DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

Court Dismisses Data Privacy Litigation Alleging Defendant Failed to Maintain Reasonable Security Procedures in Wake of Data Breach

Posted on April 14, 2021 by Dissent

Kristin L. Bryan and Katie Sharpless of Squire Patton Boggs write: CPW has been covering data breach litigations, including instances in which meritless claims are kicked by courts at the pleading stage.  A recent decision from an Ohio district court is yet another example of this trend.  Newman v. Total Quality Logistics, 2021 U.S. Dist. LEXIS…

Read more

‘This was not a breach’: How Big Tech gaslights the world on data leaks

Posted on April 13, 2021 by Dissent

Vincent Manancourt and Laurens Cerulus report: First Facebook. Then LinkedIn. Now Clubhouse. After data on a combined billion Facebook and LinkedIn users appeared online last week, reports surfaced over the weekend that upstart social network Clubhouse had also leaked reams of user information. But if you think any of the above is a problem, Big Tech has…

Read more

A chat with DarkSide

Posted on April 12, 2021 by Dissent

If you would meet us on the street – you would never realize that we are cyberpests, because we are the same normal people like everyone else. Many have families and children, the only thing that these circumstances in which we found themselves in our country are. We have no hatred and desire to cause…

Read more

Cyber Breach Disclosures Still Take More Than a Month

Posted on April 10, 2021 by Dissent

Vincent Ryan reports: After being discovered, cybersecurity breaches are not consistently disclosed promptly, found an Audit Analytics study of public companies released on Friday. On average, publicly held companies took 53 days to disclose a breach incident after discovering it. The 53-day average disclosure timeframe is less than the 10-year average of 67 days, but…

Read more

Attackers deliver legal threats, IcedID malware via contact form

Posted on April 10, 2021 by Dissent

Sergiu Gatlan reports: … IcedID is a modular banking trojan first spotted in 2017 and updated to also deploy second-stage malware payloads, including Trickbot, Qakbot, and Ryuk ransomware. Recently detected by the Microsoft 365 Defender Threat Intelligence Team, this phishing campaign seems to have found a way to bypass contact forms’ CAPTCHA protection to flood enterprises with a barrage…

Read more

No password required: Mobile carrier exposes data for millions of accounts

Posted on April 10, 2021 by Dissent

Dan Goodin reports: Q Link Wireless, a provider of low-cost mobile phone and data services to 2 million US-based customers, has been making sensitive account data available to anyone who knows a valid phone number on the carrier’s network, an analysis of the company’s account management app shows. Read more on The Register. Opinion: I…

Read more
  • Previous
  • 1
  • …
  • 294
  • 295
  • 296
  • 297
  • 298
  • 299
  • 300
  • …
  • 873
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Episource notifying 5.4 million patients of cyberattack in January
  • Investigation of 2024 Helsinki data breach – Report
  • Major trial underway for data leak that left 72,000 victims in France
  • Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
  • HealthEC Agrees to $5.48 Million Settlement to End Data Breach Lawsuit
  • US offering $10 million for info on Iranian hackers behind IOControl malware
  • Sompo Japan Insurance submits improvement plan after info leakage
  • Moreno Valley, Calif., Schools Report Data Breach
  • The Growing Cyber Risks from AI — and How Organizations Can Fight Back
  • UPDATING: Credit Control Corporation denies any current breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.