DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Breach Incidents

Greenville Technical College claims no personal data affected by ransomware incident; threat actors claim otherwise

Posted on August 30, 2020 by Dissent

When threat actors gave Greenville Technical College in South Carolina until September 4 to respond to their ransomware demands, the college didn’t worry. They had decided not to pay because they were able to recover from the attack without paying for a decryption key. But there was a second part to the ransomware attack —…

Read more

Ventura Orthopedics hit by ransomware weeks ago; some patient data dumped

Posted on August 26, 2020 by Dissent

Updated August 28: DataBreaches.net was contacted today by Chris Roberts of HillBilly Hit Squad on behalf of Ventura Orthopedics. They had gotten this site’s inquiries and asked him to help explain the incident and their current status. Chris is still in the process of doing forensics, and rather than provide information piecemeal, I’m going to hold…

Read more

CO: City of Lafayette statement on July ransomware attack

Posted on August 25, 2020 by Dissent

On August 6, media in Colorado reported that the City of Lafayette had paid $45,000 to get a decryption key following a ransomware attack. On August 24, the city published a notification about the incident: This public notice is intended to advise residents, employees, and customers of an incident involving a cyberattack on the City…

Read more

More Canadian entities hit with ransomware

Posted on August 23, 2020 by Dissent

Updated August 24:  The #DarkSide’s victim is Brookfield Residential. Brookfield Residential describes themselves as a North American land developer and new home builder, and the “flagship North American residential property company of Brookfield Asset Management.” On their leak site, the threat actors had linked to Brookfield.com, which is Brookfield Asset Management, but the documents dumped…

Read more

CO: Mental Health Partners discloses email hack potentially compromised employee and patient data

Posted on August 23, 2020 by Dissent

Mental Health Partners (also known as “Mental Health Center of Boulder County Inc.) issued a press release this week about an employee email account compromise discovered in late March. An investigation revealed that the personal information of some MHP clients and current and former employees may have been accessed or taken during the incident. The…

Read more

ZA: Social grant applications found dumped in Ndedwe

Posted on August 23, 2020 by Dissent

Nothando Mkhize reports that a pile of social grant applications were found on a street in Ndwedwe. The South African Post Office is investigating to see if they were stolen from a post office during a burglary last month. In a puzzlingly vague statement, a spokesperson noted that an employee has been suspended.  But why?…

Read more
  • Previous
  • 1
  • …
  • 230
  • 231
  • 232
  • 233
  • 234
  • 235
  • 236
  • …
  • 1,571
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters
  • Dutch police identify users on Cracked.io
  • Help, please: Seeking copies of the PowerSchool ransom email(s)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale
  • The Meta AI app is a privacy disaster – TechCrunch
  • Apple fixes new iPhone zero-day bug used in Paragon spyware hacks
  • Norwegian Data Protection Authority’s findings on tracking pixels: 6 cases
  • Multiple States Enact Genetic Privacy Legislation in a Busy Start to 2025
  • Rules Proposed Under New Jersey Data Privacy Act
  • Using facial recognition? Three recent articles of interest.

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.