DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Voter, Bee databases hit with ransomware attack

Posted on February 8, 2018 by Dissent

Adam Ashton reports: Two Sacramento Bee databases on a third-party computer server were seized last month by an anonymous hacker who demanded The Bee pay a ransom in Bitcoin to get the data back. The intrusion, which was discovered by a Bee employee last week, exposed one database containing California voter registration data from the…

Read more

TN: Smith Dental notifies HHS of ransomware attack affecting 1,500

Posted on February 7, 2018 by Dissent

On January 22, Robert Smith, DMD, PC in Tennessee reported a breach to HHS. The report indicated that 1,500 patients were impacted by a hacking/IT incident involving their network. A Google search indicated that the practice was likely to be “Smith Dental” in Tennessee. But I could find no press release or statement on their…

Read more

Columbia University grad arrested for using key logger software

Posted on February 6, 2018 by Dissent

Robert Abel reports: A Columbia University grad student was arrested for leaving key logger malware on USB sticks left throughout the campus. Bill Liang Lin Wu, 23 was arrested Thursday after he was caught on camera leaving the credential stealing devices on a host of university computers shared by 14 professors. Wu graduated last spring…

Read more

Malware incident discovered in May, 2017 affected 2,600 patients: Partners HealthCare System

Posted on February 5, 2018 by Dissent

Partners HealthCare System, whose hospitals include Massachusetts General and Brigham and Women’s, revealed today that it had discovered a malware attack in May, 2017 that may have exposed 2,600 patients’ information. They learned of the problem on May 8, but because data was mixed in with code, numbers, other data, and unformatted, it took them quite…

Read more

Data stealing hacking tool “Luminosity Link” taken out of use: National Crime Agency

Posted on February 5, 2018 by Dissent

A cyber hacking tool that allowed criminals to take full control of victims’ machines is no longer available after an operation co-ordinated by the National Crime Agency. The Luminosity Link RAT (a Remote Access Trojan) enabled hackers to connect to a victim’s machine undetected. They could then disable anti-virus and anti-malware software, carry out commands…

Read more

Spain Extradites Russian Hacker Allegedly Implicated in Kelihos To New Haven

Posted on February 2, 2018 by Dissent

Edmund H. Mahony reports: Spain on Friday turned over notorious Russian computer hacker Peter Yuryevich Levashov to FBI cyber detectives in New Haven, who have accused him of developing the Kelihos network of hundreds of thousands of infected computers and using it to stuff inboxes with spam, steal secret financial data and spew malicious programming…

Read more
  • Previous
  • 1
  • …
  • 569
  • 570
  • 571
  • 572
  • 573
  • 574
  • 575
  • …
  • 732
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records
  • Qilin claims attack on Accu Reference Medical Laboratory. It wasn’t the lab’s first data breach.
  • Louis Vuitton hit by data breach in Türkiye, over 140,000 users exposed; UK customers also affected (1)
  • Infosys McCamish Systems Enters Consent Order with Vermont DFR Over Cyber Incident
  • Obligations under Canada’s data breach notification law
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • Air Force Employee Pleads Guilty to Conspiracy to Disclose Unlawfully Classified National Defense Information
  • UK police arrest four in connection with M&S, Co-op and Harrods cyberattacks (1)
  • At U.S. request, France jails Russian basketball player Daniil Kasatkin on suspicion of ransomware conspiracy
  • Avantic Medical Lab hacked; patient data leaked by Everest Group

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC
  • German court offers EUR 5000 compensation for data breaches caused by Meta
  • How to Build on Washington’s “My Health, My Data” Act
  • Department of Justice Subpoenas Doctors and Clinics Involved in Performing Transgender Medical Procedures on Children
  • Google Settles Privacy Class Action Over Period Tracking App
  • ICE Is Searching a Massive Insurance and Medical Bill Database to Find Deportation Targets

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.