Humana breach exposes sensitive patient data

From the Editor’s Desk

Security teams are facing a steady rise in breaches linked to third-party access and internal mistakes rather than advanced exploits. The pattern is clear: basic controls are still failing at scale. The question is no longer about having security tools, but about how well they are configured and monitored over time.

🔎 Deep Brief

Humana breach exposes sensitive patient data

Humana has confirmed a data breach linked to unauthorized access in August 2025, affecting an undisclosed number of individuals. The exposed data includes names, Social Security numbers, medical billing and claims information, dates of service, provider names, Humana ID numbers, patient account numbers, and health insurance details. Its subsidiary CenterWell has also begun notifying affected individuals. At least 4,618 people in Texas were impacted, based on filings with the state attorney general.

The breach has already led to a class-action lawsuit, with claims that both organizations failed to protect patient data. Cl0p has claimed responsibility and listed Humana on its leak site, although the company has not confirmed this link. According to Humana, the breach stemmed from a vulnerability in a vendor’s software, again pointing to third-party risk as a weak link in enterprise security.

Humana is offering affected individuals 24 months of credit monitoring and identity restoration services through Equifax, with enrollment open until March 31, 2027.

Takeaway

Third-party software vulnerabilities continue to expose large volumes of sensitive data, with limited visibility into how breaches unfold or how many individuals are affected.

🧠 Strategy in Action

Databricks moves into cybersecurity with AI-driven monitoring

Databricks is entering the cybersecurity space by integrating its data platform with AI models from Anthropic. The goal is to help organizations detect threats by analyzing large volumes of security data in real time.

The approach focuses on using AI to identify anomalies, automate threat detection, and reduce manual analysis. By combining data engineering with security analytics, the platform aims to give security teams faster insights and better context during incidents. Early use cases include identifying unusual patterns in logs and flagging potential insider threats.

Takeaways: 

This move reflects a broader shift where cybersecurity tools are merging with data platforms, allowing organizations to treat security data as part of their core analytics strategy rather than a separate function.

🕵️ Threat Actor Spotlight

Cl0p

Cl0p is a well-known ransomware group linked to large-scale data theft campaigns. The group is associated with exploiting zero-day vulnerabilities, especially in file transfer software such as MOVEit. Instead of encrypting systems in every case, Cl0p often focuses on data exfiltration and extortion.

Their attacks typically target enterprises with large datasets, including financial institutions, healthcare providers, and government agencies. Cl0p’s operations are structured, with clear divisions between access, data theft, and negotiation phases. The group has been active in multiple global campaigns, often affecting hundreds of organizations in a single exploit wave.

🛠️ Tool Check

Cacti alternatives for modern network monitoring

Cacti has long been used for graphing and monitoring network performance, but many organizations are moving to more advanced tools that offer better automation and visibility.

Key alternatives include:

🗣️ Community Signal

From the board's perspective, cybersecurity was being discussed, tracked, and reviewed. From management's perspective, funding was provided, controls were in place, and improvements were underway. Somewhere between information and decision, governance broke down. The uncomfortable reality is this: cybersecurity is still too often framed as a technical condition to be monitored, rather than a risk to be governed. Boards are shown activity, progress, and effort, but not always the choices, trade-offs, and residual risks that define effective oversight. Ruben Chacon

📚 Don’t Miss This

Advertise with Comparitech
Does your business offer services or products in cybersecurity? Get your product seen by IT leaders and professionals.

Advertise with us →

Until Friday’s edition - Let’s keep that zero-day count at zero!