DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Conti, REvil, LockBit ransomware bugs exploited to block encryption

Posted on May 4, 2022 by Dissent

Ionut Ilascu reports: Hackers commonly exploit vulnerabilities in corporate networks to gain access, but a researcher has turned the table by finding exploits in the most common ransomware and malware being distributed today. Malware from notorious ransomware operations like Conti, the revived REvil, the newcomer Black Basta, the highly active LockBit, or AvosLocker, all came with…

Read more

Lincoln College was already struggling. Then came ransomware.

Posted on May 4, 2022 by Dissent

Emily Bamforth reported this on April 21 on EdScoop. Somehow I missed it, but it’s so important that I am adding it now: As Illinois’ Lincoln College approached its two-week winter hiatus last December, workers walked in one weekend to find printers spewing threatening notes saying the school’s data was locked up and could only…

Read more

Lockbit ransomware attack cripples parts of German library service

Posted on May 4, 2022 by Dissent

Graham Cluley reports: One of the largest library services in Germany, EKZ Bibliotheksservice, has been impacted by a ransomware attack that has left book lovers unable to rent and borrow eBooks, audio books, and electronic magazines. In an FAQ on its website, Reutlingen-based EKZ says it is currently trying to repair the damage caused by the…

Read more

Security is a pain for American Dental Association: Ransomware infection feared

Posted on May 3, 2022 by Dissent

Jessica Lyons Hardcastle reports: The Black Basta crime gang has claimed it infected the American Dental Association with ransomware. While the professional association confirmed to The Register it was the victim of a “cybersecurity incident” that occurred on or around April 21, it did not disclose the nature of the attack. As of Friday last week, the organization…

Read more

REvil ransomware returns: New malware sample confirms gang is back

Posted on May 3, 2022 by Dissent

Lawrence Abrams reports: The notorious REvil ransomware operation has returned amidst rising tensions between Russia and the USA, with new infrastructure and a modified encryptor allowing for more targeted attacks. In October, the REvil ransomware gang shut down after a law enforcement operation hijacked their Tor servers, followed by arrests of members by Russian law enforcement. […] A…

Read more

Conti ransomware group responsible for RIPTA cyberattack

Posted on May 3, 2022 by Dissent

Tolly Taylor reports: The ransom note the Rhode Island Public Transit Authority received on Aug. 5 began with a chilling statement. “All of your files are currently encrypted by Conti strain,” the cyberhackers wrote. The next day, RIPTA hired Coveware Inc., a firm that helps entities recover hacked data, according to new documents obtained by…

Read more
  • Previous
  • 1
  • …
  • 208
  • 209
  • 210
  • 211
  • 212
  • 213
  • 214
  • …
  • 732
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • No need to hack when it’s leaking: Brandt Kettwick Defense edition
  • SK Telecom to be fined for late data breach report, ordered to waive cancellation fees, criminal investigation into them launched
  • Louis Vuitton Korea suffers cyberattack as customer data leaked
  • Hunters International to provide free decryptors for all victims as they shut down (2)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.