DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

Security bugs in ransomware leak sites helped save six companies from paying hefty ransoms

Posted on August 9, 2024 by Dissent

Zack Whittaker reports: A security researcher says six companies were saved from having to pay potentially hefty ransom demands, in part thanks to rookie security flaws found in the web infrastructure used by the ransomware gangs themselves. Two companies received the decryption keys to unscramble their data without having to pay the cybercriminals a ransom,…

Read more

Senator Demands Answers About AT&T Data Breach from Company, Federal Agencies

Posted on August 8, 2024 by Dissent

Irvin Jackson reports: Following a massive AT&T data breach that resulted in the theft of tens of millions of customers’ phone and text messaging history, a U.S. Senator has sent a request for more information about how the breach occurred and when federal agencies learned about the problems, suggesting that cyberattack could represent a threat…

Read more

FBI Issues Warning As ‘Men In Black’ Hackers Demand $60 Million Ransom

Posted on August 8, 2024 by Dissent

Davey Winder reports: An updated advisory from the FBI and the Cybersecurity and Infrastructure Security Agency has warned of the danger from a ransomware group that has demanded as much as $60 million from its victims, and a staggering total of $500 million so far. The criminal hackers concerned have rebranded from calling themselves Royal…

Read more

Six U.S. hospital breach reports from July; some have flown under the media radar (1)

Posted on August 5, 2024October 21, 2024 by Dissent

Although DataBreaches does not report on all incidents involving U.S. healthcare entities, a log is kept to calculate statistics for the annual Breach Barometer report produced by Protenus, Inc. For the month of July, DataBreaches noted the following six U.S. hospitals disclosed breaches or were claimed as victims by threat actors. Some of these incidents…

Read more

Mandiant Uncovers Threat Group Behind Basta Ransomware

Posted on August 2, 2024 by Dissent

Akshaya Asokan reports: A newly identified financially motivated hacking group is deploying Basta ransomware as part of an ongoing extortion campaign that began early this year. Google Mandiant, which uncovered the campaign, tracks the group as UNC4393. Since Basta is not publically marketed and is available on invitation-only basis, Mandiant researchers believe UNC4393 is likely the “primary…

Read more

Ever More Toxic Ransomware Brands Breed Lone Wolf Operators

Posted on August 2, 2024 by Dissent

Mathew J. Schwartz reports: The downfall of previously high-flying ransomware operations Alphv and LockBit has shaken up the criminal underground, turning some former affiliates into lone operators and causing some under-the-radar groups to rack up record extortion payments. Ransomware incident response firm Coveware said in a report that 10% of all ransomware attacks it monitored…

Read more
  • Previous
  • 1
  • …
  • 32
  • 33
  • 34
  • 35
  • 36
  • 37
  • 38
  • …
  • 870
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Comstar LLC agrees to corrective action plan and fine to settle HHS OCR charges
  • Australian ransomware victims now must tell the government if they pay up
  • U.S. Sanctions Cloud Provider ‘Funnull’ as Top Source of ‘Pig Butchering’ Scams
  • Victoria’s Secret takes down website after security incident
  • U.S. Government Employee Arrested for Attempting to Provide Classified Information to Foreign Government
  • St. Cloud Provides Update on Ransomware Attack in 2024
  • Bradford Health Systems detected abnormal network activity in December 2023. They first sent out breach notices this week.
  • Websites selling hacking tools to cybercriminals seized
  • ConnectWise suspects cyberattack affecting some ScreenConnect customers was state-sponsored
  • Possible ransomware attack disrupts Maine and New Hampshire Covenant Health locations

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Why AI May Be Listening In on Your Next Doctor’s Appointment
  • Watch out for activist judges trying to deprive us of our rights to safe reproductive healthcare
  • Nebraska Bans Minor Social Media Accounts Without Parental Consent
  • Trump Taps Palantir to Compile Data on Americans
  • The US Is Storing Migrant Children’s DNA in a Criminal Database
  • Home Pregnancy Test Company Wins Dismissal of Pixel Wiretapping Suit
  • The CCPA emerges as a new legal battleground for web tracking litigation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.