DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Update: Goodwill POS malware breach impacted 868,000 credit and debit cards

Posted on September 4, 2014 by Dissent

Max Smolaks reports: US charity Goodwill Industries International has announced the results of a six week long investigation into a suspected data breach, admitting that around 868,000 customer credit and debit cards have been compromised. Read more on TechWeek Europe.

Read more

Target Wants Banks’ Claims Tossed In Data Breach MDL

Posted on September 3, 2014 by Dissent

This is where lawyers earn their keep: Target Corp. urged a Minnesota federal judge on Tuesday to toss a consolidated class action over the company’s massive data breach, arguing that the bank plaintiffs cannot claim negligence because they do not have a direct relationship with Target. Target argues that under state law, merchants aren’t liable…

Read more

The unknown cyber threats sweeping Sweden

Posted on September 3, 2014 by Dissent

Melanie Watson writes: Over a four-week period earlier this year, KPMG studied [14 organizations] in Sweden to gather information relating to malicious traffic. During this time period, 15,586 security alerts were recorded. […] Astonishingly, 93% of those organisations that took part were ‘breached’ in the given time frame. The word ‘breached’ in this report has been defined by…

Read more

Goodwill starts identifying stores impacted by payment processor breach

Posted on September 2, 2014 by Dissent

Following up on a breach first disclosed by Brian Krebs: Goodwill Industries of Kansas has released a list of twenty stores across the state affected by a security breach it announced in July. The charity said it confirmed the breach after an extensive investigation. The Goodwill said the stores affected used the same third-party vendor to…

Read more

How Statoil held off hacker attack last year

Posted on August 28, 2014 by Dissent

It’s always helpful when companies are willing to talk about what happened when they were attacked. In the wake of yesterday’s report about major Norwegian oil firms being attacked or warned of attacks, Statoil revealed that it was also the target of a massive attack last year. As reported on NewsinEnglish.no: “It started on March…

Read more

More than 1,000 businesses affected by same malware as Target

Posted on August 22, 2014 by Dissent

Salvador Rodriguez reports: The Secret Service estimates more than 1,000 businesses have been affected by the same kind of cyberattack that scraped Target’s cash register system for consumer credit card information, the Department of Homeland Security said in an advisory Friday afternoon. Criminals are carrying out the attack by hacking into businesses’ networks and then…

Read more
  • Previous
  • 1
  • …
  • 663
  • 664
  • 665
  • 666
  • 667
  • 668
  • 669
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.