DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Ucar reveals cyberattack earlier this year

Posted on January 20, 2021 by Dissent

Lesechos reports (translation): The vehicle rental company Ucar revealed on Wednesday January 20 that it had been the target of ransomware earlier this year. The hackers found a gateway into its servers and rushed into it. “The full analysis of the attack, its depth and the associated issues, is still ongoing, ” said Nicolas Martin,…

Read more

UK: Trafford bin collection firm suffers major cyber attack with contracts, passports, financial details leaked publicly

Posted on January 19, 2021 by Dissent

Alice Richardson reports: The company in charge of Trafford’s bin collections and cleaning the borough’s street has suffered a major cyber attack and sensitive personal, financial and commercial details have been leaked. Amey PLC, which has a super contract with Trafford council to manage its infrastructure, was targeted by Mount Lock ransomware group in an…

Read more

WA: Okanogan Co. government hit with cyber attack, working to restore systems

Posted on January 19, 2021 by Dissent

Emily Oliver reports: The Okanogan County government is dealing with a computer cyber attack that has impacted its phone system and emails. The attack is also affecting Okanogan County Public Health, according to the Okanogan County Sheriff’s Office. Read more on KXLY. h/t, @Chum1ng0

Read more

CHwapi hospital hit by ransomware; operations canceled, and another city hit

Posted on January 18, 2021 by Dissent

Another hospital has been hit with ransomware. The following is a Google translation of a report The CHwapi, hospital center of Picardy Wallonia in Tournai, was the victim of a computer attack on Sunday evening. All non-urgent operations were canceled on Monday. No ransom demand has been demanded, according to management. The CHwapi was the…

Read more

FIN11 e-crime group shifted to CL0P ransomware and big game hunting

Posted on January 16, 2021 by Dissent

Derek B. Johnson reports: The financially motivated FIN11, which increasingly incorporated CL0P ransomware into their operations in 2020, appeared to rely on low-effort volume techniques like spamming malware for initial entry, but put a substantial amount of effort into each follow-up compromise. “Several of their recent ransom notes explicitly name data stolen from workstations that…

Read more

TX: Hendrick: Computer network breach compromised some patients’ information

Posted on January 16, 2021 by Dissent

Laura Gutschke reports: Hendrick Health System on Friday began notifying patients that some identifying information may have been compromised during a network security breach identified  Nov. 20. An investigation determined that patient information may have been accessible between Oct. 10 and Nov. 9, the release said, including patient names, Social Security numbers, demographic and other limited…

Read more
  • Previous
  • 1
  • …
  • 367
  • 368
  • 369
  • 370
  • 371
  • 372
  • 373
  • …
  • 729
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Episource notifying 5.4 million patients of cyberattack in January
  • Investigation of 2024 Helsinki data breach – Report
  • Major trial underway for data leak that left 72,000 victims in France
  • Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
  • HealthEC Agrees to $5.48 Million Settlement to End Data Breach Lawsuit
  • US offering $10 million for info on Iranian hackers behind IOControl malware
  • Sompo Japan Insurance submits improvement plan after info leakage
  • Moreno Valley, Calif., Schools Report Data Breach
  • The Growing Cyber Risks from AI — and How Organizations Can Fight Back
  • UPDATING: Credit Control Corporation denies any current breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.