DataBreaches.Net

Menu
  • About
  • Breach Notification Laws
  • Privacy Policy
  • Transparency Report
Menu

Category: U.S.

Whiting-Turner notifies employees of potential breach at vendor

Posted on April 9, 2016 by Dissent

A Whiting-Turner  vendor seems to have had a breach, although the nature of the breach or numbers affected are not clear. From WT’s notification template: Whiting-Turner is writing to inform you of a recent event that may affect the security of your child’s personal information. We are providing this notice to provide you, the parent/guardian, with…

Read more

IA: Private student documents found at recycling center

Posted on April 9, 2016 by Dissent

Holly Hines reports: Documents found at an Iowa City recycling center last month contain personal information about local elementary school students, including their names, addresses and parents’ names. Antonio Montoya, a 22-year-old Iowa State University student, said he visited City Carton Recycling on March 19 and noticed a pile of Grant Wood Elementary students’ Individualized Education Program documents, which detail…

Read more

OptumRx notifying patients after laptop with PHI stolen from vendor’s unattended vehicle

Posted on April 8, 2016 by Dissent

Now what vendor was this? I don’t see anything in recent reports or on HHS’s public breach tool that would identify the vendor. From a notification template by OptumRx: We wanted to make you aware of a recent incident that may have affected some of your health information. On March 22, 2016, we were notified…

Read more

Security flaws found in 3 state health insurance websites

Posted on April 7, 2016 by Dissent

AP reports: Federal investigators found significant cybersecurity weaknesses in the health insurance websites of California, Kentucky and Vermont that could enable hackers to get their hands on sensitive personal information about hundreds of thousands of people, The Associated Press has learned. And some of those flaws have yet to be fixed. Read more on Midland…

Read more

MedStar: Ransomware success wasn’t IT department’s fault

Posted on April 7, 2016 by Dissent

Sean Gallagher reports that MedStar is firmly denying others’ reporting about their recent ransomware attack: Tami Abdollah of the Associated Press reported Tuesday that an anonymous source “familiar with the investigation” of the cyberattack claimed that the flaws that allowed attackers to compromise a JBoss Web application server and attack the network with Samsam crypto-ransomware had…

Read more

Einstein Health Network notifies 3,000 patients after web exposure of information

Posted on April 7, 2016 by Dissent

Justin Heinze reports: Einstein Healthcare Network may have suffered a data breach, they announced Thursday, and they are sending letters home to patients that may have been effected. The incident involved a website database containing patient information entered into Einstein’s website “Request for Information” form, Einstein said.   Read more on Norristown Patch. EHN posted…

Read more
  • Previous
  • 1
  • …
  • 992
  • 993
  • 994
  • 995
  • 996
  • 997
  • 998
  • …
  • 1,913
  • Next

Now more than ever

"Stand with Ukraine:" above raised hands. The illustration is in blue and yellow, the colors of Ukraine's flag.

Search

Browse by Categories

Recent Posts

  • B.C. health authority faces class-action lawsuit over 2009 data breach (1)
  • Private Industry Notification: Silent Ransom Group Targeting Law Firms
  • Data Breach Lawsuits Against Chord Specialty Dental Partners Consolidated
  • PA: York County alerts residents of potential data breach
  • FTC Finalizes Order with GoDaddy over Data Security Failures
  • Hacker steals $223 million in Cetus Protocol cryptocurrency heist
  • Operation ENDGAME strikes again: the ransomware kill chain broken at its source
  • Mysterious Database of 184 Million Records Exposes Vast Array of Login Credentials
  • Mysterious hacking group Careto was run by the Spanish government, sources say
  • 16 Defendants Federally Charged in Connection with DanaBot Malware Scheme That Infected Computers Worldwide

No, You Can’t Buy a Post or an Interview

This site does not accept sponsored posts or link-back arrangements. Inquiries about either are ignored.

And despite what some trolls may try to claim: DataBreaches has never accepted even one dime to interview or report on anyone. Nor will DataBreaches ever pay anyone for data or to interview them.

Want to Get Our RSS Feed?

Grab it here:

https://databreaches.net/feed/

RSS Recent Posts on PogoWasRight.org

  • D.C. Federal Court Rules Termination of Democrat PCLOB Members Is Unlawful
  • Meta may continue to train AI with user data, German court says
  • Widow of slain Saudi journalist can’t pursue surveillance claims against Israeli spyware firm
  • Researchers Scrape 2 Billion Discord Messages and Publish Them Online
  • GDPR is cracking: Brussels rewrites its prized privacy law
  • Telegram Gave Authorities Data on More than 20,000 Users
  • Police secretly monitored New Orleans with facial recognition cameras

Have a News Tip?

Email: Tips[at]DataBreaches.net

Signal: +1 516-776-7756

Contact Me

Email: info[at]databreaches.net

Mastodon: Infosec.Exchange/@PogoWasRight

Signal: +1 516-776-7756

DMCA Concern: dmca[at]databreaches.net
© 2009 – 2025 DataBreaches.net and DataBreaches LLC. All rights reserved.