DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Conti, REvil, LockBit ransomware bugs exploited to block encryption

Posted on May 4, 2022 by Dissent

Ionut Ilascu reports: Hackers commonly exploit vulnerabilities in corporate networks to gain access, but a researcher has turned the table by finding exploits in the most common ransomware and malware being distributed today. Malware from notorious ransomware operations like Conti, the revived REvil, the newcomer Black Basta, the highly active LockBit, or AvosLocker, all came with…

Read more

Lincoln College was already struggling. Then came ransomware.

Posted on May 4, 2022 by Dissent

Emily Bamforth reported this on April 21 on EdScoop. Somehow I missed it, but it’s so important that I am adding it now: As Illinois’ Lincoln College approached its two-week winter hiatus last December, workers walked in one weekend to find printers spewing threatening notes saying the school’s data was locked up and could only…

Read more

Lockbit ransomware attack cripples parts of German library service

Posted on May 4, 2022 by Dissent

Graham Cluley reports: One of the largest library services in Germany, EKZ Bibliotheksservice, has been impacted by a ransomware attack that has left book lovers unable to rent and borrow eBooks, audio books, and electronic magazines. In an FAQ on its website, Reutlingen-based EKZ says it is currently trying to repair the damage caused by the…

Read more

Security is a pain for American Dental Association: Ransomware infection feared

Posted on May 3, 2022 by Dissent

Jessica Lyons Hardcastle reports: The Black Basta crime gang has claimed it infected the American Dental Association with ransomware. While the professional association confirmed to The Register it was the victim of a “cybersecurity incident” that occurred on or around April 21, it did not disclose the nature of the attack. As of Friday last week, the organization…

Read more

REvil ransomware returns: New malware sample confirms gang is back

Posted on May 3, 2022 by Dissent

Lawrence Abrams reports: The notorious REvil ransomware operation has returned amidst rising tensions between Russia and the USA, with new infrastructure and a modified encryptor allowing for more targeted attacks. In October, the REvil ransomware gang shut down after a law enforcement operation hijacked their Tor servers, followed by arrests of members by Russian law enforcement. […] A…

Read more

Conti ransomware group responsible for RIPTA cyberattack

Posted on May 3, 2022 by Dissent

Tolly Taylor reports: The ransom note the Rhode Island Public Transit Authority received on Aug. 5 began with a chilling statement. “All of your files are currently encrypted by Conti strain,” the cyberhackers wrote. The next day, RIPTA hired Coveware Inc., a firm that helps entities recover hacked data, according to new documents obtained by…

Read more
  • Previous
  • 1
  • …
  • 202
  • 203
  • 204
  • 205
  • 206
  • 207
  • 208
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Dutch Government: More forms of espionage to be a criminal offence from 15 May onwards
  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.