This week brings an actively exploited Microsoft Office zero-day, a major US healthcare data breach highlighting supply chain risks, and growing concerns about NHS supplier relationships with controversial organisations.
Microsoft released an emergency patch for a security flaw in Office that is already being used to attack organisations. The vulnerability, tracked as CVE-2026-21509, allows attackers to bypass security features that normally stop unsafe older components from running. These components, called COM and OLE, have been used in document-based attacks for many years. Attackers can exploit this flaw by tricking someone into opening a specially crafted file, such as a malicious Word document or Excel spreadsheet.
NHS organisations and healthcare suppliers rely heavily on Microsoft Office for clinical correspondence, patient records management, and administrative workflows. A compromised Office installation can provide attackers with access to sensitive patient information and critical systems. The vulnerability does not require the preview pane to trigger, making it easier for attackers to exploit. For DSPT compliance, organisations must demonstrate they apply security patches promptly. Failing to patch this actively exploited vulnerability could result in compliance failures and data breaches.
TriZetto Provider Solutions, a major US insurance verification provider owned by Cognizant, disclosed a data breach affecting over 700,000 patients across multiple US states. Attackers gained unauthorised access to the company's systems back in November 2024 but were not discovered until October 2025, giving them nearly a year of access to protected health information. The breach affected healthcare providers in Oregon, Massachusetts, Oklahoma, and California. TriZetto eliminated the threat on 2 October 2025 and engaged external cybersecurity experts from Mandiant. This is not a ransomware incident, according to Cognizant, but stolen data included sensitive patient information such as names, dates of birth, medical record numbers, and insurance details.
While this breach primarily affects US healthcare providers, it highlights critical supply chain security risks for UK health organisations and NHS suppliers. Many UK providers depend on international software and service vendors for administrative systems and back-office functions. The incident shows how third-party suppliers can be compromised for long periods without detection, exposing sensitive patient data. For UK organisations with international operations or US-based suppliers, this reinforces the need for robust vendor security assessments and ongoing monitoring. DSPT requires effective management of third-party risks, and incidents like this show why rigorous supplier due diligence is essential.
Reports emerged this month that Palantir Technologies, a major NHS data platform supplier under a £330 million contract, has developed tools for US Immigration and Customs Enforcement that use healthcare data to track individuals. The tool, called ELITE, reportedly uses Medicaid and other government data to create dossiers on potential deportation targets. Palantir holds the contract for the NHS Federated Data Platform, designed to bring together NHS data for improved patient care and operational efficiency. The company has faced ongoing scrutiny over its work with intelligence and security services, and concerns about data governance and the ethical implications of its contracts.
While Palantir's work with US immigration enforcement does not directly affect NHS data security, it raises important questions about supplier relationships and data governance that are relevant to DSPT compliance and public trust. NHS organisations are required to demonstrate robust data protection practices and appropriate oversight of suppliers. The controversy highlights the importance of understanding the full scope of major suppliers' activities, particularly those handling sensitive patient information. Public confidence in NHS data systems depends on transparent governance and ethical supplier relationships. Healthcare organisations should be aware of these concerns as they affect the reputation and trustworthiness of key technology partners, even when technical security measures are in place.
Protecting your organisation from cyber threats requires constant vigilance and expert knowledge. Periculo's Threat Intelligence services help UK businesses and digital health organisations stay informed about emerging risks and take action before incidents occur.
Contact us to learn how we can support your cybersecurity programme and help you maintain compliance with DSPT and other regulatory requirements.