DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

DrBenLynch.com notifies customers of payment card compromise

Posted on December 20, 2018 by Dissent

DrBenLynch.com is a commercial site that focuses on naturopathic research and supplements. At least I think it does. The site is down right now “for maintenance,” which seems to be this generation’s euphemism for “OK, we were hacked and we’re fixing things.” As reported to at least a few state attorneys general, DrBenLynch.com experienced a…

Read more

MO: Use BJC’s patient portal to pay your bills? Company announces possible malware breach.

Posted on December 18, 2018 by Dissent

Hana Muslic reports: At least 5,850 people have been alerted about a possible breach of credit card information through Barnes-Jewish Company HealthCare’s online payment portal. On Nov. 19, BJC learned information submitted through the portal could have been intercepted through the use of a malicious computer software that had been installed on their website, a…

Read more

GA: Mind & Motion notifies 16,000 after ransomware attack

Posted on December 13, 2018 by Dissent

One of the newer incidents appearing on HHS’s public breach tool this week is a report from Mind & Motion, LLC in Georgia.  Mind & Motion offers various types of therapeutic modalities.  On September 30th, 2018,  they discovered that their server had been attacked with ransomware. In a notification to patients, they write: We have…

Read more

Ticketmaster tells customer it’s not at fault for site’s Magecart malware pwnage

Posted on December 13, 2018 by Dissent

From the maybe-if-we-just-say-it’s-not-our-fault? dept, Gareth Corfield reports: Ticketmaster is telling its customers that it wasn’t to blame for the infection of its site by a strain of the Magecart cred-stealing malware – despite embedding third-party Javascript into its payments page. In a letter to Reg reader Mark, lawyers for the controversy-struck event ticket sales website said that Ticketmaster “is…

Read more

Over 40,000 credentials for government portals found online

Posted on December 11, 2018 by Dissent

Catalin Cimpanu reports: A Russian cyber-security firm says it discovered login credentials for more than 40,000 accounts on government portals in more than 30 countries. The data includes usernames and cleartext passwords, and the company believes they might be up for sale on underground hacker forums. Alexandr Kalinin, head of Group-IB’s Computer Emergency Response Team…

Read more

University of Maryland Medical System investigating malware attack

Posted on December 10, 2018 by Dissent

Sarah Meehan reports: The University of Maryland Medical System is investigating a malware attack on its computer system that occurred early Sunday, according to the hospital network. A ransomware-style attack affected about 250 of the hospital system’s 27,000 devices, said Jon Burns, the hospital system’s senior vice president and chief information officer. Because the group’s…

Read more
  • Previous
  • 1
  • …
  • 540
  • 541
  • 542
  • 543
  • 544
  • 545
  • 546
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.