DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Hackers use Conti’s leaked ransomware to attack Russian companies

Posted on April 9, 2022 by Dissent

Lawrence Abrams reports: A hacking group used the Conti’s leaked ransomware source code to create their own ransomware to use in cyberattacks against Russian organizations. […] However, the tables have now turned, with a hacking group known as NB65 now targeting Russian organizations with ransomware attacks. Read more at BleepingComputer.

Read more

East Tennessee Children’s Hospital updates information on ransomware incident

Posted on April 8, 2022 by Dissent

On March 15, this site noted that the East Tennessee Children’s Hospital had posted a notice about an IT security incident. At the time, they did not identify the incident as a ransomware incident. DataBreaches.net subsequently found some explanation for that notice — a listing on a Russian-language forum offering data from ETCH with numerous…

Read more

Five ransomware groups, five victims… will it ever ease up?

Posted on April 7, 2022 by Dissent

The following is a snapshot of recent attacks on U.S. healthcare entities by ransomware teams. #1 First Choice Community Healthcare – Hive Hive threat actors have never sworn off attacking the healthcare sector. In addition to claiming that they attacked the Partnership HealthPlan of California on March 19 (an attack that has impacted PHPC’s functioning),…

Read more

Ransomware negotiations are taking longer (and that’s a good thing)

Posted on April 7, 2022 by Dissent

Joe Uchill reports: It’s taking longer to negotiate ransomware demands. That is a good thing. Law firm BakerHosteler, which handles more than 1,250 cyber-related incidents a year, said in its annual Data Security and Incident Response report that the typical ransomware negotiation for its clients in 2021 lasted eight days. That is roughly twice as long as…

Read more

MO: Tague Family Practice patient records stolen and leaked

Posted on April 6, 2022 by Dissent

Tague Family Practice (TFP) in St. Louis, Missouri is a primary care practice that strives to maintain the traditional care model of a doctor who spends time getting to know you and providing preventative care as well as care for acute problems or chronic conditions. On some date unknown to DataBreaches.net, the practice fell victim…

Read more

I-SEC attacked by Conti threat actors

Posted on April 5, 2022 by Dissent

I-SEC is one of the main providers in the field of aviation security checks according to §5 LuftSiG (German Aviation Security Law) in Frankfurt.  Conti threat actors added I-SEC to their leak site and have provided some proof of claim. There is no notice on I-SEC’s website at the time of this publication. DataBreaches.net sent…

Read more
  • Previous
  • 1
  • …
  • 226
  • 227
  • 228
  • 229
  • 230
  • 231
  • 232
  • …
  • 744
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.