DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

France warns of new ransomware gang targeting local governments

Posted on March 19, 2020 by Dissent

Catalin Cimpanu reports on a new ransomware threat to local governments. France’s cybersecurity agency sounded the alarm. The alert, issued by France’s CERT team, points to a rising number of attacks carried out with a new version of the Mespinoza ransomware strain, also known as the Pysa ransomware. This ransomware strain was first spotted making victims last…

Read more

New Nefilim Ransomware Threatens to Release Victims’ Data

Posted on March 18, 2020 by Dissent

Lawrence Abrams reports: A new ransomware called Nefilim that shares much of the same code as Nemty has started to become active in the wild and threatens to release stolen data. Nefilim became active at the end of February 2020 and while it not known for sure how the ransomware is being distributed, it is…

Read more

Hackers hit NutriBullet website with credit card-stealing malware

Posted on March 18, 2020 by Dissent

Zack Whittaker reports: Magecart hackers have struck again, this time targeting the NutriBullet  website. According to new research by security firm RiskIQ, hackers broke into the blender maker’s website several times over the past two months, injected malicious credit card-skimming malware on its payment pages and siphoned off the credit card numbers and other personal data —…

Read more

PXJ Ransomware Campaign Identified by X-Force IRIS

Posted on March 16, 2020 by Dissent

Megan Roddie and Limor Kessem write: In a recent analysis from IBM’s X-Force Incident Response and Intelligence Services (IRIS), our team discovered activity related to a new strain of ransomware known as “PXJ” ransomware. This malware is also known as “XVFXGW” ransomware. The name PXJ is derived from the file extension that is appended to…

Read more

Maze Team statement ridicules security “experts” and IT administrators who try to cover up breaches

Posted on March 14, 2020 by Dissent

Those who have been watching Maze Team and other ransomware groups are already aware that Maze Team has quietly continued to actively attack entities. Those who do not pay their demands will likely find themselves listed on the threat actors’ website with some of their data publicly dumped for anyone who wants to download it….

Read more

Two healthcare-related entities disappeared from Maze Team’s website …. why?

Posted on March 14, 2020 by Dissent

Over the past few months, I have regularly checked Maze Team’s website to see if any of the entities they are listing are in the healthcare space. As I reported in the past, Maze Team did hit a number of healthcare-related entities, not all of which have been named on their website. But there were…

Read more
  • Previous
  • 1
  • …
  • 462
  • 463
  • 464
  • 465
  • 466
  • 467
  • 468
  • …
  • 732
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Hunters International to provide free decryptors for all victims as they shut down (1)
  • SEC and SolarWinds Seek Settlement in Securities Fraud Case
  • Cyberattacks Disrupt Iran’s Bread Distribution, Payments Remain Frozen
  • Hacker with ‘political agenda’ stole data from Columbia, university says
  • Keymous+ Hacker Group Claims Responsibility for Over 700 Global DDoS Attacks
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Record-Breaking $1.55M CCPA Settlement Against Health Information Website Publisher
  • Ninth Circuit Reviews Website Tracking Class Actions and the Reach of California’s Privacy Law
  • US healthcare offshoring: Navigating patient data privacy laws and regulations
  • Data breach reveals Catwatchful ‘stalkerware’ is spying on thousands of phones
  • Google Trackers: What You Can Actually Escape And What You Can’t
  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.