Harry Davies, Simon Goodley, Felicity Lawrence, Paul Lewis and Lisa O’Carroll report: A leaked trove of confidential files has revealed the inside story of how the tech giant Uber flouted laws, duped police, exploited violence against drivers and secretly lobbied governments during its aggressive global expansion. The unprecedented leak to the Guardian of more than 124,000 documents…
Category: Other
Pro-Kremlin hackers Killnet hit Latvia with biggest cyberattack in its history
Oliver Moody reports: Latvia has come under the most intense wave of cyberattacks in its history, including a 12-hour onslaught on its public broadcasting centre, according to a senior Nato official. The Baltic state appears to have been targeted by pro-Kremlin hackers because of a series of assertive steps such as bringing back conscription and drawing…
Pt: Hacker targets Lisbon hotel clients
The Portugal News reports: A hacker has infiltrated the Booking account of the Marino Boutique Hotel in Lisbon, and has managed to steal almost half a million euros in false bookings. According to CNN Portugal, the hacker established direct contact with hundreds of customers between 12 and 16 June, leaving the hotel without being able…
VCU Health identifies and addresses a 16-year privacy breach
Soap operas are almost always long-running. Privacy breaches should not be, and 16 years is a very long time for a problem to go undetected. But it appears that’s what happened to the Virginia Commonwealth University Health System (“VCU Health”). Last month, VCU Health disclosed that they had recently learned that beginning as early as…
EXCLUSIVE: Marriott hacked again? Yes. Here’s what we know.
On June 28, DataBreaches received a message from an unrecognized sender. The subject was: “Breach of Marriott hotels! Very Important!” DataBreaches’ first thought was, “Seriously? Is this yet another breach involving Marriott or are some kids just trying to leak old data?” As it turned out, this was, in fact, a new breach. But how…
Everything old is new again? Ransomware groups stop encrypting and switch to theft/extortion model.
In a new post at The Register, Jessica Lyons Hardcastle reports, in part: ….. Increasingly, however, cybercrime rings still tracked as ransomware operators are turning toward primarily data theft and extortion – and skipping the encryption step altogether. Rather than scramble files and demand payment for the decryption keys, and all the faff in between…