DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

FABEN Obstetrics and Gynecology notifies more than 6,000 patients after ransomware attack

Posted on January 31, 2019 by Dissent

On November 21,  the FABEN OB/GYN practice in Florida got infected with GandCrab ransomware. They do not disclose how that happened, but the problem was detected quickly. To mitigate any damage or risk, FABEN decided to delete the infected files and restore files from backups. But they didn’t have backups of all files. Any files…

Read more

‘Worst’ Ransomware Attack Hits Salisbury Police Department in Maryland

Posted on January 24, 2019 by Dissent

NBC Washington reports: A Maryland police department says it experienced its “worst computer network attack” in its history, after the attacker accessed its network through a longtime software vendor. Salisbury police Capt. Rich Kaiser tells The Daily Times of Salisbury that the department’s entire internal computer network was compromised Jan. 9 in a ransomware attack….

Read more

Alaska notifying at least 500,000 residents about data security breach previously disclosed in June

Posted on January 23, 2019 by Dissent

Update:   The state subsequently revised its estimate to 87,000 letters.  How did it get the numbers so wrong — apart from the question of why it has taken so long to send out notifications. This does NOT inspire confidence in the state’s ability to protect ePHI and to notify people promptly in the event…

Read more

New Rumba STOP Ransomware Being Installed by Software Cracks

Posted on January 21, 2019 by Dissent

Lawrence Abrams reports: The STOP ransomware has seen very heavy distribution over the last month using adware installers disguised as cracks. This campaign continues with a new variant released over the past few days that appends the .rumba extension to the names of encrypted files. Using adware bundles and software cracks as a new distribution method, STOP…

Read more

Graeter’s: Website breach could compromise 12,000 customers’ credit card data

Posted on January 21, 2019 by Dissent

WLWT reports: Cincinnati-based Graeter’s ice cream has issued notices to thousands of customers: Your credit card information may be compromised. The ice cream chain sent out 12,000 notices to customers who made purchases on Graeter’s website last year, saying that an “unauthorized code” was added to the website’s checkout page. As a result, thousands of…

Read more

South Africans’ airtime and data stolen through malicious smartphone app

Posted on January 21, 2019 by Dissent

Jamie McKane reports: Mobile technology company Upstream announced earlier this month that it had detected a suspicious weather forecast application which was pre-installed on Alcatel smartphones. The company’s security platform, Secure-D, detected suspicious activity initiated by this application across multiple countries – most notably in Brazil and Malaysia, although South Africa was also affected. The…

Read more
  • Previous
  • 1
  • …
  • 536
  • 537
  • 538
  • 539
  • 540
  • 541
  • 542
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.