In-progress


TMG Health Company CyberSecurity Posture
tmghealth.comTMG Health is a leading national provider of expert solutions for Medicare Advantage, Medicare Part D and Managed Medicaid plans. With more than 19 years of experience of providing technology-enabled services to the government market exclusively, our knowledge of health plan processes, CMS requirements and the daily challenges plans face within the government market is second to none. Our expertise, coupled with a strong commitment to our Clients’ success, positions us as a trusted advisor and partner who can help solve the challenges of today and prepare for those of tomorrow. TMG Health has a legacy of serving both large and small health plans and Pharmacy Benefit Managers, across the nation. We offer a full range of tried and true solutions and can manage the processes for the complex Dual Eligible population. TMG Health understands our Clients’ needs for agile and scalable solutions that allow them to focus on member outcomes, revenues and growing competition. Our innovative solutions are built to keep pace with the changing needs of the government market and enable our Clients to stay competitive and successful.
Company Details
tmg-health
462
3,764
62
tmghealth.com
0
TMG_1593708
In-progress
Between 700 and 749

TMG Health Global Score (TPRM)XXXX

Description: VillageCareMAX Reports Data Breach Affecting Sensitive Patient Information VillageCareMAX, a healthcare provider, disclosed a data breach involving the potential exposure of sensitive personal and health information. The incident stemmed from unauthorized access to systems managed by TMG Health, Inc. (TMG), a third-party call center administrator contracted by VillageCareMAX. According to the breach notice, TMG detected the intrusion after an unauthorized individual gained access to VillageCareMAX-related data stored on TMG’s systems. The exposure window spanned nearly ten months, from November 20, 2024, to September 19, 2025. Following an investigation, TMG confirmed that compromised data may have included: - Full names - Social Security numbers - Member identification numbers - Protected health information VillageCareMAX began notifying affected individuals on January 13, 2026, via mailed breach notification letters. The notices detail the specific types of exposed data for each impacted person and include complimentary credit monitoring services. The breach was formally reported to the Massachusetts Attorney General’s office, with documentation available through the provided filing link. The full scope of affected individuals and the exact cause of the breach remain under review.
Description: BACH Reports Data Breach Affecting Sensitive Patient Information via Third-Party Vendor BACH, a healthcare provider, recently disclosed a data breach involving the potential exposure of sensitive personal and health information. The incident stemmed from a security compromise at TriZetto Provider Solutions (TPS), a third-party insurance clearinghouse integrated with BACH’s electronic medical record system (OCHIN). On October 2, 2025, TPS detected suspicious activity on a web portal used by its healthcare provider customers. Following an investigation, TPS confirmed to BACH that an unauthorized third party may have accessed data tied to BACH between November 2024 and October 2, 2025. BACH was formally notified of the breach on December 15, 2025. The compromised data varies by individual but may include: - Full names - Social Security numbers - Dates of birth - Contact details - Health and insurance-related information In response, BACH published a breach notice on its website, detailing the incident and offering affected individuals complimentary credit monitoring services. The notice includes a breakdown of the exposed data types for impacted parties. The breach highlights the risks of third-party vendor vulnerabilities in healthcare data security.
Description: CommuniCare+OLE Reports Data Breach Affecting Sensitive Patient Information CommuniCare+OLE, a healthcare provider, disclosed a data breach involving unauthorized access to sensitive personal and health information. On December 15, 2025, OCHIN CommuniCare+OLE’s electronic medical record system provider alerted the organization that an unauthorized individual had compromised a system managed by TriZetto, a third-party vendor. The breach prompted an investigation to assess the scope and impact. While details of the security incident remain undisclosed, affected data may include names, Social Security numbers, dates of birth, contact information, and health or insurance-related records. The exact information exposed varies by individual. CommuniCare+OLE has since begun notifying impacted individuals via mail, providing specifics on the compromised data. The breach notice filed with the California Attorney General’s office outlines the types of information potentially exposed. Further details can be found in the official notification documents.
Description: Petaluma Health Center Data Breach Exposes Sensitive Patient Information Petaluma Health Center recently disclosed a data breach affecting sensitive personal and health-related information of its patients. On December 15, 2025, the center was alerted by its electronic medical record system, OCHIN, that an unauthorized individual had accessed a system belonging to TriZetto, a third-party vendor working with OCHIN. TriZetto’s investigation confirmed that patient data linked to Petaluma Health Center may have been exposed during the breach. The compromised information varies by individual but includes names, Social Security numbers, dates of birth, contact details, and health or insurance-related data. In response, Petaluma Health Center began notifying affected individuals via mail, detailing the specific types of information impacted. The center and TriZetto are also offering complimentary credit monitoring services to those affected. The breach notice was filed with the California Attorney General’s office.
Description: Adapt Integrated Health Care Reports Third-Party Data Security Incident Adapt Integrated Health Care disclosed a data security incident involving TriZetto, a third-party vendor for its electronic medical record system provider, OCHIN. The breach was discovered on December 10, 2025, when OCHIN notified Adapt that an unauthorized individual had accessed one of TriZetto’s systems. TriZetto acted to halt the unauthorized activity and secure its systems. While Adapt’s internal systems were not directly breached, the incident may have exposed sensitive patient information. Not all patients were affected, and there is currently no evidence that the data has been misused. Potentially exposed data includes: - Names - Social Security numbers - Dates of birth - Contact information - Health-related and insurance details Adapt is collaborating with OCHIN to strengthen security measures and review its own processes to prevent future incidents. TriZetto plans to begin sending individual notification letters to affected patients in February 2026, with support from its vendor, Kroll, which will provide identity theft protection services, call center assistance, and credit monitoring enrollment instructions. For further details, patients may contact TriZetto’s dedicated call center at (844) 572-2724 or reach out to Heather Donohue, COO of TriZetto Provider Solutions, at (314) 802-6789.
Description: SFCHC Reports Data Breach Affecting Patient Information via Third-Party Vendor San Francisco Community Health Center (SFCHC) disclosed a data breach involving sensitive patient information, stemming from a security incident at one of its business associates. On December 12, 2025, SFCHC was alerted by OCHIN a vendor managing its electronic health record system that TriZetto Provider Solutions (TriZetto), a subcontractor handling healthcare eligibility and claims, had experienced unauthorized access to its systems. TriZetto’s investigation confirmed that an unauthorized third party may have accessed patient data linked to SFCHC between November 2024 and October 2, 2025. The exposed information varies by individual but includes names, Social Security numbers, addresses, dates of birth, and health insurance details such as member numbers, insurer names, and provider information. SFCHC has since reviewed the impacted data to identify affected individuals and began mailing breach notification letters. In compliance with California regulations, the notices outline the specific types of compromised information and offer complimentary credit monitoring services to those affected. The breach report filed with the California Attorney General’s office provides further details.
Description: TriZetto Provider Solutions Discloses Year-Long Data Breach Affecting Healthcare Clients TriZetto Provider Solutions, a Cognizant-owned revenue management services provider for healthcare organizations, has begun notifying healthcare clients about a cybersecurity incident involving unauthorized access to a web portal used by providers. The breach was first detected on October 2, 2025, when suspicious activity prompted immediate containment efforts. Cybersecurity firm Mandiant was engaged to investigate, confirming the threat actor had been removed from the system, with no further unauthorized access detected since the discovery. Forensic analysis revealed the breach had been ongoing since November 2024, nearly a year before detection. The attacker accessed historical eligibility transaction reports containing protected health information (PHI) of patients from affected healthcare clients. Exposed data includes names, addresses, dates of birth, Social Security numbers, health insurance member numbers (including Medicare beneficiary IDs), insurer details, and other demographic and health-related information though no financial data was compromised. TriZetto completed its review of the compromised data by late November 2025, identifying the affected individuals and notifying impacted healthcare clients. Under the HIPAA Breach Notification Rule, affected providers must notify individuals within 60 days of being informed, meaning patient notifications are expected by early 2026. TriZetto has offered to manage breach notifications, regulatory filings (including to the HHS’ Office for Civil Rights), and media disclosures on behalf of its clients, as well as cover costs for credit monitoring, fraud consultation, and identity theft restoration services. The full scope of the breach remains unclear, but given the 11-month window of unauthorized access, the incident could affect a significant number of patients. Updates are expected as further details emerge.
Description: The Cybernews research team came up with an open Kibana instance that contained private data on Belcan, its personnel, and internal systems. ElasticSearch's analytics and data search engine uses Kibana as a visualization dashboard. These systems aid businesses in managing massive data volumes. The leaked Belcan data includes Admin emails, Admin usernames, Admin roles (what organizations they’re assigned to), Internal network addresses, Internal infrastructure hostnames and IP addresses, Internal infrastructure vulnerabilities, and actions taken to remedy/not remedy them. Belcan was warned of the vulnerabilities by Cybernews, and before this article was published, the business had put precautions in place to deal with the problem. Before this story was published, Belcan did not send any additional remarks on the results.
Description: IT services provider Cognizant was hit by the Maze ransomware group in April 2020. The ransomware incident only impacted the internal network including supporting employees' work from home setups. The attack impacted its revenue by the range of $50 million to $70 million for the quarter,
Description: TriZetto Vendor Data Breach Exposes Patient Information in Third-Party Incident Adapt Integrated Health Care has disclosed a data breach involving TriZetto, a third-party vendor that provides electronic medical record services through OCHIN. The incident, first reported to Adapt on December 10, 2015, involved an unauthorized individual gaining access to one of TriZetto’s systems. Potentially compromised data includes names, Social Security numbers, dates of birth, contact details, health-related information, and insurance records. While not all patients were affected, TriZetto plans to begin sending individual notification letters in February 2026 to those impacted. Adapt confirmed that its internal systems were not breached the incident occurred at a subcontractor of one of its vendors. The organization is collaborating with OCHIN to strengthen security measures and review its own processes to prevent future risks. TriZetto has set up a dedicated call center (844-572-2724) and is working with vendor Kroll to provide notification services, call center support, and identity theft protection, including pre-paid credit monitoring for affected individuals. Additional updates may be sent by TriZetto or Kroll. The breach highlights the risks of third-party vendor vulnerabilities in healthcare data security.


