DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Provo City School District suffers data breach

Posted on October 2, 2014 by Dissent

Barbara Christiansen reports: Employees of the Provo City School District may have an extra concern facing them as the district has discovered a data breach. There was a phishing attack and someone gained access to an employee’s email account. That account contained files with sensitive, personal identification information for about half of the district’s employees….

Read more

Second data breach hits Twin Cities Cub Foods stores

Posted on September 29, 2014 by Dissent

Clare Kennedy reports: Supervalu Inc. reported a second data breach, saying hackers infiltrated point of sale terminals at four Twin Cities  Cub Foods grocery stores in late August or September. Customer credit card information may have been taken from the Hastings, Shakopee, Roseville (Har Mar Mall) and White Bear Lake stores. Read more on Minneapolis/St. Paul Business Journal….

Read more

Signature Systems Breach Expands

Posted on September 26, 2014 by Dissent

Brian Krebs reports: Signature Systems Inc., the point-of-sale vendor blamed for a credit and debit card breach involving some 216 Jimmy John’s sandwich shop locations, now says the breach also may have jeopardized customer card numbers at nearly 100 other independent restaurants across the country that use its products. Read more on KrebsOnSecurity.

Read more

WA: Yakima County office computers no longer have virus

Posted on September 26, 2014 by Dissent

Ada Chong reports: A computer virus that hit some Yakima County offices has been fixed. It hit machines in the prosecutor’s office, the courts and the Department of Corrections medical office. The virus encrypted content of attached drives on three computers. It caused a screen to pop up and ask the user for money. There’s…

Read more

Operation Harkonnen Malware disguised as ‘harmless Adware’

Posted on September 26, 2014 by Dissent

Michael Shuff reports: Further details are emerging today of the methods used in the massive and long-lasting Operation Harkonnen cyber attack (‘Harkonnen Hack’) methodology that has allegedly exposed the data of 300 leading European organisations since 2003. The victims of the German gang thought to be responsible include banks, government organisations and major corporations, most…

Read more

Data on up to 750,000 Japan Airlines mileage club members may have leaked

Posted on September 24, 2014 by Dissent

Kyodo reports: Japan Airlines Co. said Wednesday that personal information on up to 750,000 JAL mileage club members may have leaked after someone gained unauthorized access to the company’s computer system The data include members’ names, addresses, birthdays and email addresses, the company said, adding that it has not confirmed the leak of passwords or…

Read more
  • Previous
  • 1
  • …
  • 678
  • 679
  • 680
  • 681
  • 682
  • 683
  • 684
  • …
  • 744
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.