DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

And we’re off and running, Tuesday edition

Posted on September 9, 2014 by Dissent

Reuters reports: At least five states have launched a joint probe into the data breach on the payment-card processing systems of Home Depot, even as the retailer works to determine the impact on its customers in the United States and Canada. The coordinated effort was disclosed on Tuesday, a day after Home Depot confirmed suspicions…

Read more

In Wake of Confirmed Breach at Home Depot, Banks See Spike in PIN Debit Card Fraud

Posted on September 9, 2014 by Dissent

Brian Krebs reports: Nearly a week after this blog first reported signs that Home Depot was battling a major security incident, the company has acknowledged that it suffered a credit and debit card breach involving its U.S. and Canadian stores dating back to April 2014. Home Depot was quick to assure customers and banks that no debit card PIN data was…

Read more

Home Depot Confirms Data Breach

Posted on September 8, 2014 by Dissent

From their web site today: Last Tuesday, September 2, we disclosed that we were investigating a possible breach of our payment data systems. We want you to know that we have now confirmed that those systems have in fact been breached, which could potentially impact any customer that has used their payment card at our…

Read more

Home Depot Hit By Same Malware as Target

Posted on September 8, 2014 by Dissent

Brian Krebs reports: The apparent credit and debit card breach uncovered last week at Home Depot was aided in part by a new variant of the same malicious software program that stole card account data from cash registers at Target last December, according to sources close to the investigation. […] A source close to the…

Read more

A file in the wrong place led to discovery of CSU-East Bay’s breach

Posted on September 7, 2014 by Dissent

Karina Ioffee provides additional details on the CSU – East Bay breach reported yesterday: The intrusion on August 23, 2013 by an unknown person using malicious software was discovered August 11 during a routine security check by the university’s technology department, said Jeff Bliss, a university spokesman. Bliss said university IT workers found that there…

Read more

CSU- East Bay discloses data breach that went undiscovered for one year

Posted on September 6, 2014 by Dissent

Dennis Culver reports: California State University officials said today the university’s East Bay information security team has discovered a breach in a web server used to store personal employee information. Officials said the security breach occurred on Aug. 23, 2013 and was discovered Aug. 11 of this year. The university learned through the subsequent investigation…

Read more
  • Previous
  • 1
  • …
  • 662
  • 663
  • 664
  • 665
  • 666
  • 667
  • 668
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.