TMG Health has 21.26% fewer incidents than the average of same-industry companies with at least one recorded incident.
TMG Health has 28.57% fewer incidents than the average of all companies with at least one recorded incident.
TMG Health reported 1 incidents this year: 0 cyber attacks, 0 ransomware, 0 vulnerabilities, 1 data breaches, compared to industry peers with at least 1 incident.
TMG Health cyber incidents detection timeline including parent company and subsidiaries

TMG Health is a leading national provider of expert solutions for Medicare Advantage, Medicare Part D and Managed Medicaid plans. With more than 19 years of experience of providing technology-enabled services to the government market exclusively, our knowledge of health plan processes, CMS requirements and the daily challenges plans face within the government market is second to none. Our expertise, coupled with a strong commitment to our Clients’ success, positions us as a trusted advisor and partner who can help solve the challenges of today and prepare for those of tomorrow. TMG Health has a legacy of serving both large and small health plans and Pharmacy Benefit Managers, across the nation. We offer a full range of tried and true solutions and can manage the processes for the complex Dual Eligible population. TMG Health understands our Clients’ needs for agile and scalable solutions that allow them to focus on member outcomes, revenues and growing competition. Our innovative solutions are built to keep pace with the changing needs of the government market and enable our Clients to stay competitive and successful.

