DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

CA: Cyberattack targets Santa Clara Valley Transportation Authority

Posted on April 22, 2021 by Dissent

Nico Savidge reports: A cyberattack targeting the Santa Clara Valley Transportation Authority last weekend has forced a days-long shutdown of many of the agency’s computer systems. VTA officials say they believe they have contained the attack, but key systems remained offline Thursday. The authority is still trying to determine whether any personal information of customers…

Read more

Ca: Canac hardware stores victims of a cyberattack

Posted on April 22, 2021 by Dissent

David Remillard reports (translation): The Quebec hardware store Canac was recently the target of a cyber attack, causing computer failures for nearly two weeks. For the moment, nothing suggests that sensitive data has been stolen. The cyberattack took place on April 9, confirms Patrick Delisle, the company’s marketing director. The firm seems to be cautiously optimistic…

Read more

Will Beacon Health Solutions’ incident prompt OCR to start enforcing notification “without undue delay?”

Posted on April 22, 2021 by Dissent

The following is a DataBreaches.net commentary. Beacon Health Solutions issued a press release yesterday about a breach they experienced last year as a business associate.  Their press release provides a useful example of why OCR needs to get serious about enforcing the requirement that entities notify patients within 60 days of “discovery.” “Discovery” does not…

Read more

Palestinian Hackers Tricked Victims Into Installing iOS Spyware

Posted on April 22, 2021 by Dissent

Lily Hay Newman reports: Hacking activity in the Gaza Strip and West Bank has ramped up in recent years as rival Palestinian political parties spar with each other, the Israeli-Palestinian conflict continues, and Palestinian hackers increasingly establish themselves on the global stage. Now, Facebook has uncovered two digital espionage campaigns out of Palestine, active in 2019 and 2020, that…

Read more

Massive Qlocker ransomware attack uses 7zip to encrypt QNAP devices

Posted on April 22, 2021 by Dissent

Lawrence Abrams reports: A massive ransomware campaign targeting QNAP devices worldwide is underway, and users are finding their files now stored in password-protected 7zip archives. The ransomware is called Qlocker and began targeting QNAP devices on April 19th, 2021. Since then, there has been an enormous amount of activity in our support forum, and ID-Ransomware…

Read more

NL: Nearly a hundred notary offices victim of hacker

Posted on April 21, 2021 by Dissent

Anton Mous reports: 96 notary offices have become the victims of a cyber attack. On Friday morning, April 16, ICT supplier Managed IT from Nieuwegein was hacked by an unknown attacker. As a precaution, the company and a number of notarial software suppliers have shut down their servers and databases. The cyber attack was spotted last Friday…

Read more
  • Previous
  • 1
  • …
  • 329
  • 330
  • 331
  • 332
  • 333
  • 334
  • 335
  • …
  • 728
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Plastic surgeons often store nude photos of patients with their identity information. When would we call that “negligent?”
  • India: Servers of two city hospitals hacked; police register FIR
  • Ph: Coop Hospital confirms probe into reported cyberattack
  • Slapped wrists for Financial Conduct Authority staff who emailed work data home
  • School Districts Unaware BoardDocs Software Published Their Private Files
  • A guilty plea in the PowerSchool case still leaves unanswered questions
  • Brussels Parliament hit by cyber-attack
  • Sweden under cyberattack: Prime minister sounds the alarm
  • Former CIA Analyst Sentenced to Over Three Years in Prison for Unlawfully Transmitting Top Secret National Defense Information
  • FIN6 cybercriminals pose as job seekers on LinkedIn to hack recruiters

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe
  • AI tools collect and store data about you from all your devices – here’s how to be aware of what you’re revealing
  • 23andMe Privacy Ombudsman Urges User Consent Pre-Data Sale

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.