Doug Levin writes: …. I am pleased to introduce and launch the K-12 Cyber Incident Map. It is a visualization of cybersecurity-related incidents reported about U.S. K-12 public schools and districts from 2016 to the present. ‘Cyber’ incidents tracked on the map, include: (a) phishing attacks resulting in the disclosure of personal data; (b) other unauthorized disclosures, breaches…
Search Results for: ransomware
Protenus releases February health data breach statistics
So what kind of month was February for breaches in the healthcare sector? Protenus has released its February Breach Barometer based on incidents compiled by this site. As a reminder: their analyses do not rely solely on HHS’s public breach tool. As in past months, insider incidents – whether accidental or intentional wrongdoing – comprised…
Summit Reinsurance issues notice of breach discovered in August
Regular readers will realize that I’ve been reporting on the Summit Reinsurance breach since it first appeared in a covered entity’s disclosure back in November. Since then, I’ve been compiling and/or reporting on other entities affected by the ransomware attack that they discovered August 8, 2016. So seven months after discovery, they are first issuing a public…
Study: Healthcare Organizations Are Top Targets for Hackers – 68% Have Compromised Email Credentials
Presser, but has some interesting findings: Evolve IP, The Cloud Services Company™, today released the results of a study of Dark Web email vulnerabilities in the healthcare industry. The research, conducted in a collaboration between Evolve IP and ID Agent, reveals the pervasive nature of email-based cybersecurity attacks and sheds light on the quantity, variety, sources…
Family Service Rochester experiences data breach
Hannah Yang reports: Authorities are investigating a data breach at Family Services Rochester. Family Services Rochester has notified individuals that portions of its computer systems that contained personal information had been compromised. On Jan. 26, Family Services Rochester discovered some of its files were encrypted with ransom ware. Authorities were notified immediately, and an investigation…
Open Databases a Juicy Extortion Target (and a Sitting Duck for Malicious Destruction)
I’ve reported on this concern before, but Tom Spring has a nice write-up on ThreatPost that begins: Recent attacks against insecure MongoDB, Hadoop and CouchDB installations represent a new phase in online extortion, born from ransomware’s roots with the promise of becoming a nemesis for years to come. “These types of attacks have grown from…