DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Author: Dissent

BakerHostetler’s 2025 Data Security Incident Response Report Finds Less Malware Used in 2024

Posted on April 15, 2025April 15, 2025 by Dissent

 BakerHostetler has released its 2025 Data Security Incident Response Report. This year, their annual report is based on their involvement in 1,250 data security cases. Some of The Key Findings: Companies are starting to win the battle against ransomware. Successful attacks are fewer. Time to restore is faster. Payments are lower. Forensic investigation costs dropped dramatically, marking a…

Read more

4chan hacked, internal data leaked on rival image board

Posted on April 15, 2025 by Dissent

Mikael Thalen reports: The notorious imageboard 4chan is currently inaccessible after hackers appear to have leaked internal data from the website. In a post on Monday evening to the rival imageboard soyjack.party, an anonymous user claimed that a hacker was able to leak website code and the personal information of staff after being in 4chan’s…

Read more

The Most Dangerous Hackers You’ve Never Heard Of

Posted on April 15, 2025 by Dissent

Andy Greenberg, Matt Burgess, and Lily Hay Newman of WIRED report: Made possible through partnership with ThreatLocker Ransomware gangs, email scammers, state-sponsored spies: hacking groups come in all shapes and sizes. There are some we write about quite a bit here at WIRED, who through some combination of audacity, incompetence, or geopolitical importance—or some combination…

Read more

China accuses US of launching ‘advanced’ cyberattacks, names alleged NSA agents

Posted on April 15, 2025 by Dissent

Laurie Chen, Farah Master and Liz Lee report: China accused the United States National Security Agency (NSA) on Tuesday of launching “advanced” cyberattacks during the Asian Winter Games in February, targeting essential industries. Police in the northeastern city of Harbin said three alleged NSA agents to a wanted list and also accused the University of…

Read more

The art of restraint: why not every system should be owned

Posted on April 15, 2025 by Dissent

Jesse William McGraw writes: Greetings, reader! I want to talk about my former life as a blackhat hacker because it never makes any sense. Many of my rampant hacking campaigns focused on breaking into big servers across several industries but not on seizing the networks by the throat and forcing them to their knees. I…

Read more

Kyiv Region Police Expose Hackers Who Infected Notaries’ Computers with Viruses and Changed Data in State Registries

Posted on April 15, 2025 by Dissent

As reported on dev.ua: In the Kyiv region, police detained a group of hackers who gained remote access to the devices of state bailiffs and private notaries and, for a fee, illegally removed encumbrances imposed on citizens’ property. According to the Cyber ​​Police, four suspects, one of whom was a private contractor, set up a scheme…

Read more
  • Previous
  • 1
  • …
  • 133
  • 134
  • 135
  • 136
  • 137
  • 138
  • 139
  • …
  • 5,735
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs
  • A jailed hacking kingpin reveals all about the gang that left a trail of destruction
  • Army gynecologist took secret videos of patients during intimate exams, lawsuit says

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.