Norton Healthcare is a leader in serving adult and pediatric patients from throughout Greater Louisville, Southern Indiana, the commonwealth of Kentucky and beyond. The not-for-profit hospital and health care system is Louisville’s second largest employer, with more than 18,600 employees, over 1,75

Beth Israel Lahey Health is a new, integrated system providing patients with better care wherever they are. Care informed by world-class research and education. We are doctors and nurses, technicians and social workers, innovators and educators, and so many others. All with a shared vision for what

A Rede D’Or é a maior rede de saúde da América Latina. São 79 hospitais e mais de 60 clínicas oncológicas com presença nos estados de AL, BA, CE, DF, MA, MG, MS, PA, PB, PE, PR, RJ, SE, SP. Referência em qualidade técnica, a Rede D’Or atua em serviços complementares como banco de sangue, diális
The Netcare Group (JSE: NTC) offers a unique, comprehensive range of medical services across the healthcare spectrum, enabling us to serve the health and care needs of each individual who entrust their care to us. Our focus on implementing sophisticated digital systems will enable us to provide care

At NewYork-Presbyterian, we put patients first. It’s the kind of work that requires an unwavering commitment to excellence and a steady spirit of professionalism. And it’s a unique opportunity for you to collaborate with some of the brightest minds in health care, while building on our success as on

UC San Diego Health and Health Sciences has been caring for the community for almost 60 years. In 1966, we established our first medical center. Two years later, in 1968, UC San Diego School of Medicine opened for business. Today, UC San Diego Health is the only academic health system in the San D
Community Health Systems is one of the nation’s leading healthcare providers. Developing and operating healthcare delivery systems across 14 states, CHS is committed to helping people get well and live healthier. CHS affiliates operate 70 acute-care hospitals and more than 1,000 other sites of care,

Driven by the vision of its Chairman, Dr. Prathap C. Reddy, the Apollo Hospitals Group pioneered corporate healthcare in India. Apollo revolutionized healthcare when Dr Prathap Reddy opened the first hospital in Chennai in 1983. Today Apollo is the world’s largest integrated healthcare platform wit

NMC Healthcare is one of the largest private healthcare networks in the United Arab Emirates. Since 1975, we have provided high quality, personalised, and compassionate care to our patients and are proud to have earned the trust of millions of people in the UAE and around the world. ---------------
.png)
Mid Michigan Medical Billing Service, a Flint, MI-based revenue cycle management company that provides billing support services to...
Strauss Borrelli PLLC, a leading data breach law firm, is investigating VillageCareMAX regarding its recent data breach.
An interview with Mayank Gandhi, Founder & CEO of TMG Security, High-Quality Affordable Cybersecurity Courses.
A wider range of services to primary healthcare customers and better regional coverage promised.
There was a 21.4% month-over-month increase in healthcare data breaches in August. 68 data breaches of 500 or more records were reported to...
TMG Health Inc. failed to protect the personal health information of more than 192000 people that was exposed in a June data breach,...
There was a 15.2% fall in reported data breaches in July with 56 breaches of 500 or more records reported to the HHS' Office for Civil Rights (OCR).
Cognizant has entered an agreement to acquire Health Care Service Corporation (HCSC) subsidiary TMG Health, a leading national provider of...

