DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

AU: ADHA records two My Health Record security incidents in FY20

Posted on October 28, 2020 by Dissent

Aimee Chanthadavong reports: The agency responsible for oversight of My Health Record has revealed there were two incidents that compromised the medical records system during the 2019-20 financial year. In its annual report, the Australian Digital Health Agency (ADHA) outlined how one matter reported to the Office of the Australian Information Commissioner (OAIC) involved a breach to…

Read more

As international travel services re-open, fraudsters resume

Posted on October 27, 2020 by Dissent

When COVID-19 travel restrictions eased as countries tried to re-open borders to travelers, researchers at Gemini Advisory observed that the sale of travel services — both legal and illegal — started to increase, opening up  more opportunities for cybercriminals to monetize stolen payment card data. For those not really knowledgeable about travel services fraud, Gemini…

Read more

Data breaches upping ATO fraud ‘red flags’

Posted on October 27, 2020 by Dissent

Asha Barbaschow reports: The Australian Taxation Office (ATO) has a “red flag” feature, which serves up a “ping” whenever an individual or business has been suspected of having fraudulent activity conducted against their name or if their account has been compromised. Facing Senate Estimates on Tuesday, ATO client engagement second commissioner Jeremy Hirschhorn explained that…

Read more

Update: Has Guilford Technical Community College notified more than 43,000 students of data breach?

Posted on October 26, 2020 by Dissent

On September 19, DataBreaches.net reported that Guilford Technical Community College (GTCC) in North Carolina had apparently become a ransomware victim of DoppelPaymer on September 13. But on October 6, GTCC was no longer listed on the threat actors’ dedicated leak site.  The removal of a victim’s name often indicates that the victim had a change…

Read more

Donald Trump’s Twitter password is “maga2020!”, and there’s no 2FA, claims hacker

Posted on October 22, 2020 by Dissent

Updated:  The claims made by Victor Gevers, reported below, have been disputed by Twitter, Trump’s team, and an article by Joe Cox on Vice.  —————————– Graham Clulely reports that President Trump, whose password back used to be “yourefired” used “Maga2020!” as his Twitter password, with no 2FA. Read more on Graham’s site while some of…

Read more

“We take your privacy seriously….” Thursday edition.

Posted on October 22, 2020 by Dissent

I’ve been reading some other sites’ coverage of the Pfizer leak that was discovered by vpnMentor and shared exclusively with DataBreaches.net.  The incident involved a misconfigured cloud storage bucket that exposed hundreds of consumer/patient reports to Pfizer on a reporting line for drug safety concerns or other concerns. As such, it contained a lot of…

Read more
  • Previous
  • 1
  • …
  • 346
  • 347
  • 348
  • 349
  • 350
  • 351
  • 352
  • …
  • 876
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hunters International to provide free decryptors for all victims as they shut down (1)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.
Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report