DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Tennessee Orthopaedic Alliance notifies more than 81,000 patients after discovering two employee email accounts had been compromised

Posted on February 26, 2020 by Dissent

Tennessee Orthopaedic Alliance (TOA) recently notified more than 81,000 patients after an unknown party gained access to an employee’s email account. TOA first detected unusual activity in the account on October 18, 2019. A forensic investigation determined that data containing former and current patients’ personal or protected health information contained within two email accounts may…

Read more

Medical Records From Shuttered Mental Health Clinic Found Dumped In West Englewood Alley

Posted on February 26, 2020 by Dissent

Tara Molina reports:  Hundreds of pieces of paper containing people’s most sensitive information were found dumped in an alley. The papers were mental health records from a South Side center that closed years ago. CBS 2’s Tara Molina worked Tuesday to determine how they ended up on the street. […] We found the documents are…

Read more

Advocate Aurora’s HR system breached in email phishing campaign

Posted on February 26, 2020 by Dissent

Lauren Anderson reports: The personal information of some current and former Advocate Aurora Health employees, including their Social Security numbers and bank accounts, might have been compromised in an email phishing campaign. The Milwaukee- and Downers Grove, Illinois-based health system said the early January breach gave an unauthorized individual temporary access to a human resource…

Read more

Pacific Specialty Insurance Company notifies plan members of breach that occurred in March, 2019

Posted on February 25, 2020 by Dissent

Once again, we see a timeline where it took a loooong time before an entity actually discloses a breach, but the entity’s explanation involves how long it took to determine who was impacted. In this case, it tood from June 14, when they first became suspicious of activity that had occurred in March until November…

Read more

TX: School district falls victim to business email compromise scam

Posted on February 25, 2020 by Dissent

Atzimba Morales reports: A business email compromise scheme targeted San Felipe Del Rio CISD recently, yet the school district remains positive the issue will be resolved. The school district discovered the attack on Tuesday and learned funds were electronically transferred via Automated Clearing House to a fraudulent account instead of a proper account, according to…

Read more

Rabun County in Georgia thwarts apparent computer hacking attempt

Posted on February 25, 2020 by Dissent

Megan Broome reports: The county’s computer system was recently hit with what was thought to be ransomware, according to Darrin Giles, county administrator, in a phone interview Monday. Ransomware is a type of malicious software, or malware, designed to deny access to a computer system or data until a ransom is paid. Giles said that…

Read more
  • Previous
  • 1
  • …
  • 514
  • 515
  • 516
  • 517
  • 518
  • 519
  • 520
  • …
  • 1,913
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.