Explore insights on cybersecurity incidents, risk posture, and Rankiteo's assessments.
The official website of TMG Health is http://tmghealth.com.
According to Rankiteo, TMG Health’s AI-generated cybersecurity score is 700, reflecting their Moderate security posture.
According to Rankiteo, TMG Health currently holds 0 security badges, indicating that no recognized compliance certifications are currently verified for the organization.
According to Rankiteo, TMG Health has been affected by multiple supply chain cyber incidents. The affected supply chain sources and their corresponding incident IDs are:
According to Rankiteo, TMG Health is not certified under SOC 2 Type 1.
According to Rankiteo, TMG Health does not hold a SOC 2 Type 2 certification.
According to Rankiteo, TMG Health is not listed as GDPR compliant.
According to Rankiteo, TMG Health does not currently maintain PCI DSS compliance.
According to Rankiteo, TMG Health is not compliant with HIPAA regulations.
According to Rankiteo,TMG Health is not certified under ISO 27001, indicating the absence of a formally recognized information security management framework.
TMG Health operates primarily in the Hospitals and Health Care industry.
TMG Health employs approximately 462 people worldwide.
TMG Health presently has no subsidiaries across any sectors.
TMG Health’s official LinkedIn profile has approximately 3,764 followers.
TMG Health is classified under the NAICS code 62, which corresponds to Health Care and Social Assistance.
No, TMG Health does not have a profile on Crunchbase.
Yes, TMG Health maintains an official LinkedIn profile, which is actively utilized for branding and talent engagement, which can be accessed here: https://www.linkedin.com/company/tmg-health.
As of January 25, 2026, Rankiteo reports that TMG Health has experienced 10 cybersecurity incidents.
TMG Health has an estimated 31,617 peer or competitor companies worldwide.
Incident Types: The types of cybersecurity incidents that have occurred include Ransomware, Breach and Data Leak.
Total Financial Loss: The total financial loss from these incidents is estimated to be $50 million.
Detection and Response: The company detects and responds to cybersecurity incidents through an containment measures with precautions in place to deal with the problem, and incident response plan activated with yes, and third party assistance with mandiant (cybersecurity firm), and containment measures with immediate action to secure the web portal, and remediation measures with eradication of threat actor, forensic investigation, and system review, and recovery measures with review of compromised data and notification of affected clients, and communication strategy with notifications to affected healthcare clients, offer to handle breach notifications on their behalf, and third party assistance with tps launched an investigation, and remediation measures with review of impacted data, identification of affected individuals, and recovery measures with provision of complimentary credit monitoring services, and communication strategy with breach notice posted on bach's website, notification letters to affected individuals, and third party assistance with trizetto launched an investigation, and remediation measures with review of impacted data, identification of affected individuals, and mailing of data breach notification letters, and communication strategy with data breach notification letters mailed to impacted individuals; breach notice filed with the attorney general of california, and communication strategy with data breach notification letters mailed to impacted individuals, and third party assistance with kroll (identity theft protection services, call center assistance, credit monitoring), and containment measures with trizetto acted to halt the unauthorized activity and secure its systems, and remediation measures with strengthening security measures, reviewing processes, and communication strategy with individual notification letters to affected patients beginning february 2026, and communication strategy with notifying impacted individuals via mail, and third party assistance with kroll (notification services, call center support, identity theft protection), and remediation measures with strengthening security measures, reviewing processes, and communication strategy with dedicated call center (844-572-2724), notification letters starting february 2026, and third party assistance with trizetto (investigation), and remediation measures with notification to affected individuals, complimentary credit monitoring services, and communication strategy with mail notifications to affected individuals, breach notice filed with california attorney general’s office..
Title: Cognizant Ransomware Attack
Description: IT services provider Cognizant was hit by the Maze ransomware group in April 2020. The ransomware incident only impacted the internal network including supporting employees' work from home setups. The attack impacted its revenue by the range of $50 million to $70 million for the quarter.
Date Detected: April 2020
Type: Ransomware
Threat Actor: Maze ransomware group
Title: Belcan Data Leak via Open Kibana Instance
Description: The Cybernews research team discovered an open Kibana instance that contained private data on Belcan, its personnel, and internal systems.
Type: Data Leak
Attack Vector: Exposed Kibana Instance
Vulnerability Exploited: Unsecured Kibana Dashboard
Title: TriZetto Provider Solutions Data Breach
Description: TriZetto Provider Solutions, a Cognizant-owned provider of revenue management services to physicians, hospitals, and health systems, notified certain healthcare clients about a cybersecurity incident involving unauthorized access to a web portal used to access TriZetto systems. The breach involved the exposure of protected health information of patients of certain healthcare provider clients.
Date Detected: 2025-10-02
Date Publicly Disclosed: 2025-11-01
Date Resolved: 2025-11-30
Type: Data Breach
Attack Vector: Web Portal Compromise
Threat Actor: Unauthorized Third Party
Title: BACH Data Breach Involving TriZetto Provider Solutions
Description: BACH experienced a data breach where sensitive personal identifiable information and protected health information may have been compromised. The breach involved TriZetto Provider Solutions (TPS), a third-party insurance clearinghouse, which reported suspicious activity in its web portal used by healthcare providers. Unauthorized access occurred between November 2024 and October 2, 2025, exposing personal and health-related data.
Date Detected: 2025-10-02
Date Publicly Disclosed: 2025-12-15
Type: Data Breach
Attack Vector: Third-party web portal compromise
Threat Actor: Unauthorized third party
Title: SFCHC Data Breach Involving TriZetto Provider Solutions
Description: SFCHC reported a data breach where sensitive personal identifiable information and protected health information may have been compromised. The breach was discovered through a notification from OCHIN, SFCHC’s business associate, regarding a security incident involving TriZetto Provider Solutions, a subcontractor of OCHIN. Unauthorized access to sensitive data related to SFCHC patients occurred between November 2024 and October 2, 2025.
Date Detected: 2025-12-12
Type: Data Breach
Attack Vector: Third-Party Compromise
Threat Actor: Unauthorized Third Party
Title: VillageCareMAX Data Breach via Third-Party Administrator TMG Health, Inc.
Description: VillageCareMAX reported a data breach where sensitive personal identifiable information and protected health information may have been compromised. The breach occurred through TMG Health, Inc., a third-party administrator providing call center services, after an unauthorized individual gained access to VillageCareMAX information stored in TMG’s systems.
Date Detected: 2025-09-19
Date Publicly Disclosed: 2026-01-13
Type: Data Breach
Attack Vector: Third-Party Compromise
Threat Actor: Unauthorized Individual
Title: Adapt Integrated Health Care Third-Party Data Security Incident
Description: Adapt Integrated Health Care disclosed a data security incident involving TriZetto, a third-party vendor for its electronic medical record system provider, OCHIN. The breach was discovered when OCHIN notified Adapt that an unauthorized individual had accessed one of TriZetto’s systems. TriZetto acted to halt the unauthorized activity and secure its systems. While Adapt’s internal systems were not directly breached, the incident may have exposed sensitive patient information.
Date Detected: 2025-12-10
Type: Data Breach
Attack Vector: Third-Party Vendor Compromise
Threat Actor: Unauthorized Individual
Title: CommuniCare+OLE Data Breach Affecting Sensitive Patient Information
Description: CommuniCare+OLE, a healthcare provider, disclosed a data breach involving unauthorized access to sensitive personal and health information. An unauthorized individual compromised a system managed by TriZetto, a third-party vendor, leading to potential exposure of names, Social Security numbers, dates of birth, contact information, and health or insurance-related records.
Date Detected: 2025-12-15
Type: Data Breach
Attack Vector: Third-party vendor compromise
Title: TriZetto Vendor Data Breach Exposes Patient Information in Third-Party Incident
Description: Adapt Integrated Health Care disclosed a data breach involving TriZetto, a third-party vendor providing electronic medical record services through OCHIN. An unauthorized individual gained access to one of TriZetto’s systems, potentially compromising patient information.
Date Detected: 2015-12-10
Type: Data Breach
Attack Vector: Unauthorized system access
Title: Petaluma Health Center Data Breach Exposes Sensitive Patient Information
Description: Petaluma Health Center recently disclosed a data breach affecting sensitive personal and health-related information of its patients. On December 15, 2025, the center was alerted by its electronic medical record system, OCHIN, that an unauthorized individual had accessed a system belonging to TriZetto, a third-party vendor working with OCHIN. TriZetto’s investigation confirmed that patient data linked to Petaluma Health Center may have been exposed during the breach. The compromised information varies by individual but includes names, Social Security numbers, dates of birth, contact details, and health or insurance-related data.
Date Detected: 2025-12-15
Type: Data Breach
Attack Vector: Third-party vendor compromise
Common Attack Types: The most common types of attacks the company has faced is Breach.
Identification of Attack Vectors: The company identifies the attack vectors used in incidents through Open Kibana Instance, Web portal and TPS web portal.

