DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Those annoying sextortion scams are redirecting users to GandCrab ransomware now

Posted on December 8, 2018 by Dissent

Okay, I tend to laugh at the sextortion emails and have tweeted or posted some of them at times, usually after I check the referenced BTC wallet to see if anyone actually fell for the scam and paid.  But Catalin Cimpanu reports on a new – and important – development: This past week, users in…

Read more

Hackers steal $800,000 from Cape Cod Community College

Posted on December 8, 2018 by Dissent

Laura Krantz reports: Hackers stole more than $800,000 from Cape Cod Community College last week when they infiltrated the school’s bank accounts, the school notified its employees Friday. Several computers in the school’s Nickerson Administration Building were hacked by a phishing scheme that used malware to obtain access to the school’s accounts, according to an…

Read more

Clothing company OppoSuits hit by Magecart attack

Posted on December 6, 2018 by Dissent

Sam Varghese reports: Customers of Dutch clothing company OppoSuits have been warned to monitor their credit card accounts after the firm reported that malware planted on its website could have stolen the details of customers who made purchases from its Australian, Canadian, EU and UK websites. In a statement on Monday (Tuesday Australian time), the…

Read more

Credit card stealing malware on Canada’s 1-800-FLOWERS website went undetected for four years

Posted on December 5, 2018 by Dissent

Zack Whittaker reports: It’s going to take more than a bunch of posies to make up for this one. The Canadian branch of 1-800-FLOWERS revealed in a filing with the California attorney general’s office that malware on its website had siphoned off customers’ credit cards over a four-year period. Four years. Let that sink in….

Read more

Cyber-espionage group uses Chrome extension to infect victims

Posted on December 5, 2018 by Dissent

Catalin Cimpanu reports: In what appears to be a first on the cyber-espionage scene, a nation-state-backed hacking group has used a Google Chrome extension to infect victims and steal passwords and cookies from their browsers. This is the first time an APT (Advanced Persistent Threat –an industry term for nation-state hacking groups) has been seen…

Read more

Over 20,000 PCs infected with new ransomware strain in China

Posted on December 4, 2018 by Dissent

Catalin Cimpanu reports: Over 20,000 Chinese users have had their Windows PCs infected with a new strain of ransomware that encrypts their files and demands a 110 yuan (~$16) ransom. The ransomware is exclusively targeting the Chinese internet space, and there’s no threat to international users, at least yet. Read more on ZDNet.

Read more
  • Previous
  • 1
  • …
  • 548
  • 549
  • 550
  • 551
  • 552
  • 553
  • 554
  • …
  • 733
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident
  • Obligations under Canada’s data breach notification law
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.