DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

United Health Centers of San Joaquin Valley remains publicly silent after ransomware attack

Posted on September 25, 2021 by Dissent

Threat actors known as Vice Society have disclosed another attack on the healthcare sector. This time, the victim is United Health Centers of the San Joaquin Valley in California. Lawrence Abrams of BleepingComputer reports: On August 31st, BleepingComputer was told by a source in the cybersecurity industry that United Health Centers was reeling from a…

Read more

Ransomware disrupts services at Coos County Family Health Services in Berlin

Posted on September 25, 2021 by Dissent

John Koziol reports: For the second time this year, a North Country nonprofit organization based in the city has been hit by a ransomware attack. Hackers struck the Androscoggin Valley Regional Refuse Disposal District this spring, with the district paying an undisclosed amount to get its computer files back, while on Monday hackers targeted Coos…

Read more

Reports of ePHI breaches are everywhere, but not always were you might look

Posted on September 24, 2021 by Dissent

There are a number of journalists or sites that monitor news and legal notices for disclosures of breaches involving protected health information (PHI).  And it’s tempting, when you see that the entity is a business, to just skip on by.  But don’t. If a business has a health plan for employees, then they may be…

Read more

VA: Greensville County Public Schools hit by Grief threat actors

Posted on September 24, 2021 by Dissent

Grief threat actors have added another k-12 district to their list of victims who have refused to pay their ransom demands. Greensville County Public Schools in Emporia, Virginia was added to Grief’s dark web leak site on September 21. But by September 15, the district had already disclosed that they were dealing with a cyberware…

Read more

State-sponsored hacking group targets Port of Houston using Zoho zero-day

Posted on September 24, 2021 by Dissent

Catalin Cimpanu reports: A suspected state-sponsored hacking group has attempted to breach the network of the Port of Houston, one of the largest port authorities in the US, using a zero-day vulnerability in a Zoho user authentication appliance, CISA officials said in a Senate hearing today. Port officials said they successfully defended the attack, and “no…

Read more

MN: Crystal Valley Computer Systems Infected By Ransomware Attack

Posted on September 22, 2021 by Dissent

Southern Minnesota News reports: Mankato-based Crystal Valley says a ransomware attack has infected their computer systems. The attack “severely interrupted” the daily operations, according to a company press release. Read more on SMN.  The Crystal Valley Cooperative is a farm supply and grain marketing cooperative that serves Southern Minnesota and Northern Iowa, so this may…

Read more
  • Previous
  • 1
  • …
  • 325
  • 326
  • 327
  • 328
  • 329
  • 330
  • 331
  • …
  • 1,915
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • UBS reports data leak after cyber attack on provider, client data unaffected
  • Scania confirms insurance claim data breach in extortion attempt
  • Cybersecurity takes a big hit in new Trump executive order
  • Episource notifying 5.4 million patients of cyberattack in January
  • Investigation of 2024 Helsinki data breach – Report
  • Major trial underway for data leak that left 72,000 victims in France
  • Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
  • HealthEC Agrees to $5.48 Million Settlement to End Data Breach Lawsuit
  • US offering $10 million for info on Iranian hackers behind IOControl malware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.