Financial Loss: $50 million to $70 million
Systems Affected: Internal network including supporting employees' work from home setups
Revenue Loss: $50 million to $70 million

Data Compromised: Admin emails, Admin usernames, Admin roles, Internal network addresses, Internal infrastructure hostnames and ip addresses, Internal infrastructure vulnerabilities, Actions taken to remedy/not remedy them
Systems Affected: Internal Systems

Data Compromised: Protected Health Information (PHI)
Systems Affected: Web portal used by healthcare provider customers
Operational Impact: Mitigation and investigation efforts required
Brand Reputation Impact: Potential reputational damage to TriZetto and affected healthcare providers
Legal Liabilities: Potential HIPAA violations and regulatory fines
Identity Theft Risk: High (due to exposure of SSNs, Medicare numbers, and other PII)
Payment Information Risk: None (no financial information exposed)

Data Compromised: Sensitive personal identifiable information and protected health information
Systems Affected: TriZetto Provider Solutions (TPS) web portal, OCHIN electronic medical record system
Brand Reputation Impact: Potential reputational damage due to data breach
Identity Theft Risk: High (due to exposure of SSNs and personal data)

Data Compromised: Sensitive personal identifiable information and protected health information
Systems Affected: TriZetto Provider Solutions systems (healthcare eligibility and claims clearinghouse)
Identity Theft Risk: High

Data Compromised: Sensitive personal identifiable information and protected health information
Systems Affected: TMG Health, Inc. information systems
Identity Theft Risk: High

Data Compromised: Sensitive patient information
Systems Affected: TriZetto’s systems (third-party vendor)
Identity Theft Risk: Yes

Data Compromised: Sensitive personal and health information
Systems Affected: Electronic medical record system
Identity Theft Risk: High

Data Compromised: Names, Social Security numbers, dates of birth, contact details, health-related information, insurance records
Systems Affected: TriZetto’s systems (third-party vendor)
Identity Theft Risk: High

Data Compromised: Sensitive personal and health-related information
Systems Affected: TriZetto's system (third-party vendor for OCHIN)
Identity Theft Risk: High
Average Financial Loss: The average financial loss per incident is $5.00 million.
Commonly Compromised Data Types: The types of data most commonly compromised in incidents are Admin Emails, Admin Usernames, Admin Roles, Internal Network Addresses, Internal Infrastructure Hostnames And Ip Addresses, Internal Infrastructure Vulnerabilities, Actions Taken To Remedy/Not Remedy Them, , Names, Addresses, Dates Of Birth, Social Security Numbers, Health Insurance Member Numbers, Medicare Beneficiary Numbers, Health Insurer Names, Demographic Health Information, Health Insurance Information, , Personal Identifiable Information (Pii), Protected Health Information (Phi), , Personal Identifiable Information, Protected Health Information, , Personal Identifiable Information, Protected Health Information, , Names, Social Security Numbers, Dates Of Birth, Contact Information, Health-Related Details, Insurance Details, , Names, Social Security Numbers, Dates Of Birth, Contact Information, Health Records, Insurance-Related Records, , Patient information, Names, Social Security Numbers, Dates Of Birth, Contact Details, Health Or Insurance-Related Data and .

Entity Name: Cognizant
Entity Type: IT services provider
Industry: Information Technology

Entity Name: TriZetto Provider Solutions
Entity Type: Business Associate (Healthcare Revenue Management Services)
Industry: Healthcare IT
Customers Affected: Healthcare provider clients (physicians, hospitals, health systems)

Entity Name: BACH
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: Individuals whose data was exposed

Entity Name: TriZetto Provider Solutions (TPS)
Entity Type: Third-party insurance clearinghouse
Industry: Healthcare IT
Customers Affected: Healthcare provider customers, including BACH

Entity Name: San Francisco Community Health Center (SFCHC)
Entity Type: Healthcare Provider
Industry: Healthcare
Location: San Francisco, California, USA
Customers Affected: Patients of SFCHC

Entity Name: TriZetto Provider Solutions
Entity Type: Healthcare Clearinghouse
Industry: Healthcare IT

Entity Name: OCHIN
Entity Type: Business Associate
Industry: Healthcare IT

Entity Name: VillageCareMAX
Entity Type: Healthcare Provider
Industry: Healthcare
Location: United States
Customers Affected: Patients

Entity Name: Adapt Integrated Health Care
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: Not all patients (subset of patients)

Entity Name: TriZetto
Entity Type: Third-Party Vendor
Industry: Healthcare IT

Entity Name: OCHIN
Entity Type: Electronic Medical Record System Provider
Industry: Healthcare IT

Entity Name: CommuniCare+OLE
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: Unknown (varies by individual)

Entity Name: Adapt Integrated Health Care
Entity Type: Healthcare Provider
Industry: Healthcare
Customers Affected: Potentially some patients (not all)

Entity Name: TriZetto
Entity Type: Third-Party Vendor
Industry: Healthcare IT

Entity Name: OCHIN
Entity Type: Subcontractor/Vendor
Industry: Healthcare IT

Entity Name: Petaluma Health Center
Entity Type: Healthcare Provider
Industry: Healthcare
Location: Petaluma, California, USA
Customers Affected: Patients

Containment Measures: Precautions in place to deal with the problem

Incident Response Plan Activated: Yes
Third Party Assistance: Mandiant (cybersecurity firm)
Containment Measures: Immediate action to secure the web portal
Remediation Measures: Eradication of threat actor, forensic investigation, and system review
Recovery Measures: Review of compromised data and notification of affected clients
Communication Strategy: Notifications to affected healthcare clients, offer to handle breach notifications on their behalf

