DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Commentaries and Analyses

Revenge is mine, saith a hacker. No big deal, saith a researcher.

Posted on July 12, 2020August 3, 2025 by Dissent

Vinny Troia, a self-described security researcher and and the owner of cybersecurity firms Night Lion Security and DataViper.io, will be the opening keynote speaker at SecureWorld’s virtual conference this coming Wednesday. He has promoted himself and his talk by claiming that he will reveal all of the identities of key members of thedarkoverlord, GnosticPlayers, and…

Read more

How REvil Used the Underground Ecosystem to Form an Extortion Cartel

Posted on July 11, 2020 by Dissent

A new paper on Sodinokibi (REvil) ransomware operators by Advanced Intelligence begins: Just about one year ago, the makers of the infamous GandCrab ransomware announced their retirement, having reportedly earned an astonishing $2 billion since their entry into the ransomware market in January 2018. The vacuum was quickly filled, however. Forensic and malware evidence was…

Read more

Was FSB Marketplace Takedown and Arrest of “Flint24” Punishment for Political Misstep?

Posted on July 10, 2020 by Dissent

Back in March, I pointed readers to a fascinating report by Gemini Advisory concerning the Russian Federal Security Service (FSB) takedown of a top tier marketplace and the arrest of its administrators. At the time, they were confident that the marketplace was BuyBest, and that one of its administrators was Alexey Stroganov (aka “Flint24”). Stroganov’s…

Read more

“Keeper” Magecart Group Infects 570 Sites — Gemini Advisory Researchers

Posted on July 8, 2020 by Dissent

Yesterday, Gemini Advisory released a report on some of its research into what they are calling the “Keeper” Magecart Group. Their findings are simultaneously impressive and concerning.  From their report, this summary of their key findings: Gemini discovered that the “Keeper” Magecart group, which consists of an interconnected network of 64 attacker domains and 73…

Read more

How Cyberinsurance Is Responding to Ransomware: An Interview with Ken Suh, Mark Singer, and Marcello Antonucci

Posted on July 5, 2020 by Dissent

Daniel Solove writes: Ransomware has long been a scourge, and it has been growing into a pandemic with no signs of slowing down. I recently had the opportunity to discuss ransomware with several experts at Beazley. Based in Chicago, Ken Suh is the focus group leader for cyber & tech claims at Beazley. Mark Singer is a cyber & tech claims…

Read more

Extraterritorial Application of the Computer Fraud and Abuse Act

Posted on July 5, 2020 by Dissent

William K. Kane and Melissa M. Mikhail of SheppardMullin write: A brazen and sophisticated computer intrusion into the records of over 145 million Americans launched from computer hackers based in China led to recent criminal prosecutions under the Computer Fraud and Abuse Act. [1] Courts are willing to extend American law beyond U.S. boundaries often when criminal…

Read more
  • Previous
  • 1
  • …
  • 389
  • 390
  • 391
  • 392
  • 393
  • 394
  • 395
  • …
  • 896
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Once a Patient’s in Custody, ICE Can Be at Hospital Bedsides — But Detainees Have Rights
  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.