DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Ca: Sobeys admits to data breach in fall 2022, alerts customers and employees

Posted on February 21, 2023 by Dissent

Hafsa Arif provides an update on the ransomware attack on Sobeys, a Canadian supermarket chain, by Black Basta last year: The Maritime-based Empire Co. – parent company of Sobeys – acknowledges customers and employees past and present are receiving letters saying their personal information may have been compromised. Read more at CTV.

Read more

Aviacode remains silent after 0mega dumps 200 GB of their files

Posted on February 20, 2023 by Dissent

On January 9, DataBreaches noticed that Aviacode had been added to the leak site for 0mega. Aviacode, which is part of GeBBS Healthcare Solutions, offers medical coding services, medical coding audits, coding denial management, clinical documentation improvement, and revenue cycle management for billings and claims. As such, it is often a business associate for HIPAA-covered…

Read more

Lehigh Valley Health Network reveals attack by BlackCat

Posted on February 20, 2023 by Dissent

The Morning Call reports: The Lehigh Valley Health Network has been the target of a cyberattack from a suspected Russian ransomware group. In a statement issued Monday morning, LVHN President and CEO Brian A. Nester said, “Lehigh Valley Health Network has been the target of a cybersecurity attack by a ransomware gang, known as BlackCat,…

Read more

Weeklong ransomware attack on Oakland government drags on

Posted on February 18, 2023 by Dissent

Da Lin reports: OAKLAND – 10 days after the City of Oakland experienced a ransomware attack, many of its departments remain shut down to the public. Emergency services like police and fire are operational. The lobby at the Oakland Police Department is one of few places still open to the public, but there are signs…

Read more

GoDaddy: Hackers stole source code, installed malware in multi-year breach

Posted on February 17, 2023 by Dissent

Sergiu Gatlan reports: Web hosting giant GoDaddy says it suffered a breach where unknown attackers have stolen source code and installed malware on its servers after breaching its cPanel shared hosting environment in a multi-year attack. While GoDaddy discovered the security breach in early December 2022 following customer reports that their sites were being used…

Read more

Update to the Des Moines Public School ransomware attack

Posted on February 17, 2023 by Dissent

For some students in Des Moines, Iowa, the return to school after the winter holidays was soon interrupted by a cyberattack that resulted in classes being canceled. But as classes continued to be canceled, it became clearer that restoration and recovery would not be quick. By January 11, two days after the announcement of school…

Read more
  • Previous
  • 1
  • …
  • 123
  • 124
  • 125
  • 126
  • 127
  • 128
  • 129
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms
  • Disrupting Lumma Stealer: Microsoft leads global action against favored cybercrime tool
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • Privilege Under Fire: Protecting Forensic Reports in the Wake of a Data Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.