Third Party Assistance: TPS launched an investigation
Remediation Measures: Review of impacted data, identification of affected individuals
Recovery Measures: Provision of complimentary credit monitoring services
Communication Strategy: Breach notice posted on BACH's website, notification letters to affected individuals

Third Party Assistance: TriZetto launched an investigation
Remediation Measures: Review of impacted data, identification of affected individuals, and mailing of data breach notification letters
Communication Strategy: Data breach notification letters mailed to impacted individuals; breach notice filed with the Attorney General of California

Communication Strategy: Data breach notification letters mailed to impacted individuals

Third Party Assistance: Kroll (identity theft protection services, call center assistance, credit monitoring)
Containment Measures: TriZetto acted to halt the unauthorized activity and secure its systems
Remediation Measures: Strengthening security measures, reviewing processes
Communication Strategy: Individual notification letters to affected patients beginning February 2026

Communication Strategy: Notifying impacted individuals via mail

Third Party Assistance: Kroll (notification services, call center support, identity theft protection)
Remediation Measures: Strengthening security measures, reviewing processes
Communication Strategy: Dedicated call center (844-572-2724), notification letters starting February 2026

Third Party Assistance: TriZetto (investigation)
Remediation Measures: Notification to affected individuals, complimentary credit monitoring services
Communication Strategy: Mail notifications to affected individuals, breach notice filed with California Attorney General’s office
Incident Response Plan: The company's incident response plan is described as Yes.
Third-Party Assistance: The company involves third-party assistance in incident response through Mandiant (cybersecurity firm), TPS launched an investigation, TriZetto launched an investigation, Kroll (identity theft protection services, call center assistance, credit monitoring), Kroll (notification services, call center support, identity theft protection), TriZetto (investigation).

Type of Data Compromised: Admin emails, Admin usernames, Admin roles, Internal network addresses, Internal infrastructure hostnames and ip addresses, Internal infrastructure vulnerabilities, Actions taken to remedy/not remedy them

Type of Data Compromised: Names, Addresses, Dates of birth, Social security numbers, Health insurance member numbers, Medicare beneficiary numbers, Health insurer names, Demographic health information, Health insurance information
Sensitivity of Data: High (Protected Health Information and Personally Identifiable Information)
File Types Exposed: Eligibility transaction reports
Personally Identifiable Information: Yes

Type of Data Compromised: Personal identifiable information (pii), Protected health information (phi)
Sensitivity of Data: High (SSNs, health/insurance information)
Personally Identifiable Information: NameSocial Security numberDate of birthContact information

Type of Data Compromised: Personal identifiable information, Protected health information
Sensitivity of Data: High
Personally Identifiable Information: NameSocial Security numberAddressDate of birthHealth insurance information (member number, health insurer name, provider name, primary insured and dependents)

Type of Data Compromised: Personal identifiable information, Protected health information
Sensitivity of Data: High
Personally Identifiable Information: NameSocial Security numberMember numberHealth information

Type of Data Compromised: Names, Social security numbers, Dates of birth, Contact information, Health-related details, Insurance details
Sensitivity of Data: High (Personally Identifiable Information and Protected Health Information)
Personally Identifiable Information: Yes

Type of Data Compromised: Names, Social security numbers, Dates of birth, Contact information, Health records, Insurance-related records
Sensitivity of Data: High
Personally Identifiable Information: Yes

Type of Data Compromised: Patient information
Sensitivity of Data: High (PII, health records, SSNs)
Personally Identifiable Information: Names, Social Security numbers, dates of birth, contact details, insurance records

Type of Data Compromised: Names, Social security numbers, Dates of birth, Contact details, Health or insurance-related data
Sensitivity of Data: High
Personally Identifiable Information: Yes
Prevention of Data Exfiltration: The company takes the following measures to prevent data exfiltration: Eradication of threat actor, forensic investigation, and system review, Review of impacted data, identification of affected individuals, Review of impacted data, identification of affected individuals, and mailing of data breach notification letters, Strengthening security measures, reviewing processes, Strengthening security measures, reviewing processes, Notification to affected individuals, complimentary credit monitoring services.
Handling of PII Incidents: The company handles incidents involving personally identifiable information (PII) through by precautions in place to deal with the problem, immediate action to secure the web portal and trizetto acted to halt the unauthorized activity and secure its systems.

Ransomware Strain: Maze
Data Recovery from Ransomware: The company recovers data encrypted by ransomware through Review of compromised data and notification of affected clients, Provision of complimentary credit monitoring services.

Regulations Violated: HIPAA Breach Notification Rule,
Regulatory Notifications: HHS’ Office for Civil Rights, state regulators, and media outlets (offered by TriZetto)

Regulations Violated: HIPAA (potential),

Regulations Violated: HIPAA,
Regulatory Notifications: Breach notice filed with the Attorney General of California

Regulations Violated: HIPAA,
Regulatory Notifications: Attorney General of the Commonwealth of Massachusetts

Regulations Violated: HIPAA,
Regulatory Notifications: Filed with the California Attorney General’s office

Regulations Violated: HIPAA (potential),
Regulatory Notifications: California Attorney General’s office

Lessons Learned: Highlights risks of third-party vendor vulnerabilities in healthcare data security

Recommendations: Provision of complimentary credit monitoring services to affected individuals

Recommendations: Providing complimentary credit monitoring services to affected individuals
Key Lessons Learned: The key lessons learned from past incidents are Highlights risks of third-party vendor vulnerabilities in healthcare data security.
Implemented Recommendations: The company has implemented the following recommendations to improve cybersecurity: Providing complimentary credit monitoring services to affected individuals and Provision of complimentary credit monitoring services to affected individuals.

