DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Restaurant Depot/Jetro Cash & Carry Customers’ Credit Cards Hacked (update2)

Posted on December 7, 2011 by Dissent

Gawker.com is not one of my usual sources for news on data breaches, but they managed to uncover a breach that we would not have known about had it not appeared on a firearms discussion forum (yes, really): If you used a credit card between the dates of Sept. 21 and Nov. 18th at national…

Read more

101Domain.com Suffers Securty Breach

Posted on November 27, 2011 by Dissent

Michael H. Berkens reports: 101Domain.com has apparently suffered a security breach which “may have resulted in unauthorized access to your personal information and possibly payment information.” According to Webhosting.info, 101domain.com has around 10,000 domain names under management. Read more on TheDomains.com.  From the notification letter: We are writing to you as a primary contact on your account with…

Read more

Cycling star Floyd Landis prosecuted in absentia for alleged role in hacking anti-doping lab via malware

Posted on October 26, 2011 by Dissent

John E. Dunn reports: Disgraced former Tour de France cyclist Floyd Landis should be given an 18-month suspended prison sentence for his part in an alleged plot to hack the French national anti-doping laboratory (LNDD) using Trojans, a prosecutor has said. The planting of computer Trojans for the purposes of data theft is usually seen…

Read more

Breaches have consequences: Watchdog penalizes Hyundai Capital after data leak

Posted on September 8, 2011 by Dissent

A follow-up to the Hyundai Capital breach first disclosed in April. At the time, Hyundai reported that approximately 420,000 of its 1.8 million customers had their names, resident registration numbers, mobile phone numbers and email addresses compromised by hackers. Now Yonhap News reports: South Korea’s financial watchdog on Thursday decided to issue an institutional warning…

Read more

Hiding in Plain Sight: Post-Breach

Posted on August 31, 2011 by Dissent

Gunter Ollmann writes: The majority of network breaches begin and end with the installation of malware upon a vulnerable device. For the rest, once that initial malware beachhead has been achieved, the story is only just beginning. The breach disclosures that make the news are often confusing as they’re frequently compiled from third-hand reports, opinions…

Read more

Computer breach exposes personal records of Living Healthy Clinic patients

Posted on August 27, 2011 by Dissent

The names and other confidential information of about 3,000 clients of the Living Healthy Clinic were exposed as a result of a computer security breach In July. The clinic, operated by the University of Wisconsin-Oshkosh College of Nursing provides health services for uninsured Winnebago County residents. The university on Friday said an investigation determined that…

Read more
  • Previous
  • 1
  • …
  • 685
  • 686
  • 687
  • 688
  • 689
  • 690
  • 691
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide
  • Russian national and leader of Qakbot malware conspiracy indicted in long-running global ransomware scheme
  • Texas Doctor Who Falsely Diagnosed Patients as Part of Insurance Fraud Scheme Sentenced to 10 Years’ Imprisonment
  • VanHelsing ransomware builder leaked on hacking forum
  • Hack of Opexus Was at Root of Massive Federal Data Breach
  • ‘Deep concern’ for domestic abuse survivors as cybercriminals expected to publish confidential abuse survivors’ addresses
  • Western intelligence agencies unite to expose Russian hacking campaign against logistics and tech firms

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras
  • Cocospy stalkerware apps go offline after data breach
  • Drugmaker Regeneron to acquire 23andMe out of bankruptcy

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.