DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Clarion U. students notified after employees fall for phishing attack

Posted on December 8, 2017 by Dissent

Ron Wilshire reports: Clarion University was notified of an email compromise that occurred because of a criminal phishing scam that compromised two email accounts in the registrar’s office. The unauthorized individual or individuals had access to the accounts between October 7 and October 10. “Clarion University is committed to data integrity and privacy protection,” said Communication Manager…

Read more

Glens Falls Hospital workers’ Social Security numbers and flu shot status released in internal email

Posted on December 8, 2017 by Dissent

Michael Goot reports on a breach involving hospital employees’ health information. In this case, the health information relates to a work issue, and Social Security numbers are also involved, but it’s still their health information that caught my eye. The names and Social Security numbers of Glens Falls Hospital employees who had not received flu…

Read more

Sinai Health System notifies 11,350 patients after phishing incident

Posted on December 8, 2017 by Dissent

Ally Marotti reports: At least two employees at Sinai Health System had their email accounts compromised in a phishing incident, potentially affecting the information of 11,350 people. The seven-member hospital system said in a statement Thursday that it cannot confirm whether any patient information in the email accounts was viewed. However, there is a low…

Read more

Basic training in avoiding phishing is no longer sufficient

Posted on December 8, 2017 by Dissent

Oof.  I read something like this notification below from Boise Cascade Company in Utah, and I wonder if the employees had been regularly trained in avoiding phishing attacks, or if it was just the case that the phishing was done so damned well that the employees fell for it despite their training. In this case,…

Read more

‘Jeopardy!’ Winner Charged With Cybercrime Felonies

Posted on December 7, 2017 by Dissent

Tom Ozimek reports: A record-breaking “Jeopardy” game show champion and former Adrian College history professor has been charged with two cybercrime-related felonies. Stephanie Jass, 47, faced arraignment on Tuesday, Dec. 5, in Lenawee County District Court in southern Michigan, mlive.com reports, on charges of unauthorized access to a college computer, and using a computer to commit…

Read more

Former Columbia Sportswear employee sentenced to probation and community service

Posted on December 7, 2017 by Dissent

There’s an update in the case of a former Columbia Sportswear employee who was sued by the firm for allegedly hacking them after he left their employ. In August, Michael Leeper pleaded guilty. Now, despite prosecution attempts to get him some  jail time, Leeper was sentenced to three years of probation with 400 hours of community…

Read more
  • Previous
  • 1
  • …
  • 772
  • 773
  • 774
  • 775
  • 776
  • 777
  • 778
  • …
  • 1,913
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.