Source: Cybernews

Source: HIPAA Journal

Source: BACH Breach Notice

Source: Attorney General of California Breach Notice

Source: Attorney General of the Commonwealth of Massachusetts

Source: Adapt Integrated Health Care Disclosure

Source: California Attorney General’s office

Source: Incident disclosure by Adapt Integrated Health Care

Source: Petaluma Health Center Breach Notice
Additional Resources: Stakeholders can find additional resources on cybersecurity best practices at and Source: Cybernews, and Source: HIPAA Journal, and Source: BACH Breach Notice, and Source: Attorney General of California Breach Notice, and Source: Attorney General of the Commonwealth of Massachusetts, and Source: Adapt Integrated Health Care Disclosure, and Source: California Attorney General’s office, and Source: Incident disclosure by Adapt Integrated Health Care, and Source: Petaluma Health Center Breach Notice.

Investigation Status: Resolved

Investigation Status: Completed (forensic investigation concluded)

Investigation Status: Ongoing (as of disclosure)

Investigation Status: Ongoing

Investigation Status: Completed

Investigation Status: Ongoing

Investigation Status: Ongoing

Investigation Status: Ongoing
Communication of Investigation Status: The company communicates the status of incident investigations to stakeholders through Notifications to affected healthcare clients, offer to handle breach notifications on their behalf, Breach notice posted on BACH's website, notification letters to affected individuals, Data breach notification letters mailed to impacted individuals; breach notice filed with the Attorney General of California, Data breach notification letters mailed to impacted individuals, Individual notification letters to affected patients beginning February 2026, Notifying impacted individuals via mail, Dedicated call center (844-572-2724), notification letters starting February 2026, Mail notifications to affected individuals and breach notice filed with California Attorney General’s office.

Stakeholder Advisories: Notifications to affected healthcare clients with lists of affected individuals and compromised data
Customer Advisories: Offer to handle breach notifications for affected individuals, including credit monitoring and identity theft restoration services

Customer Advisories: Affected individuals notified with details of exposed data and offered credit monitoring services

Customer Advisories: Data breach notification letters mailed to impacted individuals with details of the incident and complimentary credit monitoring services

Customer Advisories: Data breach notification letters with details of impacted information

Customer Advisories: Patients may contact TriZetto’s dedicated call center at (844) 572-2724 or Heather Donohue, COO of TriZetto Provider Solutions, at (314) 802-6789 for further details.

Customer Advisories: Notifying impacted individuals via mail with specifics on compromised data

Customer Advisories: Notification letters to be sent starting February 2026, call center support available

Customer Advisories: Mail notifications to affected individuals
Advisories Provided: The company provides the following advisories to stakeholders and customers following an incident: were Notifications to affected healthcare clients with lists of affected individuals and compromised data, Offer to handle breach notifications for affected individuals, including credit monitoring and identity theft restoration services, Affected individuals notified with details of exposed data and offered credit monitoring services, Data breach notification letters mailed to impacted individuals with details of the incident and complimentary credit monitoring services, Data breach notification letters with details of impacted information, Patients may contact TriZetto’s dedicated call center at (844) 572-2724 or Heather Donohue, COO of TriZetto Provider Solutions, at (314) 802-6789 for further details., Notifying impacted individuals via mail with specifics on compromised data, Notification letters to be sent starting February 2026, call center support available and Mail notifications to affected individuals.

Entry Point: Open Kibana Instance

Entry Point: Web portal
Reconnaissance Period: November 2024 to October 2025
High Value Targets: Historical eligibility transaction reports containing PHI
Data Sold on Dark Web: Historical eligibility transaction reports containing PHI

Entry Point: TPS web portal

Root Causes: Unsecured Kibana Dashboard
Corrective Actions: Precautions in place to deal with the problem

Root Causes: Unauthorized access to web portal and prolonged undetected access to historical reports
Corrective Actions: Enhanced security measures (details not specified)

Root Causes: Third-party vendor compromise (TPS web portal vulnerability)

Root Causes: Unauthorized access to third-party systems (TMG Health, Inc.)

