DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

PA lawmaker wants state to review entire process that led to company’s contact tracing data breach

Posted on March 4, 2022 by Dissent

Rick Earle reports: A state lawmaker has requested the auditor general review the entire process that led to the awarding of that $30 million contract with Insight Global to do contact tracking in Pennsylvania. State Rep. Jason Ortitay, a Republican from Bridgeville, told Target 11 Investigator Rick Earle that this may be the only way…

Read more

The Tel Aviv company paid millions to stop cyber criminals

Posted on March 2, 2022 by Dissent

Ofir Dor reports: In early 2021, a team from Sygnia was called in to deal with an intrusion into the systems of a US technology company that develops and manufactures Wi-Fi equipment, and that has a $15 billion market cap. The company received an anonymous email demanding a ransom payment of 50 Bitcoins (about $1.9…

Read more

Monongalia Health System hacked again? Second incident report in one year.

Posted on March 2, 2022 by Dissent

Monongalia Health System in West Virginia issued a press release this week about a data breach that impacted patients, employees, and contractors. It was the second incident reported by them in a one-year period. But was this incident unrelated to the first incident or related to it? It’s not yet clear, let’s back up to…

Read more

Breach Notification: Poor Transparency Complicates Response

Posted on March 1, 2022 by Dissent

Anyone trying to make sense of data breach trends faces a transparency challenge. Too often, a lack of detail undercuts consumers’ ability to assess their identity theft risk and businesses’ ability to block emerging attacks or ensure that their supply chains remain secure. Amen to that! Read Mathew J. Schwartz’s article on BankInfoSecurity.

Read more

HC3: Destructive Malware Targeting Organizations in Ukraine

Posted on March 1, 2022 by Dissent

HHS Cybersecurity Program has issued another alert and whitepaper report (202202280900): Executive Summary Leading up to Russia’s unprovoked attack against Ukraine, threat actors deployed destructive malware against organizations in Ukraine to destroy computer systems and render them inoperable. Destructive malware can present a direct threat to an organization’s daily operations, impacting the availability of critical…

Read more

Preparing for Cyberattacks and Limiting Liability

Posted on March 1, 2022 by Dissent

Lani M. Duffy and Richard A. Walawender of Miller Canfield write: The U.S. government and military experts have been warning U.S. companies that Russia may launch significant cyberattacks against critical infrastructure, financial institutions and businesses in retaliation for the sanctions imposed against Russia. Last week, the Cybersecurity & Infrastructure Security Agency (established in 2018 under…

Read more
  • Previous
  • 1
  • …
  • 218
  • 219
  • 220
  • 221
  • 222
  • 223
  • 224
  • …
  • 876
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Kentfield Hospital victim of cyberattack by World Leaks, patient data involved
  • India’s Max Financial says hacker accessed customer data from its insurance unit
  • Brazil’s central bank service provider hacked, $140M stolen
  • Iranian and Pro-Regime Cyberattacks Against Americans (2011-Present)
  • Nigerian National Pleads Guilty to International Fraud Scheme that Defrauded Elderly U.S. Victims
  • Nova Scotia Power Data Breach Exposed Information of 280,000 Customers
  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • German court awards Facebook user €5,000 for data protection violations
  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.