DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

KS: Hutchinson Community Foundation reports ransomware incident

Posted on October 10, 2016 by Dissent

The Hutchinson Community Foundation is making donors, vendors and other stakeholders aware of a data breach that might have compromised personal and financial information. […] The breach came to the Community Foundation staff’s attention Sept. 19, when ransomware was discovered on the foundation’s network server. Ransomware encrypts files until a “ransom” is paid. Fortunately, the…

Read more

TN: Hutton Hotel notifying guests of breach that began in 2012

Posted on October 1, 2016 by Dissent

Hutton Hotel in Nashville is notifying guests of a that first began on September 23, 2012. In their notification, they write that after being alerted to a potential problem by their payment processor, their outside consultants determined that unknown individuals had been able to install a program on the payment processing system in September 2012. The program could have…

Read more

MS: Urgent Care Clinic of Oxford notifies patients of ransomware attack

Posted on October 1, 2016 by Dissent

Urgent Care Clinic of Oxford is notifying patients seen prior to August 2, 2016 of what sounds like a ransomware attack. In their notification letter, they say that sometime in early July, their server was hacked. The breach was discovered on August 2nd when staff noticed the computer system running more slowly than usual. From the sound of their…

Read more

California CPA firm hacked to file fraudulent returns

Posted on October 1, 2016 by Dissent

On August 15, 2016, Wheeler & Egger, CPAs, LLP discovered a data security incident involving their firm and some of their clients whose 2015 tax returns were on Extension.  After thorough investigation, they have discovered that the perpetrator(s) hacked into their system, and between August 3rd and 9th 2016, fraudulently filed 45 client tax returns. Letters were mailed to…

Read more

UPDATE: 5,000 Marin Medical Practices Concepts patient records lost during recovery from ransomware attack

Posted on September 30, 2016 by Dissent

In August, I noted a ransomware attack on Marin Medical Practices Concepts (MMPC), a business associate providing billing and EMR services to many physicians. The ransomware prevented the physicians from accessing patient records for more than 10 days, and Marin decided to pay an undisclosed amount of ransom. In an August 4 statement, however, they…

Read more

NJ Spine Center saw no other option but to pay ransom

Posted on September 29, 2016 by Dissent

Oof. This notification from the New Jersey Spine Center, sent to patients on September 22, describes a real disaster where not only essential patient files and credit card information were locked up, but their most recent backup was too.  No wonder they paid the ransom. On July 27, 2016, our computer systems were attacked by a malware…

Read more
  • Previous
  • 1
  • …
  • 609
  • 610
  • 611
  • 612
  • 613
  • 614
  • 615
  • …
  • 733
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ransomware in Italy, strike at the Diskstation gang: hacker group leader arrested in Milan
  • A year after cyber attack, Columbus could invest $23M in cybersecurity upgrades
  • Gravity Forms Breach Hits 1M WordPress Sites
  • Stormous claims to have protected health info on 600,000 patients of North Country Healthcare. The data appear fake. (1)
  • Back from the Brink: District Court Clears Air Regarding Individualized Damages Assessment in Data Breach Cases
  • Multiple lawsuits filed against Doyon Ltd over April 2024 data breach and late notification
  • Chinese hackers suspected in breach of powerful DC law firm
  • Qilin Emerged as The Most Active Group, Exploiting Unpatched Fortinet Vulnerabilities
  • CISA tags Citrix Bleed 2 as exploited, gives agencies a day to patch
  • McDonald’s McHire leak involving ‘123456’ admin password exposes 64 million applicant chat records

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Here’s What a Reproductive Police State Looks Like
  • Meta investors, Zuckerberg to square off at $8 billion trial over alleged privacy violations
  • Australian law is now clearer about clinicians’ discretion to tell our patients’ relatives about their genetic risk
  • The ICO’s AI and biometrics strategy
  • Trump Border Czar Boasts ICE Can ‘Briefly Detain’ People Based On ‘Physical Appearance’
  • DeleteMyInfo Wins 2025 Digital Privacy Excellence Award from Internet Safety Council
  • TikTok Loses First Appeal Against £12.7M ICO Fine, Faces Second Investigation by DPC

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.