DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

TN: ‘Data security incident’ shuts down Montgomery County’s computer network

Posted on September 27, 2020 by Dissent

Chris Smith reports: Montgomery County’s government networks were taken down over the weekend during a “data security incident” that started on Friday. While several websites were accessible to the public on Sunday, they had limited functionality. Read more on Clarksville Now.

Read more

Nebraska Medicine was victim of cyber attack

Posted on September 25, 2020 by Dissent

 Kevin Westhues reports: Nebraska Medicine confirmed Thursday night that it was the victim of a cyber attack. The attack caused a significant downtime for its information technology system, leading to many postponed appointments throughout the week. The entity issued a statement on Thursday that says, in part: Earlier this week Nebraska Medicine experienced a significant…

Read more

Fallout From The Ransomware Attack At Illinois Valley Community College Is Still Far From Over

Posted on September 24, 2020 by Dissent

Peter Medlin has an update on the Pysa (mespinoza) ransomware attack on Illinois Valley Community College that was first disclosed in April. The college had not paid the ransom demand, and has continued to work to recover from the attack. Medlin notes: In the months since the ransomware incident, IVCC has had to rebuild and…

Read more

Interim Report on Blackbaud Breach: 5.6 million patients and counting…

Posted on September 24, 2020 by Dissent

Since our first interim report, DataBreaches.net has continued to compile reports that mention patient information that was disclosed to Blackbaud and that may have been accessed or exfiltrated by ransomware threat actors in the data breach discovered in May. Despite the criminals pinky-swearing that they wouldn’t misuse the data and would destroy it all in…

Read more

More drama in the world of ransomware? Was Vard Group victimized twice?

Posted on September 24, 2020 by Dissent

Now what happened here?  The Sodinokibi (“REvil”) ransomware operators have a new post that seems to claim that one of their victims was defrauded by a recovery company to the tune of $5.5 million. Vard Group, a Norwegian unit of shipbuilder Fincantieri SpA, was attacked in June 2020. But what happened next? It sounds like the…

Read more

Government software provider Tyler Technologies appears to have been hit by RansomExx ransomware – report

Posted on September 24, 2020 by Dissent

Lawrence Abrams reports: Leading government technology services provider Tyler Technologies has suffered a ransomware attack that has disrupted its operations. Tyler Technologies is one of the largest U.S. software development and technology services companies dedicated to the public sector. Read more on BleepingComputer.

Read more
  • Previous
  • 1
  • …
  • 431
  • 432
  • 433
  • 434
  • 435
  • 436
  • 437
  • …
  • 744
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Washington Post hack exposes personal data of John Bolton, almost 10,000 others
  • Draft UK Cyber Security and Resilience Bill Enters UK Parliament
  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Maryland Privacy Crackdown Raises Bar for Disclosure Compliance
  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.