Maybe one day, a law or regulation will require entities to purge old data that is no longer needed or requires it to be disconnected from the internet. If anyone needs a fresh example of why we need that type of law or regulation, here it is: Richard T. Miller, DMD, PC, d/b/a Great Neck/Mid…
Category: Hack
Largest Crypto ATM manufacturer hacked over security hitch- Over $1.5m bitcoin (BTC) Stolen
Olivia Brooke reports: General Bytes, one of the world’s leading cryptocurrency automated teller machine (ATM) manufacturers, experienced a security breach on the 17th and 18th of March. The hacker went on to liquidate 56.28 Bitcoins, which was valued at a staggering $1.5 million at the time of the attack. The stolen Bitcoins were taken from cryptocurrency ATM operators…
Website intrusion attempt: India’s Department of Health seeks help from Chot-In
PiPa reports: India’s Computer Emergency Response Team (CHOT-IN) has been asked to investigate the alleged hacking of the Health Department’s website by a Russian group The Indian Computer Emergency Response Team (CHOT-IN) has been asked to investigate the alleged hacking of the Health Department’s website by a Russian team. . CloudSEK, a cyber security company,…
El Camino Health investigating claims of a data breach
El Camino Health is investigating a possible data breach involving patient data, but whose breach is it? On February 22, DataBreaches received a tip about a listing offering patient data allegedly from El Camino Health in California. The listing was not on any of the usual leak sites, markets, or forums, and the poster was…
Google Reveals Samsung Phones Could Be Hacked Without Owners Knowing: Here’s How
Dane Enerio reports: Google has warned that some of its smartphones running the company’s own Android operating system, as well as other devices from manufacturers such as Samsung and Vivo, could be accessed by third-party actors without owners ever becoming aware of such a breach. A total of 18 zero-day vulnerabilities, or exploits previously only…
BianLian Ransomware Pivots From Encryption to Pure Data-Theft Extortion
Elizabeth Montalbano reports: The BianLian ransomware group is ramping up its operations and maturing as a business, moving more swiftly than ever to compromise systems. It’s also moving away from encryption to pure data-theft extortion tactics, in cyberattacks that have so far bagged at least 116 victims, researchers have found. BianLian, first discovered last July, hasn’t deviated much…