DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Regis University paid ransom after cyberattack last fall

Posted on January 29, 2020 by Dissent

Noel Brennan reports: Six months after Regis University computers were targeted in a cyberattack, the university hosted a conference to help government agencies, businesses and schools better defend and recover from similar attacks. […] “Regis did pay the ransom to get the systems back up as quickly as we could,” said Jennifer Forker, a spokesperson…

Read more

Maze Team updates its site, dumps more victims’ data

Posted on January 28, 2020 by Dissent

The Maze Team attackers continue to announce more of their ransomware victims that have not complied with their ransom demands, and they continue to dump data from those who do not pay them. When I checked their site again today, I noticed that they had announced that they have dumped all their files on the…

Read more

The average ransom demand for a REvil ransomware infection is a whopping $260,000

Posted on January 28, 2020 by Dissent

Catalin Cimpanu reports: .. in a report published today and shared with ZDNet, the security team at KPN, a Dutch telecommunications provider, said it was able to sinkhole and intercept the communications between REvil-infected computers and the REvil ransomware’s command-and-control (C&C) servers. KPN researchers say this allowed them to obtain unique insights into the operations of the…

Read more

Georgia’s state agencies nearly recovered from last July’s Ryuk attack

Posted on January 27, 2020 by Dissent

Maggie Lee reports: About six months later and $750,000 poorer, Georgia is nearly back to normal after online attacks that blocked law enforcement officers and the public from accessing electronic records used to settle legal questions. But the money went to pay cyberattack insurance deductibles, not ransoms. Read more on Georgia Recorder.

Read more

SC: Tidelands Health named in class action lawsuit after December ransomware attack

Posted on January 27, 2020 by Dissent

Andrew James reports on a ransomware attack on a South Carolina system that has yet to show up on HHS’s public breach tool: The impacts of the December 12 cyberattack on the Tidelands Health Hospital System are unclear, but what is clear is that patients feel they were victimized as a result of negligence. A…

Read more

Magecart gang arrested in Indonesia

Posted on January 27, 2020 by Dissent

Catalin Cimpanu reports: Interpol and Indonesian police have arrested three men on suspicion of being part of a cybercrime group engaged in Magecart attacks. […] The suspects were only identified by their initials: ANF (27 years), K (35 years), and N (23 years), from he regions of Jakarta and Yogyakarta. Read more on ZDNet.

Read more
  • Previous
  • 1
  • …
  • 491
  • 492
  • 493
  • 494
  • 495
  • 496
  • 497
  • …
  • 744
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Suspected Russian hacker reportedly detained in Thailand, faces possible US extradition
  • Did you hear the one about the ransom victim who made a ransom installment payment after they were told that it wouldn’t be accepted?
  • District of Massachusetts Allows Higher-Ed Student Data Breach Claims to Survive
  • End of the game for cybercrime infrastructure: 1025 servers taken down
  • Doctor Alliance Data Breach: 353GB of Patient Files Allegedly Compromised, Ransom Demanded
  • St. Thomas Brushed Off Red Flags Before Dark-Web Data Dump Rocks Houston
  • A Wiltshire police breach posed possible safety concerns for violent crime victims as well as prison officers
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Almost two years later, Alpha Omega Winery notifies those affected by a data breach.
  • Court of Appeal reaffirms MFSA liability in data leak case, orders regulator to shoulder costs

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Lawmakers Warn Governors About Sharing Drivers’ Data with Federal Government
  • As shoplifting surges, British retailers roll out ‘invasive’ facial recognition tools
  • Data broker Kochava agrees to change business practices to settle lawsuit
  • Amendment 13 is gamechanger on data security enforcement in Israel
  • Changes in the Rules for Disclosure for Substance Use Disorder Treatment Records: 42 CFR Part 2: What Changed, Why It Matters, and How It Aligns with HIPAAs

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net
Security Issue: security[at]databreaches.net
Mastodon: Infosec.Exchange/@PogoWasRight
Signal: +1 516-776-7756
DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.