DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

Implications for ATE insurance after data breach ‘privacy’ claim struck out

Posted on August 4, 2021 by Dissent

David Barker of Pinsent Masons writes: Many of the growing number of data protection-related claims being filed against businesses to have fallen victim to cyber attacks are being brought not just under data protection legislation but also in the alternative as claims for breach of confidence or misuse of private information. A recent ruling should…

Read more

U.S. medical entities fall prey to Pysa threat actors, but many haven’t disclosed it – at least, not yet.

Posted on August 3, 2021 by Dissent

—– A DataBreaches.net report by Dissent and Chum1ng0 —– Since 2018, threat actors known as “Pysa” (for “Protect Your System Amigo”) have used mespinoza ransomware to lock up victims’  files after exfiltrating a copy of them. In early 2020, alerts about these “big-game hunters” were published by both the FBI and CNIL . Since then,…

Read more

Suspect File updates the Blackbaud incident tally for the education sector

Posted on August 1, 2021 by Dissent

Courtesy of Suspect File, this update to the list of educational entities impacted by the 2020 Blackbaud ransomware incident: UPDATE (5) of 31.07.2021 (June / July 2021) Total number of people involved 7,984,697 (+5,907) In the update of 07/31/2021, 3 new Institutions affected by the Blackbaud Data Breach are added. As of 30.05 2021, the…

Read more

Westfield IT director stops what appeared to be active cyber security breach after clerk-treasurer issues third-party contract

Posted on July 31, 2021 by Dissent

Did a city’s IT Director stop a breach in progress or did he just interrupt a forensic investigation by a firm that had been hired but never identified to his office?  Anna Skinner reports on what seems to be a case of Westfield officials either not communicating well with each other, or not trusting each…

Read more

New destructive Meteor wiper malware used in Iranian railway attack

Posted on July 31, 2021 by Dissent

Lawrence Abrams reports: A new file wiping malware called Meteor was discovered used in the recent attacks against Iran’s railway system. Earlier this month, Iran’s transport ministry and national train system suffered a cyberattack, causing the agency’s websites to shut down and disrupting train service. The threat actors also displayed messages on the railway’s message boards…

Read more

NC: Sandhills Center remains silent after threat actors claim to have hacked them and exfiltrated 634 GB of their files

Posted on July 30, 2021 by Dissent

Update of September 4: Sandhills subsequently issued a press release that indicates that they could not confirm that the data came from them.  See the follow-up report here. Original post: Sandhills Center in North Carolina manages public mental health, intellectual/developmental disabilities and substance use disorder services for the citizens of Anson, Guilford, Harnett, Hoke, Lee,…

Read more
  • Previous
  • 1
  • …
  • 261
  • 262
  • 263
  • 264
  • 265
  • 266
  • 267
  • …
  • 872
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post investigating cyberattack on journalists, WSJ reports
  • Resource: State Data Breach Notification Laws – June 2025
  • WestJet investigates cyberattack disrupting internal systems
  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.