According to sources, Janssen CarePath (a Medical organization in New Jersey) was hit with a cyber attack. It was first reported on 2023-09-07.

If You're in New Jersey, You're at Increased Risk

Cybersecurity for Medical

Manage your organization’s attack surface with SecuLore’s 24/7 network monitoring services.

  • 24/7 Threat Monitoring

  • Automated & AI Threat Detection

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis

Source 1  |  2023-09-07

IBM: Janssen health database breached in cyber incident

“IBM announced Wednesday that an unauthorized party breached the patient healthcare database it manages for the Johnson & Johnson-owned Janssen CarePath platform. Many of the patients are or have been treated for serious diseases, such as cancer. “

“The tech giant says it has begun to notify patients whose information may have been compromised in the breach, discovered on August 2nd. “

“The IBM-run database is used by Janssen CarePath, a free patient support platform that offers savings on advanced prescription medicines and other patient resources. “

“IBM says the breach exposed the sensitive information of an undisclosed number of patients, including contact information, date of birth, health insurance information, and information about medications and associated conditions that were provided to the Janssen CarePath application. “

Guarding Against Hacking

  • October 25, 2017

    Hackers Gone Wild: How Cybercriminals Impact 9-1-1 Systems

  • November 11, 2020

    4 Year Anniversary – Twitter TDoS Attack

  • October 14, 2020

    Incidents from the Trenches

  • July 8, 2020

    The Vicious Evolution of Cyber Attacks

Cybersecurity for Critical Infrastructure

SecuLore provides Managed Detection and Response (MDR) to protect our nation’s critical infrastructure from cyber threats. Our expertise is built on deep knowledge of 9-1-1 technology, cyberwarfare, and ethical hacking, ensuring the highest level of cybersecurity for public safety agencies.

  • 24/7 Vulnerability & Threat Monitoring

  • Automated & AI Threat Detection

  • Specialized Threat Intelligence

  • Proactive Threat Hunting

  • Incident Response & Remediation

  • Forensics & Root Cause Analysis