DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Louisiana Public Facilities Authority (LPFA) victim of ransomware attack

Posted on August 7, 2022 by Dissent

The following notification was first published on July 18 as a legal notice: 00110404 PUBLISH 07/18/22 – 09/02/22 Notice of Data Breach On or about February 26, 2022, the Louisiana Public Facilities Authority (LPFA) was the target of a ransomware attack by unknown persons. Our investigation indicates the attack may have gone on over a…

Read more

BHG Behavioral Health Group recently notified patients of a December 2021 breach

Posted on August 7, 2022 by Dissent

If you know to scroll down on BHG Behavioral Health Group‘s website to their footer, you will see a small link to an undated data security incident notice. That undated notice does not reveal when Behavioral Health Group first discovered the data security incident or how they first discovered it. The notice does state, however,…

Read more

Ransomware team hits Disability Help Group

Posted on August 6, 2022 by Dissent

One of the recent listings on a well-known ransomware leak site names a Florida law firm as their victim but they link to disabilityhelpgroup.com. That site, which offers what they describe as advocacy services for individuals seeking help in securing Social Security disability benefits or veterans’ disability benefits, does not display the law firm’s name…

Read more

Roundup: Four more breaches in the healthcare sector: Healthback Holdings, Zenith American Solutions, Bronx Accountable Healthcare Network, and Centerstone

Posted on August 6, 2022 by Dissent

On June 1, Healthback Holdings, LLC in Oklahoma discovered that they had been subject to a hacking incident that began in October 2021.  “A limited number” of  employee accounts were compromised. On July 29, Healthback notified HHS that 21,114 patients were affected. Their notice says that names, health insurance information, Social Security numbers, and clinical…

Read more

Twitter confirms January breach, urges pseudonymous accounts to not add email or phone number

Posted on August 6, 2022 by Dissent

Jonathan Greig reports: Twitter officially confirmed that a January breach led to the leak of information connected to 5.4 million accounts. Two weeks ago, a hacker on Breach Forums offered email addresses and phone numbers connected to the accounts, which they said ranged from “celebrities, companies, randoms, OGs, etc.” […] For those who have pseudonymous Twitter accounts,…

Read more

No Injury = No Article III Standing in Data Breach Class Action

Posted on August 6, 2022 by Dissent

Amy Brown Doolittle of Squire Patton Boggs writes: As we have discussed here at CPW, one of the biggest challenges facing a plaintiff in a data breach class action is to establish an injury from the alleged data breach. Earlier this week, in David De Midicis v. Ally Bank & Ally Fin., Inc., 2022 U.S. Dist. LEXIS…

Read more
  • Previous
  • 1
  • …
  • 233
  • 234
  • 235
  • 236
  • 237
  • 238
  • 239
  • …
  • 1,915
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Why Dumping Sensitive Data on Network Shares is a Liability
  • A militarily degraded Iran may turn to asymmetrical warfare – raising risk of proxy and cyber attacks
  • Pro-Russian hackers disrupt Dutch government websites ahead of NATO summit
  • Iran-Linked Threat Actors Leak Visitors and Athletes’ Data from Saudi Games
  • UK: Oxford City Council still investigating cyberattack from earlier this month
  • Steelmaker Nucor Says Hackers Stole Data in Recent Attack
  • People’s Republic of China cyber threat activity: Cyber Threat Bulletin
  • Ukrainian Web3 security auditing company Hacken suffered an attack that allowed a hacker to create 900 million HAI tokens
  • McLaren provides written notice to 743,131 patients after ransomware attack in July 2024 (2)
  • A state forensics lab was leaking its files. Getting it locked down involved a number of people.

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • Sky Views Personal Data as a Potential Weapon in IPTV Piracy War
  • Florida Used a Nationwide Surveillance Camera Network 250 Times To Aid in Immigration Arrests
  • Federal Court Strikes Down HIPAA Reproductive Health Care Privacy Rule
  • The Markup caught 4 more states sharing personal health data with Big Tech
  • Privacy in the Big Sky State: Montana’s Consumer Privacy Law Gets Amended
  • UK Passes Data Use and Access Regulation Bill
  • Officials defend Liberal bill that would force hospitals, banks, hotels to hand over data

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.