DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Is Easton-Bell Sports The Next Shoe Breach Experts Predicted?

Posted on January 21, 2014 by Dissent

J. Price reports: Another US company has revealed a data breach has hit the servers used in conducting e-commerce. Easton-Bell Sports, which makes sports equipment and clothing under the Bell Sports, Blackburn, Easton, Giro and Riddell brands, announced the breach but did not disclose the name of the vendor from whom Easton data was lifted. “(We)…

Read more

Cybercrime firm uncovered six active attacks on U.S. merchants

Posted on January 17, 2014 by Dissent

Jim Finkle reports: The cyber security firm IntelCrawler said on Friday that it has uncovered six ongoing attacks at merchants across the United States whose credit card processing systems are infected with the same type of malicious software used to steal data from some 40 million credit cards at Target Inc. So what are consumers…

Read more

Target Hackers Wrote Partly in Russian, Displayed High Skill, Report Finds

Posted on January 17, 2014 by Dissent

Danny Yadron reports: The holiday data breach at Target Corp. appeared to be part of a broad and highly sophisticated international hacking campaign against multiple retailers, according to a report prepared by federal and private investigators that was sent to financial-services companies and retailers. The report offers some of the first details to emerge about the source…

Read more

Worried about Target getting your information if you sign up for the free credit monitoring with Experian? Don’t be.

Posted on January 16, 2014 by Dissent

I’ve seen a number of comments around the web from individuals who are concerned about signing up for the free credit monitoring by Experian that’s been offered by Target. So I contacted Experian and asked them if they share registration information with Target.  Here’s the reply I got from Greg Young, Director, Public Relations of Experian Consumer…

Read more

Pointer: A First Look at the Target Intrusion, Malware – Krebs

Posted on January 15, 2014 by Dissent

In case you missed it, Brian Krebs had a column with some informed speculation about the malware used in the Target attack. You can read his column here.

Read more

Good luck with THAT (Target update)

Posted on January 14, 2014 by Dissent

John Leyden reports: Underground cybercriminals are attempting to decrypt a 50GB dump of encrypted debit card PINs that security watchers reckon were lifted during last year’s high profile breach against retail giant Target. Security intelligence firm IntelCrawler reports that a miscreant claiming to be in possession of 50GB of PIN data secured with 3DES encryption posted a…

Read more
  • Previous
  • 1
  • …
  • 673
  • 674
  • 675
  • 676
  • 677
  • 678
  • 679
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.