DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Update: Dutch research funding agency, paralyzed by ransomware attack, refuses to pay up

Posted on February 26, 2021 by Dissent

Martin Enserink reports: Hackers published a batch of internal documents from the Netherlands Organisation for Scientific Research (NWO) on the dark web yesterday, after the agency refused to pay up in a ransomware attack. The attack, which began on 8 February, has completely knocked out the agency’s grant application and review process and cut off…

Read more

Morgan County, Missouri: DoppelPaymer publishes the first data stolen during the cyber attack

Posted on February 25, 2021 by Dissent

Marco De Felice reports: Morgan County in Missouri is one of the latest government institutions affected by the DoppelPaymer ransomware group. The ransomware group, during the attack on the County’s computer systems, exfiltrated sensitive documents and some of them were posted on the dark web. Read more on SuspectFile.

Read more

Ransomware attacks fuelled increase in data theft in 2020, says IBM Security

Posted on February 25, 2021 by Dissent

GRC World Forum reports: Ransomware attacks increased 20% in 2020 compared to the previous year, with “double-extortion” tactics used in 59% of cases, according to a report by IBM Security The 2021 X-Force Threat Intelligence Index also showed how criminals pivoted their attacks to businesses and organisations on which global Covid-19 response efforts relied, including hospitals, medical…

Read more

Lazarus targets defense industry with ThreatNeedle

Posted on February 25, 2021 by Dissent

Vyacheslav Kopeytsev and Seongsu Park write: We named Lazarus the most active group of 2020. We’ve observed numerous activities by this notorious APT group targeting various industries. The group has changed target depending on the primary objective. Google TAG has recently published a post about a campaign by Lazarus targeting security researchers. After taking a closer look,…

Read more

PA: Personal info might have been hacked after January Clearfield County cyber attack

Posted on February 24, 2021 by Dissent

WCED News reports: People associated with Clearfield County and the Clearfield County Courthouse could have been affected by a cyber attack on the county’s computer network in January. The county has sent out written notification letters to anyone who might have been affected by the data breach. That letter also includes steps that you might…

Read more

Fears grow data hacked from Reserve Bank may be leaked by CLOP ransomware group

Posted on February 24, 2021 by Dissent

Tom Pullar-Strecker reports: A ransomware gang appears to be releasing confidential data obtained from the hack of customers of US software company Accellion, raising fears that New Zealand banks may be next to have data exposed. The Reserve Bank admitted it had been subject to a serious data breach in January, which occurred when a…

Read more
  • Previous
  • 1
  • …
  • 357
  • 358
  • 359
  • 360
  • 361
  • 362
  • 363
  • …
  • 733
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.