DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Brooks Brothers payment card system compromised for almost one year; customers being alerted

Posted on May 12, 2017 by Dissent

Oh my. It seems that upscale Brooks Brothers had a payment card compromise that went on for almost one year at hundreds of their brick-and-mortar retail and outlet locations. Brooks Brothers recently became aware of a security incident that could affect the payment card information of some customers who made purchases at certain Brooks Brothers…

Read more

Developing: Multiple NHS trusts across England disrupted by ransomware attack

Posted on May 12, 2017 by Dissent

Digital Health is reporting: Multiple hospitals across England have been hit by a large-scale cyber attack on Friday afternoon, with trusts switching off systems. NHS Digital confirmed to Digital Health News that it is aware of a “cyber security incident”. Sources told Digital Health News that there was a major N3 cyber security issue on…

Read more

IL: Pekin high school hit by ransomware and $37,000 demand

Posted on April 30, 2017 by Dissent

Nick Vlahos reports: A cyberattack last weekend has been forcing students, teachers and administrators at Pekin Community High School to forgo its computer systems. That hasn’t been easy. “You really quickly realize how much you rely on technology when you don’t have access to it for a couple of days,” Danielle Owens, the District 303…

Read more

US ISP Goes Down as Two Malware Families Go to War Over Its Modems

Posted on April 26, 2017 by Dissent

Catalin Cimpanu reports: Two malware families battling for turf are most likely the cause of an outage suffered by Californian ISP Sierra Tel at the beginning of the month. This outage took place on April 10, 2017, when Sierra Tel customers started complaining about losing Internet and telephone connectivity. While initially there were unconfirmed rumors…

Read more

Hackers reportedly disable Newark computers and demand $30K ‘ransom’

Posted on April 25, 2017 by Dissent

Paul Milo reported this yesterday: Hackers have disabled some City of Newark computers and are now demanding about $30,000 worth of the online currency Bitcoin to render them operable once again, TAPInto reported Monday. The computers were infected over the weekend with an encryption that affects nearly all files that operate on a desktop, according to…

Read more

The godfather of ransomware returns: Locky is back and sneakier than ever

Posted on April 24, 2017 by Dissent

Danny Palmer reports: The ransomware that drove last year’s boom in file-encrypting malware is back, and this time it’s even harder to detect. Ransomware cost its victims some $1bn during 2016, with Locky one of the most widespread variants, infecting organisations across the globe. However, the start of 2017 saw a sudden decline in the…

Read more
  • Previous
  • 1
  • …
  • 582
  • 583
  • 584
  • 585
  • 586
  • 587
  • 588
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.