DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Breach Incidents

Toyota rear-ended by twin cyber attacks that left ransomware-shaped dents

Posted on May 21, 2021 by Dissent

Simon Sharwood reports: Toyota has admitted to a pair of cyber-attacks. The first hit the European operations of its subsidiary Daihatsu Diesel Company, a Toyota-owned company entity that designs engines. In a statement [PDF] dated May 16th, Daihatsu said it “experienced a problem in accessing its file server in the internal system on 14 May 2021.” “After…

Read more

WI: Ransomware attack responsible for internet issues at Tigerton schools

Posted on May 21, 2021 by Dissent

Landen Moore reports: A sophisticated ransomware attack limited the Tigerton School District’s ability to access certain systems. Superintendent Kelley Strike provided the update in an email to FOX 11 on Tuesday. The update comes one day after students returned to the classroom following a five-day weekend over a computer network disruption. Read more on Fox11.

Read more

TX: Betenbough Homes target of Sodinokibi threat actors

Posted on May 20, 2021 by chum1ng0

The Sodinokibi (“REvil”) threat actors have added Betenbough Homes to their dark web leak site where they post files from victims who have not paid their extortion demands. In the case of Betenbough, the attack was just added today to REvil’s site, but the breach occurred on May 3. The most recent  statement from the…

Read more

Update:  Rehoboth Mckinley Christian Health Care Services notified 209,000 patients of February ransomware incident

Posted on May 20, 2021 by Dissent

On February 16, DataBreaches.net reported that Conti threat acctors had apparently attacked Rehoboth Mckinley Christian Health Care Services, Inc  (RMCHCS) in New Mexico. As it has done in similar attacks, the threat actors dumped a small sample of files as proof. The files include copies of handwritten injury reports and other reports related to named individuals’…

Read more

Update: Nocona General Hospital “recently” learned of a breach we reported in early February

Posted on May 20, 2021 by Dissent

On February 4, DataBreaches.net reached out to Nocona General Hospital (NGH) in Texas about an attack claimed by Conti threat actors the previous day. The hospital did not respond.  On February 7, this site emailed NGH, writing, in part,  “I see that Conti threat actors have dumped files that they claimed they copied and stole…

Read more

Despite an alert from NYS DFS, some insurance companies with “instant quote” portals were victimized

Posted on May 19, 2021 by Dissent

On February 16, the NYS Department of Financial Services issued a cybersecurity fraud alert involving public-facing web sites where consumers could request “instant quotes” for car insurance or other products. The alert warned insurers that private information used to prefill requests was being stolen and misused for pandemic unemployment benefits fraud. At the time, they…

Read more
  • Previous
  • 1
  • …
  • 194
  • 195
  • 196
  • 197
  • 198
  • 199
  • 200
  • …
  • 1,571
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe
  • AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing
  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.