DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

DOCS Medical Group discloses September ransomware incident

Posted on November 22, 2022 by Dissent

DOCS Medical Group is an urgent care and primary care provider in Connecticut with multiple locations. They also provide telemedicine services. On September 7, DOCS detected abnormal activity that was quickly identified as a ransomware attack. According to their notification letter to patients dated November 7, an unspecified number of patients had their information on…

Read more

The State of Cybersecurity for K-12 School Districts

Posted on November 20, 2022 by Dissent

From the Center for Internet Security: K-12 cybersecurity personnel, IT professionals, and leaders have faced significant challenges over the last several years. They’ve had to wade through operational and technological complexities as a result of shifting between in-person, virtual, and hybrid schooling. Simultaneously, they’ve found themselves one of the primary targets of cyber threat actors as…

Read more

Michigan prosthetics and orthotics provider discloses ransomware attack back in January (Updated)

Posted on November 20, 2022 by Dissent

Wright & Filippis, a well-known orthotics and prosthetics provider in Michigan, issued a press release yesterday about a cyberattack between January 26 and January 28, 2022. While the press release is not specific about the nature of the attack, a companion FAQ indicates that the attack resulted in the deployment of ransomware.  Wright & Filippis…

Read more

TX: Pearland ISD says hackers in recent computer breach may contact, harass parents

Posted on November 20, 2022 by Dissent

Yvette Orozco reports: Pearland ISD is alerting parents and others associated with the district that parties responsible for a recent breach of its computer system may try to contact them. In a video statement released on the district’s website, Superintendent Larry Berger said that an ongoing investigation shows no evidence so far that any sensitive information had…

Read more

Gateway Rehab issues notice about June ransomware incident

Posted on November 19, 2022 by Dissent

On July 8, DataBreaches reported that Gateway Rehab in Pennsylvania had apparently become the victim of a ransomware attack by Blackbyte. DataBreaches’s report included redacted screenshots of files sensitive protected health information that had been leaked on the threat actors’ leak site. Gateway had not responded to inquiries from this site nor posted any notice on…

Read more

San Gorgonio Memorial Hospital Back Online After Malware Attack

Posted on November 19, 2022 by Dissent

Toni McAllister reports: A six-day shutdown of electronic health records at San Gorgonio Memorial Hospital was due to a malware attack that remains under investigation by a team of forensics professionals, according to SGMH CEO Steve Barron. The attack occurred Nov. 10 and all systems at the 600 N. Highland Springs Avenue campus were back…

Read more
  • Previous
  • 1
  • …
  • 197
  • 198
  • 199
  • 200
  • 201
  • 202
  • 203
  • …
  • 1,914
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • New evidence links long-running hacking group to Indian government
  • Zaporizhzhia Cyber ​​Police Exposes Hacker Who Caused Millions in Losses to Victims by Mining Cryptocurrency
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Google: Hackers target Salesforce accounts in data extortion attacks
  • The US Grid Attack Looming on the Horizon
  • US govt login portal could be one cyberattack away from collapse, say auditors
  • Two Men Sentenced to Prison for Aggravated Identity Theft and Computer Hacking Crimes
  • 100,000 UK taxpayer accounts hit in £47m phishing attack on HMRC
  • CISA Alert: Updated Guidance on Play Ransomware
  • Almost one year later, U.S. Dermatology Partners is still not being very transparent about their 2024 breach

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • How the FBI Sought a Warrant to Search Instagram of Columbia Student Protesters
  • Germany fines Vodafone $51 million for privacy, security breaches
  • Malaysia enacts data sharing rules for public sector
  • U.S. Enacts Take It Down Act
  • 23andMe Bankruptcy Judge Ponders Trump Bill’s Injunction Impact
  • Hell No: The ODNI Wants to Make it Easier for the Government to Buy Your Data Without Warrant
  • US State Dept. says silence or anonymity on social media is suspicious

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.