DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Malware

Cuba ransomware gang demands $1.9 million for decryption key; Rock County refuses

Posted on October 18, 2023 by Dissent

WCLO reports an update to the ransomware attack experienced by Rock County, Wisconsin in September after they were attacked by the Cuba ransomware gang: Rock County officials are refusing to pay the $1.9 million hackers are seeking to unlock files that were encrypted during a recent ransomware attack. … Smith says fortunately all critical systems…

Read more

CISA shares vulnerabilities, misconfigs used by ransomware gangs

Posted on October 15, 2023 by Dissent

Sergiu Gatlan reports: The U.S. Cybersecurity and Infrastructure Security Agency (CISA) has unveiled additional details regarding misconfigurations and security vulnerabilities exploited by ransomware gangs, aiming to help critical infrastructure organizations thwart their attacks. CISA released this information as part of its Ransomware Vulnerability Warning Pilot (RVWP) program, established in January of this year, when it announced that…

Read more

FBI and CISA Release Update on AvosLocker Advisory

Posted on October 13, 2023 by Dissent

The AvosLocker ransomware leak site has not been seen for months, but the government is providing an update on them based on its investigations as recently as May 2023. In May, DataBreaches reported on the Bluefield College breach by an affiliate of Avos.  Because AvosLocker is RaaS, it’s possible that it is still active but…

Read more

How Vermont’s largest hospital now protects patient info 3 years after ransomware attack

Posted on October 12, 2023 by Dissent

Cam Smith reports: Nearly three years after Vermont’s largest hospital fell victim to a ransomware attack, hospital officials say they’ve made progress toward better systems to protect patient information. During the breach, nearly 1,300 servers were compromised on more than 5,000 devices across the UVM Health Network. Hospital officials say while no patient or employee…

Read more

Ransomware group starts leaking data allegedly from NJ cardiology consultants group

Posted on October 12, 2023 by Dissent

On September 23, DataBreaches reported that the NoEscape ransomware gang had added Mulkay Cardiology Consultants (Mulkay) in New Jersey to their leak site with a date of September 2.  At the time, they claimed to have successfully encrypted them and exfiltrated 60 GB of files. “We have 60GB of confidential and personal data on more…

Read more

Seattle Housing Authority allegedly compromised by ransomware gang

Posted on October 12, 2023 by Dissent

The NoEscape ransomware site claims to have successfully compromised the Seattle Housing Authority (SHA). In a post on their leak site, they claim to have encrypted the SHA’s main servers and exfiltrated 158 GB of data. ” we have 400,000 confidential files,” they claim, including, they write: Confidential Privacy Act Data! Confidential agreements and contracts,…

Read more
  • Previous
  • 1
  • …
  • 69
  • 70
  • 71
  • 72
  • 73
  • 74
  • 75
  • …
  • 726
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.