DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Nvidia breached by attackers who seem shocked by hack-back

Posted on February 26, 2022 by Dissent

Ian King and William Turton report: A cyber breach suffered by Nvidia Corp. in recent days appears to have been a ransomware attack that’s not connected to the crisis in Ukraine, according to a person familiar with the incident. The hack looks to be relatively minor and not fueled by geopolitical tensions, said the person, who asked…

Read more

LA: Spine Diagnostic & Pain Treatment patient files show up on ransomware site

Posted on February 25, 2022 by Dissent

It looks like we may need to add Spine Diagnostic & Pain Treatment to our list of medical entities hit by ransomware groups.  Conti Team added the Louisiana provider to their leak site earlier today, dumping 3,351 files that they claim represent 30% of all the files they exfiltrated. Inspection of the files, which compromised…

Read more

Conti ransomware group threatens retaliatory attacks on critical infrastructure of countries that attack Russia

Posted on February 25, 2022 by Dissent

Eric Geller reports: A Russian ransomware gang on Friday threatened to hack the critical infrastructure of any nation or organization that retaliates against Moscow for its invasion of Ukraine, according to a statement shared by cybersecurity researchers. Read more at Politico. Here is Conti’s “Warning,” as posted on their site (the following appears to be a revision…

Read more

KS: Hays schools hacked with ransomware

Posted on February 24, 2022 by Dissent

I seem to have missed this report that appeared on February 17. Preston Burrows reported on a Kansas school district incident: On Thursday, Hays USD 489 experienced a cyberattack on its systems with ransomware. This type of cyberattack locks users out of their systems and only returns access once the requested ransom is paid. Many…

Read more

Russian hackers infect network devices with new botnet malware

Posted on February 24, 2022 by Dissent

Dan Goodin reports: Hackers for one of Russia’s most elite and brazen spy agencies have infected home and small-office network devices around the world with a previously unseen malware that turns the devices into attack platforms that can steal confidential data and target other networks. Cyclops Blink, as the advanced malware has been dubbed, has…

Read more

Ransomware extortion doesn’t stop after paying the ransom

Posted on February 23, 2022 by Dissent

Who would have thought that criminals might lie? Where’s my shocked face? Bill Toulas reports on findings from a survey by Venafi. Here is some of what they found: 83% of all ransomware victims who paid the requested amount were extorted again, twice, or even three times. 18% of victims who paid the ransom still…

Read more
  • Previous
  • 1
  • …
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • …
  • 744
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Checkout.com Discloses Data Breach After Extortion Attempt
  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • OpenAI fights order to turn over millions of ChatGPT conversations
  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.