DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Click2Gov Update: ICYMI Here’s The Latest

Posted on September 19, 2018 by Dissent

RBS is doing a great job of tracking the Click2Gov breaches.  In their most recent update, they report: It’s been three months since our original post was published and as feared, breaches of the Click2Gov system continue to be reported. Here is what we’ve learned: Attackers are exploiting an unpatched vulnerability in Oracle’s WebLogic. Early…

Read more

Hackers stole customer credit cards in Newegg data breach

Posted on September 19, 2018 by Dissent

Zack Whittaker reports: Newegg is clearing up its website after a month-long data breach. Hackers injected 15 lines of card skimming code on the online retailer’s payments page which remained for more than a month between August 14 and September 18, Yonathan Klijnsma, a threat researcher at RiskIQ, told TechCrunch. The code siphoned off credit card…

Read more

Securus Technologies-owned GovPayNow.com Leaks 14M+ Records

Posted on September 19, 2018 by Dissent

Brian Krebs reports: Government Payment Service Inc. — a company used by thousands of U.S. state and local governments to accept online payments for everything from traffic citations and licensing fees to bail payments and court-ordered fines — has leaked more than 14 million customer records dating back at least six years, including names, addresses, phone…

Read more

Virus shuts down city services in Beatrice, Nebraska

Posted on September 19, 2018 by Dissent

Scott Koperski reports: A virus shut down many city operations this week, including phone and internet services for several departments. City Administrator Tobias Tempelmeyer said city departments lost phone and internet service in the downtown area, including city hall, the Beatrice Police Department and city auditorium, which houses Beatrice Fire and Rescue. […] It’s believed…

Read more

Brooklyn emergency room worker allegedly stole, then sold patients’ private information

Posted on September 17, 2018 by Dissent

Rich Shapiro and John Annese report: An emergency room worker at Kings County Hospital stole the private information of nearly 100 patients and sold it through an encrypted app on his cell phone, the Daily News has learned. Orlando Jemmott, 52, who worked at the city-run Brooklyn hospital for more than a decade, also fed…

Read more

Data of almost 3,000 patients experiencing emergency symptoms exposed online by MedCall Advisors

Posted on September 14, 2018 by Dissent

Have you ever wished you could just pick up a phone and get an emergency room physician on the phone to advise you in an emergency? Well,  it seems that you can. According to their website, North Carolina-based Medcall Advisors is a “Workers Compensation and Healthcare Solutions” provider offering a comprehensive tele-emergent care medical service…

Read more
  • Previous
  • 1
  • …
  • 691
  • 692
  • 693
  • 694
  • 695
  • 696
  • 697
  • …
  • 1,915
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • Ireland’s Data Protection Commission publishes 2024 Annual Report
  • The headlines suggested Freedman Healthcare suffered a ransomware attack that affected patient data. The reality was quite different.
  • Runsafe report: Medical device cyberattacks threaten patient care, strain budgets, top concern for healthcare sector
  • Ryuk ransomware’s initial access expert extradited to the U.S. from Ukraine
  • Alleged Geisinger hacker will defend himself pro se.
  • Tallahassee Memorial Healthcare reveals it was also impacted by Cerner/Legacy Oracle cyberattack
  • Hospital cyberattack investigation complete, no formal review needed (1)
  • Largest Ever Seizure of Funds Related to Crypto Confidence Scams
  • IMPACT: 170 patients harmed as a result of Qilin’s ransomware attack on NHS vendor Synnovis
  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • DOJ’s Data Security Program: Key Compliance Considerations for Impacted Entities
  • 23andMe fined £2.31 million for failing to protect UK users’ genetic data
  • DOJ Seeks More Time on Tower Dumps
  • Your household smart products must respect your privacy – including your air fryer
  • Vermont signs Kids Code into law, faces legal challenges
  • Data Categories and Surveillance Pricing: Ferguson’s Nuanced Approach to Privacy Innovation
  • Anne Wojcicki Wins Bidding for 23andMe

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.