DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Winnti Group targeting universities in Hong Kong

Posted on January 31, 2020 by Dissent

Mathieu Tartare  writes: In November 2019, we discovered a new campaign run by the Winnti Group against two Hong Kong universities. We found a new variant of the ShadowPad backdoor, the group’s flagship backdoor, deployed using a new launcher and embedding numerous modules. The Winnti malware was also found at these universities a few weeks…

Read more

Three suspects arrested in Maltese bank cyber-heist

Posted on January 31, 2020 by Dissent

Catalin Cimpanu reports: British police have arrested yesterday three individuals that they believe are involved in the February 2019 hack of Bank of Valletta (BOV), one of Malta’s biggest banks. National Crime Agency (NCA) officers arrested two males, aged 22 and 17, in London, and a third suspect, a 39-year-old male in Belfast, Northern Ireland….

Read more

CA: Mountain View High School teachers and administrators forced offline after cyber attacker breaches district

Posted on January 30, 2020 by Dissent

Staff at this student-run publication report: The school collected attendance on paper this morning after an unknown digital attacker breached MVLA digital systems, locking many district teachers and administrators out of their MVLA Microsoft accounts and in some cases, other necessary accounts such as Gmail and Aeries, according to MVHS Principal David Grissom. Grissom said…

Read more

INTERPOL supports arrest of cybercriminals targeting online shopping websites in Operation Night Fury

Posted on January 30, 2020 by Dissent

More coverage on the collaborative law enforcement/private sector operation: January 27, SINGAPORE – An INTERPOL-coordinated cyber operation against a strain of malware targeting e-commerce websites has identified hundreds of compromised websites and led to the arrest of three individuals running the malicious campaign in Indonesia. The malware, known as a JavaScript-sniffer, targets online shopping websites….

Read more

DOD contractor suffers ransomware infection

Posted on January 29, 2020 by Dissent

Catalin Cimpanu reports: Electronic Warfare Associates (EWA), a 40-year-old electronics company and a well-known US government contractor, has suffered a ransomware infection, ZDNet has learned. The infection hit the company last week. Among the systems that had data encrypted during the incident were the company’s web servers. Read more on ZDNet.

Read more

Privacy, ransomware breach hits Lower Mainland social support group

Posted on January 29, 2020 by Dissent

Jeremy Hainsworth reports: …The Lookout Housing + Health Society, which works in 14 Lower Mainland municipalities, serving 2,500 people a day and housing 1,400 per night, was hit with a ransomware attack. Lookout provides a medical and dental clinic, food bank, needle distribution and community clean-up, HIV and Hep C supports, peer and employment programs and youth counselling programs….

Read more
  • Previous
  • 1
  • …
  • 477
  • 478
  • 479
  • 480
  • 481
  • 482
  • 483
  • …
  • 731
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • DOJ investigates ex-ransomware negotiator over extortion kickbacks
  • Hackers Using PDFs to Impersonate Microsoft, DocuSign, and More in Callback Phishing Campaigns
  • One in Five Law Firms Hit by Cyberattacks Over Past 12 Months
  • U.S. Sanctions Russian Bulletproof Hosting Provider for Supporting Cybercriminals Behind Ransomware
  • Senator Chides FBI for Weak Advice on Mobile Security
  • Cl0p cybercrime gang’s data exfiltration tool found vulnerable to RCE attacks
  • Kelly Benefits updates its 2024 data breach report: impacts 550,000 customers
  • Qantas customers involved in mammoth data breach
  • CMS Sending Letters to 103,000 Medicare beneficiaries whose info was involved in a Medicare.gov breach.
  • Esse Health provides update about April cyberattack and notifies 263,601 people (1)

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Oregon Amends Its Comprehensive Privacy Statute
  • Wisconsin Supreme Court’s Liberal Majority Strikes Down 176-Year-Old Abortion Ban
  • 20 States Sue HHS to Stop Medicaid Data Sharing with ICE
  • Kids are making deepfakes of each other, and laws aren’t keeping up
  • The Trump administration is building a national citizenship data system
  • Supreme Court Decision on Age Verification Tramples Free Speech and Undermines Privacy
  • New Jersey Issues Draft Privacy Regulations: The New

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.