DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

When security works: payroll processor prevent$ transactions

Posted on July 30, 2012 by Dissent

Neurocare, Inc. has been notifying some employees after one of their systems was infected by malware and the criminals acquired the firm’s login credentials to its payroll processor account.  The credentials were then used to re-route direct deposits for some employees to other accounts. The scheme was foiled because Neurocare’s unnamed payment processor detected an…

Read more

Maplesoft Affected by Security Breach

Posted on July 19, 2012 by Dissent

Seen on Maplesoft’s web site: Maplesoft is investigating a security breach of its administrative database that took place on July 17th, 2012. As a result of the breach, the perpetrators gained access to some email subscription data, including email addresses, first and last names, and company and institution names. Any financial information held by Maplesoft remains…

Read more

CFTC Data Breach Risks Employees’ Social Security Numbers

Posted on June 25, 2012 by Dissent

Silla Brust reports: The U.S. Commodity Futures Trading Commission suffered a data breach in May, putting at risk Social Security numbers and personal information of employees of the country’s top derivatives regulator. A CFTC employee received a “phishing” e-mail on May 21 and input information to a fraudulent website, according to a copy of an…

Read more

Intuit Financial Services warns customers that email sent via VerticalResponse contained malicious code

Posted on June 15, 2012 by Dissent

Malware-laden email from Intuit Financial Services has been reported, but how did this happen? The following was submitted to DataBreaches.net by a reader: From: Intuit Financial Services Sent: Thursday, June 14, 2012 11:29 PM To: IFS Clients Subject: Innovation Conference email issue – June 14 Earlier today you received an email from [email protected] with the subject…

Read more

Flame: Massive cyber-attack discovered, researchers say

Posted on May 28, 2012 by Dissent

Dave Lee reports: A complex targeted cyber-attack that collected private data from countries such as Israel and Iran has been uncovered, researchers have said. Russian security firm Kaspersky Labs told the BBC they believed the malware, known as Flame, had been operating since August 2010. The company said it believed the attack was state-sponsored, but…

Read more

Plaxo online address book service warns of security breach

Posted on May 10, 2012 by Dissent

Online address book service Plaxo has confirmed that an unknown malicious third-party gained access to the company’s API connection to Google’s address book and calendar. As a result of the security breach, Google took precautionary measures and temporarily disabled the connection, and sent Google account holders a “Suspicious sign in prevented” email advising them that…

Read more
  • Previous
  • 1
  • …
  • 686
  • 687
  • 688
  • 689
  • 690
  • 691
  • 692
  • …
  • 730
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ireland’s Data Protection Commission publishes 2024 Annual Report
  • The headlines suggested Freedman Healthcare suffered a ransomware attack that affected patient data. The reality was quite different.
  • Runsafe report: Medical device cyberattacks threaten patient care, strain budgets, top concern for healthcare sector
  • Ryuk ransomware’s initial access expert extradited to the U.S. from Ukraine
  • Alleged Geisinger hacker will defend himself pro se.
  • Tallahassee Memorial Healthcare reveals it was also impacted by Cerner/Legacy Oracle cyberattack
  • Hospital cyberattack investigation complete, no formal review needed (1)
  • Largest Ever Seizure of Funds Related to Crypto Confidence Scams
  • IMPACT: 170 patients harmed as a result of Qilin’s ransomware attack on NHS vendor Synnovis
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.