DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Persist, Brick, Profit -TrickBot Offers New “TrickBoot” UEFI-Focused Functionality

Posted on December 3, 2020 by Dissent

AdvIntel & Eclypsium write: TrickBot malware now has functionality designed to inspect the UEFI/BIOS firmware of targeted systems. This marks a significant step in the evolution of TrickBot. Firmware level threats carry unique strategic importance for attackers. It is clear that TrickBot will benefit greatly from including a UEFI level bootkit in their kill chain….

Read more

Ransomware attack on Hampton Roads Sanitation District knocks out billing system

Posted on December 2, 2020 by Dissent

Robyn Sidersky reports: A ransomware attack on the Hampton Roads Sanitation District’s computer network is affecting all of its customers because the billing system is down. The attack, which occurred on Nov. 17, resulted in the entire network being taken offline, which included suspending the billing system, said HRSD spokeswoman Leila Rice. Read more on…

Read more

CV: Cyber ​​Attack: Government does not confirm ransom request

Posted on December 2, 2020 by Dissent

Islands Express reports (translation follows): The Finance Minister said today he had no information on any type of bailout requested following the cyber attack on the State’s Private Technology Network (RTPE), which occurred on Thursday, 26. “I do not have this information, but what I say is that the important thing is that until now…

Read more

K12 online schooling giant pays Ryuk ransomware to stop data leak

Posted on December 2, 2020 by Dissent

Lawrence Abrams reports: Online education giant K12 Inc. has paid a ransom after their systems were hit by Ryuk ransomware in the middle of November. K12 creates tailored online learning curriculums for students to learn from home while in kindergarten through 12th grade. Over 1 million students have utilized K12 to learn from home rather…

Read more

Intersport victim of cyberattack for a second time in 2020?

Posted on December 2, 2020 by Dissent

First it was a Magecart attack on their web sites in Slovenia, Croatia, Serbia, Bosnia and Hercegovina and Montenegro, as reported in June. Now it appears to be a ransomware attack by Conti threat actors, who dumped more than two dozen files as alleged proof of access and exfiltration from the international sporting goods retailer….

Read more

Statement by Gardiner Public Schools about Ransomware Attack

Posted on December 2, 2020 by Dissent

On November 26, DataBreaches.net reported that two more k-12 districts appeared to have been attacked by ransomware threat actors. One was Spring ISD in Houston, Texas, but DataBreaches.net did not name the other district at the time as they had not confirmed the breach. DataBreaches.net has now received a statement from the Gardiner Public Schools…

Read more
  • Previous
  • 1
  • …
  • 387
  • 388
  • 389
  • 390
  • 391
  • 392
  • 393
  • …
  • 729
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Credit Control Corporation data allegedly from 9.1 million consumers listed for sale on forum
  • Copilot AI Bug Could Leak Sensitive Data via Email Prompts
  • FTC Provides Guidance on Updated Safeguards Rule
  • Sentara Health terminates remote employees after realizing they couldn’t be sure who was doing the work.
  • Hackers Break Into Car Sharing App, 8.4 Million Users Affected
  • Cyberattack pushes German napkin company into insolvency
  • WMATA Train Operators Arrested in Health Care Fraud Scheme
  • Washington Post investigating cyberattack on journalists, WSJ reports
  • Resource: State Data Breach Notification Laws – June 2025
  • WestJet investigates cyberattack disrupting internal systems

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe
  • Would you — or wouldn’t you?
  • New York passes a bill to prevent AI-fueled disasters
  • Synthetic Data and the Illusion of Privacy: Legal Risks of Using De-Identified AI Training Sets
  • States sue to block the sale of genetic data collected by DNA testing company 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.