DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Missouri school district’s employee data dumped by ransomware group

Posted on January 11, 2022 by Dissent

It’s a new year, but we are still seeing old problems with the education sector being compromised by ransomware attacks on the k-12 subsector. Over the past weekend, threat actors known as Vice Society dumped data from Carthage R-9 district in Carthage, Missouri. When contacted about the incident, a spokesperson for Vice Society informed DataBreaches.net…

Read more

Maryland health workers, lawmakers want answers as problems persist a month after cyberattack

Posted on January 8, 2022 by Dissent

Steve Thompson reports: State health workers still often can’t use computers, access shared drives and get to important data a month after a cyberattack crippled Maryland’s health department, the head of a union representing agency employees said Friday. They’ve received little information about what’s going on and are preparing for the possibility that their systems could remain…

Read more

National Association of Community Health Centers to notify current and former employees of data breach

Posted on January 8, 2022 by Dissent

The National Association of Community Health Centers (NACHC) will start mailing letters on Monday to 935 current and former employees to inform them of a data breach last year. According to a copy of their notification letter that was submitted to the Maine Attorney General’s Office, on October 16, NACHC discovered that certain systems had…

Read more

Monroe Public Schools notifies 1,201 of data breach in June

Posted on January 8, 2022 by Dissent

Add Monroe Public Schools in Michigan to any list you may be keeping of schools hit by ransomware. On January 7, external counsel for the district notified individuals about an incident the district discovered on June 10, 2021 when certain systems and files were encrypted. The district reports that it immediately secured their network and…

Read more

Grass Valley discloses 2021 data breach

Posted on January 8, 2022 by Dissent

Yesterday, Grass Valley in California announced they had suffered a breach last year. Their disclosure does not say when they first detected any breach, but reports that their investigation determined that unauthorized access had occurred between April 13, 2021 and July 1, 2021. After further investigation, Grass Valley discovered that the unauthorized person transferred files…

Read more

FBI: Hackers use BadUSB to target defense firms with ransomware

Posted on January 7, 2022 by Dissent

Sergiu Gatlan reports: The Federal Bureau of Investigation (FBI) warned US companies in a recently updated flash alert that the financially motivated FIN7 cybercriminal group targeted the US defense industry with packages containing malicious USB devices to deploy ransomware. The attackers mailed packages containing ‘BadUSB’ or ‘Bad Beetle USB’ devices with the LilyGO logo, commonly…

Read more
  • Previous
  • 1
  • …
  • 290
  • 291
  • 292
  • 293
  • 294
  • 295
  • 296
  • …
  • 1,913
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.