DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

CT: Alerted that banks had discovered a problem, Swiss Cleaners investigates and notifies customers of payment card breach that began in 2014

Posted on November 16, 2015 by Dissent

Swiss Cleaners values the relationship it has with its customers and understands the importance of protecting payment card information.  Swiss Cleaners was recently notified that banks had identified a pattern of unauthorized charges on payment cards after those cards were used in Swiss Cleaners stores.  Swiss Cleaners immediately began to investigate and engaged a leading…

Read more

Fashion to Figure notifying customers of payment card compromise

Posted on November 15, 2015 by Dissent

Fashion to Figure (B. Lane, Inc.) is notifying customers of a breach involving malware inserted on their web host’s server. The malware was reportedly inserted on the unnamed host’s server on May 19, but Fashion to Figure did not realize it until October 16, when they started investigating why a web page was loading slowly. Potentially compromised…

Read more

Noble House Hotels and Resorts notifies customers at six luxury hotels of payment card breach

Posted on November 15, 2015 by Dissent

Luxury hotel chain Nobel House Hotels and Resorts is notifying customers of a breach they uncovered in the wake of reports by customers of fraudulent charges on payment cards. In a letter sent to those potentially affected, Patrick R. Colee, Chairman of Noble House Hotels & Resorts, writes, in part: Through our investigation, Noble House…

Read more

FBI alerts Owensboro Health to Breach at Muhlenberg Hospital; Breach Began in January, 2012

Posted on November 13, 2015 by Dissent

The breach in question may have begun in January, 2012, years before OH Muhlenberg acquired Muhlenberg Community Hospital, but it potentially impacted all patients, all payment guarantors, employees and some credentialed providers after that date and before OH Muhlenberg learned of the breach and contained it. This incident does not yet appear on HHS’s public…

Read more

Bitdefender releases automated decryption tool for files locked up by Linux.Encoder.1

Posted on November 9, 2015 by Dissent

Steve Ragan reports that Bitdefender has figured out how to decrypt files and backups encrypted by Linux.Encoder.1, the latest ransomware  causing havoc for sites.   …. Exploiting this fundamental weakness, Bitdefender released a tool that will automatically decrypt any files on a victim’s system that were targeted. The tool and instructions are available on Bitdefender’s post, the…

Read more

Excellus hack: why so long to detect it, members ask

Posted on November 8, 2015 by Dissent

Steve Orr has a follow-up on the Excellus BlueCross BlueShield data breach that was disclosed in September, but the scant details still available will doubtless continue to frustrate those who want to know how the breach occurred and why it took almost 20 months for Excellus to detect it.  And the available facts serve as…

Read more
  • Previous
  • 1
  • …
  • 628
  • 629
  • 630
  • 631
  • 632
  • 633
  • 634
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Dutch Government: More forms of espionage to be a criminal offence from 15 May onwards
  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Period Tracking App Users Win Class Status in Google, Meta Suit
  • AI: the Italian Supervisory Authority fines Luka, the U.S. company behind chatbot “Replika,” 5 Million €
  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.