DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Now, this is being proactive.

Posted on March 5, 2019 by Dissent

How perfect is this cartoon, provided by privacy scholar and TeachPrivacy founder Dan Solove? See more on TeachPrivacy, where you can also find information on the many privacy-related courses TeachPrivacy offers and the upcoming privacy and security conferences that Dan organizes. And if you’re going to be at the International Privacy&Security Forum in D.C. April…

Read more

Nigerian citizen sentenced in phishing scheme that targeted Groton schools

Posted on March 5, 2019 by Dissent

The Day reports: A Nigerian citizen who was living in Smyrna, Ga., was sentenced Monday by U.S. District Judge Jeffrey A. Meyer in New Haven to approximately 10 months of imprisonment, time he had already served, for his role in a scheme to obtain the personal identifying information of school employees in Groton and elsewhere. Olukayode Ibrahim Lawal,…

Read more

Columbia Surgical Specialists of Spokane reports incident affecting 400,000 patients

Posted on March 5, 2019 by Dissent

On February 18,  2019, Columbia Surgical Specialists of Spokane reported a breach an incident to HHS. The incident, which appears on HHS’s public breach tool as a Hacking/IT Incident involving information on their network server, reportedly affected 400,000 patients. That’s a large breach for the healthcare sector, and yet I’ve seen no press releases in…

Read more

Rush University notifies 45,000 patients after discovering insider wrongdoing at claims processing vendor

Posted on March 5, 2019 by Dissent

Last month,  Rush University Hospital notified HHS of a breach that they reportedly discovered in December. The breach,  affecting 908 patients, was coded as an Unauthorized Access/Disclosure incident with data located in paper/film format.  At the time, Becker’s Spine Review reported that the incident was a mailing mix-up: According to the letter sent to affected patients,…

Read more

More than 5 months after ransomware incident, Wolverine Solutions Group still notifying more than 700 companies and 1.2 million patients

Posted on March 2, 2019 by Dissent

More than 5 months after a ransomware incident, Wolverine Solutions Group is still in the process of notifying more than 700 companies and 1.2 million patients.  Should they even have to, or has the government imposed too burdensome a responsibility on entities that experience attacks to individually notify patients when there is no evidence of…

Read more

Florida Keys Community College Provides Notice of Data Security Incident

Posted on February 28, 2019 by Dissent

From their press release. KEY WEST, Fla., Feb. 27, 2019 /PRNewswire/ — Florida Keys Community College (the “College”) is taking action after discovering that it became the target of a phishing email campaign that compromised several employee email account credentials. What Happened?  On October 19, 2018 Florida Keys Community College (the “College”) learned of suspicious activity…

Read more
  • Previous
  • 1
  • …
  • 641
  • 642
  • 643
  • 644
  • 645
  • 646
  • 647
  • …
  • 1,915
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • UBS reports data leak after cyber attack on provider, client data unaffected
  • Scania confirms insurance claim data breach in extortion attempt
  • Cybersecurity takes a big hit in new Trump executive order
  • Episource notifying 5.4 million patients of cyberattack in January
  • Investigation of 2024 Helsinki data breach – Report
  • Major trial underway for data leak that left 72,000 victims in France
  • Anubis: A Closer Look at an Emerging Ransomware with Built-in Wiper
  • HealthEC Agrees to $5.48 Million Settlement to End Data Breach Lawsuit
  • US offering $10 million for info on Iranian hackers behind IOControl malware

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.