73,281
On February 12, 2026, Academic Urology & Urogynecology of Arizona (AUUA), a division of Palo Verde Hematology and Oncology, began notifying 73,281 patients of a major data breach that exposed their sensitive personal and medical information. The incident stems from a network intrusion that occurred nearly nine months earlier, between May 18 and May 22, 2025. A lengthy forensic investigation and manual document review, which only concluded on January 30, 2026, confirmed that files containing patient data were likely accessed or stolen. The compromised information includes a vast range of Protected Health Information (PHI), such as Social Security numbers, financial data, and specific medical diagnoses and treatments. The healthcare provider is offering credit monitoring services to those affected.
The breach involved an unauthorized actor gaining access to AUUA's IT network. While the specific attack vector was not disclosed, this type of incident in the healthcare sector often involves phishing attacks leading to credential compromise, exploitation of unpatched vulnerabilities in network devices, or brute-force attacks against remote access services. The attackers were present in the network for approximately four days before being discovered, giving them a window to explore the network, identify valuable data, and exfiltrate it.
The impact on the 73,281 affected patients is extremely severe due to the highly sensitive nature of the compromised data. The breach exposed a combination of financial, personal, and medical information, creating a perfect storm for various types of fraud:
For AUUA, the breach carries significant consequences, including potential regulatory fines under HIPAA, costly patient notification and credit monitoring services, and severe reputational damage. The long delay between the incident in May 2025 and the notification in February 2026 could also be a point of regulatory scrutiny.
The compromised data includes a comprehensive set of PII and PHI:
AUUA's response followed a standard, albeit slow, incident response process. They detected the intrusion, engaged third-party experts for forensic investigation, and, after a lengthy data review, began notifying affected parties. The nine-month gap between the incident and notification highlights the extreme difficulty and time-consuming nature of determining the scope of data breaches in complex healthcare IT environments, which often involve unstructured data in patient records.
Healthcare organizations must implement robust security controls to protect sensitive PHI:

Cybersecurity professional with over 10 years of specialized experience in security operations, threat intelligence, incident response, and security automation. Expertise spans SOAR/XSOAR orchestration, threat intelligence platforms, SIEM/UEBA analytics, and building cyber fusion centers. Background includes technical enablement, solution architecture for enterprise and government clients, and implementing security automation workflows across IR, TIP, and SOC use cases.
Help others stay informed about cybersecurity threats