DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: Non-U.S.

NZZ has to shut down the newspaper production system after a cyber attack

Posted on April 9, 2023 by Dissent

APA/SDA reports: The “exceptional situation” is also associated with a reduction in the size of the print edition. According to media reports, the attackers are demanding a ransom for the blocked system. The “Neue Zürcher Zeitung” continues to struggle with problems two weeks after a cyber attack on its computers. The publisher shut down central…

Read more

Es: Clinic hackers threaten to destroy information about patients with infectious diseases

Posted on April 8, 2023 by Dissent

World Nation News reports the threat actors who attacked Hospital Clínic de Barcelona are threatening to release sensitive medical information on patients. In particular, they warned that “in the near future” they will publish information about patients with infectious diseases and information about the use of experimental drugs in the elderly that the Barcelona center…

Read more

Concerns turned into reality… As soon as Samsung Electronics unlocks ChatGPT, ‘misuse’ continues

Posted on April 8, 2023 by Dissent

The following is a Google machine translation of an article in the Economist Korea. Jeong Doo-yong reports: As soon as Samsung Electronics permitted the use of ChatGPT in its device solution (DS/semiconductor) business premises, an accident occurred in which corporate information was leaked. The contents of programs related to semiconductor ‘facility measurement’ and ‘yield/defect’ were entered…

Read more

Iran-Based Hackers Caught Carrying Out Destructive Attacks Under Ransomware Guise

Posted on April 8, 2023 by Dissent

Ravie Lakshmanan reports: The Iranian nation-state group known as MuddyWater has been observed carrying out destructive attacks on hybrid environments under the guise of a ransomware operation. That’s according to new findings from the Microsoft Threat Intelligence team, which discovered the threat actor targeting both on-premises and cloud infrastructures in partnership with another emerging activity cluster dubbed DEV-1084….

Read more

Rogers Communications data allegedly sold on a hacker forum

Posted on April 7, 2023 by Dissent

Vilius Petkauskas reports: Rogers’ leak includes data from the company’s active directory, including information on customers, the attackers claim. The company confirmed the leak, saying some of Rogers employees’  “business contact information” was exposed. Attackers posted an ad on a mostly Russian-speaking hacker forum, alleging the database for sale belongs to Rogers Communications, a Canadian…

Read more

Suspected hacker “9Near” is ‘a soldier’

Posted on April 7, 2023 by Dissent

Wassana Nanuam reports that a self-described “hacktivist” who calls himself “9Near” has been identified: A hacker who claimed to have obtained the personal data of 55 million Thais is an army officer who appears to have acted alone, authorities said yesterday. […] Mr Chaiwut said investigators had identified the hacker and are working with his…

Read more
  • Previous
  • 1
  • …
  • 109
  • 110
  • 111
  • 112
  • 113
  • 114
  • 115
  • …
  • 1,332
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • CoinMarketCap Hacked, Scrambles to Remove Malicious Wallet Verification Popup
  • Montana Attorney General launches investigation into Lee Enterprises data breach
  • AT&T gets preliminary approval for $177 million data breach settlement
  • Aflac notifies SEC of breach suspected to be work of Scattered Spider
  • Former JBLM soldier pleads guilty to attempting to share military secrets with China
  • No, the 16 billion credentials leak is not a new data breach — a wake-up call about fake news (Updated)
  • Tonga’s health system hit by cyberattack (1)
  • Russia Expert Falls Prey to Elite Hackers Disguised as US Officials
  • Proposed class action settlement in In re Netgain Technology litigation
  • Qilin Offers “Call a lawyer” Button For Affiliates Attempting To Extort Ransoms From Victims Who Won’t Pay

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data
  • US Judge Invalidates Biden Rule Protecting Privacy for Abortions
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.