Root Causes: Third-party vendor vulnerability (TriZetto system access)
Corrective Actions: Strengthening security measures, reviewing processes with OCHIN
Post-Incident Analysis Process: The company's process for conducting post-incident analysis is described as Mandiant (cybersecurity firm), TPS launched an investigation, TriZetto launched an investigation, Kroll (identity theft protection services, call center assistance, credit monitoring), Kroll (notification services, call center support, identity theft protection), TriZetto (investigation).
Corrective Actions Taken: The company has taken the following corrective actions based on post-incident analysis: Precautions in place to deal with the problem, Enhanced security measures (details not specified), Strengthening security measures, reviewing processes with OCHIN.
Last Attacking Group: The attacking group in the last incident were an Maze ransomware group, Unauthorized Third Party, Unauthorized third party, Unauthorized Third Party, Unauthorized Individual and Unauthorized Individual.
Most Recent Incident Detected: The most recent incident detected was on April 2020.
Most Recent Incident Publicly Disclosed: The most recent incident publicly disclosed was on 2026-01-13.
Most Recent Incident Resolved: The most recent incident resolved was on 2025-11-30.
Highest Financial Loss: The highest financial loss from an incident was $50 million to $70 million.
Most Significant Data Compromised: The most significant data compromised in an incident were Admin emails, Admin usernames, Admin roles, Internal network addresses, Internal infrastructure hostnames and IP addresses, Internal infrastructure vulnerabilities, Actions taken to remedy/not remedy them, , Protected Health Information (PHI), Sensitive personal identifiable information and protected health information, Sensitive personal identifiable information and protected health information, Sensitive personal identifiable information and protected health information, Sensitive patient information, Sensitive personal and health information, Names, Social Security numbers, dates of birth, contact details, health-related information, insurance records and Sensitive personal and health-related information.
Third-Party Assistance in Most Recent Incident: The third-party assistance involved in the most recent incident was Mandiant (cybersecurity firm), TPS launched an investigation, TriZetto launched an investigation, Kroll (identity theft protection services, call center assistance, credit monitoring), Kroll (notification services, call center support, identity theft protection), TriZetto (investigation).
Containment Measures in Most Recent Incident: The containment measures taken in the most recent incident were Precautions in place to deal with the problem, Immediate action to secure the web portal and TriZetto acted to halt the unauthorized activity and secure its systems.
Most Sensitive Data Compromised: The most sensitive data compromised in a breach were Names, Social Security numbers, dates of birth, contact details, health-related information, insurance records, Admin roles, Admin usernames, Sensitive patient information, Internal infrastructure hostnames and IP addresses, Internal infrastructure vulnerabilities, Admin emails, Sensitive personal identifiable information and protected health information, Sensitive personal and health-related information, Sensitive personal and health information, Internal network addresses, Protected Health Information (PHI) and Actions taken to remedy/not remedy them.
Most Significant Lesson Learned: The most significant lesson learned from past incidents was Highlights risks of third-party vendor vulnerabilities in healthcare data security.
Most Significant Recommendation Implemented: The most significant recommendation implemented to improve cybersecurity was Providing complimentary credit monitoring services to affected individuals and Provision of complimentary credit monitoring services to affected individuals.
Most Recent Source: The most recent source of information about an incident are Adapt Integrated Health Care Disclosure, Cybernews, HIPAA Journal, BACH Breach Notice, California Attorney General’s office, Attorney General of California Breach Notice, Petaluma Health Center Breach Notice, Attorney General of the Commonwealth of Massachusetts and Incident disclosure by Adapt Integrated Health Care.
Current Status of Most Recent Investigation: The current status of the most recent investigation is Resolved.
Most Recent Stakeholder Advisory: The most recent stakeholder advisory issued was Notifications to affected healthcare clients with lists of affected individuals and compromised data, .
Most Recent Customer Advisory: The most recent customer advisory issued were an Offer to handle breach notifications for affected individuals, including credit monitoring and identity theft restoration services, Affected individuals notified with details of exposed data and offered credit monitoring services, Data breach notification letters mailed to impacted individuals with details of the incident and complimentary credit monitoring services, Data breach notification letters with details of impacted information, Patients may contact TriZetto’s dedicated call center at (844) 572-2724 or Heather Donohue, COO of TriZetto Provider Solutions, at (314) 802-6789 for further details., Notifying impacted individuals via mail with specifics on compromised data, Notification letters to be sent starting February 2026, call center support available and Mail notifications to affected individuals.
Most Recent Entry Point: The most recent entry point used by an initial access broker were an Open Kibana Instance, Web portal and TPS web portal.
Most Recent Reconnaissance Period: The most recent reconnaissance period for an incident was November 2024 to October 2025.
Most Significant Root Cause: The most significant root cause identified in post-incident analysis was Unsecured Kibana Dashboard, Unauthorized access to web portal and prolonged undetected access to historical reports, Third-party vendor compromise (TPS web portal vulnerability), Unauthorized access to third-party systems (TMG Health, Inc.), Third-party vendor vulnerability (TriZetto system access).
Most Significant Corrective Action: The most significant corrective action taken based on post-incident analysis was Precautions in place to deal with the problem, Enhanced security measures (details not specified), Strengthening security measures, reviewing processes with OCHIN.
.png)
Typemill is a flat-file, Markdown-based CMS designed for informational documentation websites. A reflected Cross-Site Scripting (XSS) exists in the login error view template `login.twig` of versions 2.19.1 and below. The `username` value can be echoed back without proper contextual encoding when authentication fails. An attacker can execute script in the login page context. This issue has been fixed in version 2.19.2.
A DOM-based Cross-Site Scripting (XSS) vulnerability exists in the DomainCheckerApp class within domain/script.js of Sourcecodester Domain Availability Checker v1.0. The vulnerability occurs because the application improperly handles user-supplied data in the createResultElement method by using the unsafe innerHTML property to render domain search results.
A Remote Code Execution (RCE) vulnerability exists in Sourcecodester Modern Image Gallery App v1.0 within the gallery/upload.php component. The application fails to properly validate uploaded file contents. Additionally, the application preserves the user-supplied file extension during the save process. This allows an unauthenticated attacker to upload arbitrary PHP code by spoofing the MIME type as an image, leading to full system compromise.
A UNIX symbolic link following issue in the jailer component in Firecracker version v1.13.1 and earlier and 1.14.0 on Linux may allow a local host user with write access to the pre-created jailer directories to overwrite arbitrary host files via a symlink attack during the initialization copy at jailer startup, if the jailer is executed with root privileges. To mitigate this issue, users should upgrade to version v1.13.2 or 1.14.1 or above.
An information disclosure vulnerability exists in the /srvs/membersrv/getCashiers endpoint of the Aptsys gemscms backend platform thru 2025-05-28. This unauthenticated endpoint returns a list of cashier accounts, including names, email addresses, usernames, and passwords hashed using MD5. As MD5 is a broken cryptographic function, the hashes can be easily reversed using public tools, exposing user credentials in plaintext. This allows remote attackers to perform unauthorized logins and potentially gain access to sensitive POS operations or backend functions.

Get company history
Every week, Rankiteo analyzes billions of signals to give organizations a sharper, faster view of emerging risks. With deeper, more actionable intelligence at their fingertips, security teams can outpace threat actors, respond instantly to Zero-Day attacks, and dramatically shrink their risk exposure window.
Identify exposed access points, detect misconfigured SSL certificates, and uncover vulnerabilities across the network infrastructure.
Gain visibility into the software components used within an organization to detect vulnerabilities, manage risk, and ensure supply chain security.
Monitor and manage all IT assets and their configurations to ensure accurate, real-time visibility across the company's technology environment.
Leverage real-time insights on active threats, malware campaigns, and emerging vulnerabilities to proactively defend against evolving cyberattacks.