DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Hackers hit Vesuvius, UK engineering company shuts down affected systems

Posted on February 8, 2023 by Dissent

Graham Cluley writes: Vesuvius, the London Stock Exchange-listed molten metal flow engineering company, says it has been hit by a cyber attack. This morning, Vesuvius issued an alert that it was “currently managing a cyber incident.” Read more at GrahamCluley.com.

Read more

Ransomware attack may have caused IT breach that shut all four Cork MTU campuses

Posted on February 8, 2023 by Dissent

Liz Dunphy reports: Munster Technological University (MTU) is working with gardaí and the National Cyber Security Centre to establish if a major IT breach that led to the closure of its four Cork campuses is linked to an international ransomware attack on hundreds of organisations. MTU’s four Cork campuses will remain closed today and an update is…

Read more

CISA Releases Recovery Tool for VMware Ransomware Victims

Posted on February 8, 2023 by Dissent

Phil Muncaster reports: The US Cybersecurity and Infrastructure Security Agency (CISA) has published a new script designed to help ransomware victims recover any VMware virtual machines (VMs) impacted by a current global campaign. Ransomware payment tracker Ransomwhere estimated the number of victims at 3800, based on an “internet-wide” scanning effort on Monday. It said four payments had been made…

Read more

Suspected Ransomware Attack Disables Some Systems At Ross Memorial Hospital

Posted on February 7, 2023 by Dissent

Pamela Vanmeer reports: Kawartha 411 News has learned a suspected ransomware attack has hit Ross Memorial Hospital disabling some important diagnostic systems and access to medical files. Patients in the Emergency Department notified Kawartha 411 this morning calling the situation “crazy”.  Patients say staff aren’t able to access the systems needed for treatment and they…

Read more

Clop ransomware has now found a new target

Posted on February 7, 2023 by Dissent

Danny Palmer reports: An experimental new version of a prolific form of ransomware has been seen targeting Linux systems for the first time. Clop ransomware first appeared in 2019 and, despite being hit by arrests and takedowns in 2021, continues to operate today, with the discovery of a new variant indicating the group is still keen to…

Read more

LockBit ransomware gang claims Royal Mail cyberattack

Posted on February 7, 2023 by Dissent

Sergiu Gatlan reports: The LockBit ransomware operation has claimed the cyberattack on UK’s leading mail delivery service Royal Mail that forced the company to halt its international shipping services due to “severe service disruption.” This comes after LockBitSupport, the ransomware gang public-facing representative, previously told BleepingComputer that the LockBit cybercrime group did not attack Royal Mail. Instead, they blamed the attack…

Read more
  • Previous
  • 1
  • …
  • 128
  • 129
  • 130
  • 131
  • 132
  • 133
  • 134
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.