โŒ

Normal view

There are new articles available, click to refresh the page.
Today โ€” 12 May 2026Main stream

Thousands of DICOM servers exposed due to shameful lack of basic security measures

By: Dissent
11 May 2026 at 11:49
From the way-too-slow-learning-curve dept. Steve Alder reports: Healthcare organizations are exposing a vast amount of patient data by failing to implement even basic security measures for DICOM servers, according to a recent Trend Micro TrendAI analysis. TrendAI identified thousands of internet-facing DICOM servers belonging to hundreds of entities. The lack of security protections puts patient...

Source

Before yesterdayMain stream

One size does not fit all โ€” sometimes, victims probably should pay ransom

By: Dissent
8 May 2026 at 08:48
DataBreaches posted the following opinion piece on LinkedIn this morning in my Dissent Doe, PhD account: Last night, Canvas was restored, and the Instructure leak site listing was removed from the threat actorsโ€™ leak site. The listing is still not on the leak site as of this morning. Given ShinyHuntersโ€™ practices, this usually indicates that...

Source

When Your Vendorโ€™s Breach Becomes Your Lawsuit: Privacy Risk Lessons from Recent Bank Litigation

By: Dissent
6 May 2026 at 12:36
Nancy Eff Presnell, Gene F. Price, and Matthew R. Schantz write: A recent high-profile incident illustrates the growing litigation and regulatory risks that financial institutions face from vendor-driven data breaches. Within weeks of a national bank confirming a data security incident at a third-party service provider, at least two putative class actions were filed, though...

Source

NYC Public Schools Lack Central Inventory to Track Vendors Used By Schools โ€” NYS Auditor

By: Dissent
5 May 2026 at 20:12
Audit conducted by NYS Comptrollerโ€™s Office between 2020-2025 found multiple concerns leaving students and employees at risk of privacy and data security breaches. The auditor also criticized the city for failing to cooperate in a timely manner with the auditorโ€™s requests for information.ย  In June 2014, a decade after the NYC Education Department had been...

Source

Latvian national involved with Karakurt and other ransomware gangs sentenced for his role in ransomware organization

By: Dissent
4 May 2026 at 18:02
From the DOJโ€™s press release: A Latvian national was sentenced today to 102 months in prison for his role in a major Russian ransomware organization that stole from and extorted over 54 companies. According to court documents, Deniss Zolotarjovs (ะ”ะตะฝะธัั ะ—ะพะปะพั‚ะฐั€ั‘ะฒั), 35, of Moscow, Russia, was a member of a ransomware organization led by former...

Source

VECT Ransomware is a Wiper, Not Ransomware โ€” Donโ€™t Bother Paying, Says Check Point Research

By: Dissent
29 April 2026 at 12:08
Check Point Researchers recently dug into all three versions of VECTโ€™s ransomware. And what they found should concern anyone who discovers they have been locked by it. From their blog post: Ransomware is supposed to be reversible. The attacker locks your files, holds the key, and returns it when you pay.ย Thatโ€™sย the business model. VECTโ€™s software...

Source

Over 200 Japanese firms have paid ransomware attackers; 60% fail to recover data

By: Dissent
29 April 2026 at 09:37
Data from Japanese firms indicates that paying ransom is unlikely to enable full recovery of encrypted data. Japan Today reports: At least 222 Japanese companies have paid ransomware attackers in the past, yet about 60 percent of them still failed to recover their data, according to a recent survey. Of 1,107 firms that responded to...

Source

The โ€œBlueLeaks 2.0โ€ Breach: Will there be any accountability? Senators start with transparency.

By: Dissent
28 April 2026 at 09:37
A DataBreaches.net Editorial The โ€œBlueLeaks 2.0โ€ data breach may be the worst privacy and data security breach affecting students that DataBreaches has seen in 20 years of reporting on breaches affecting the education sector. If people thought the Power School incident was the worst ever, hold my coffee. Who will hold P3 Global Intel (โ€œP3โ€)...

Source

One ransomware crew now drives half of all cyber claims: At-Bay

By: Dissent
27 April 2026 at 10:28
Kenneth Araullo reports: A single ransomware crew exploiting a single brand of firewall is now driving nearly half of all cyber insurance claims, At-Bay has warned, in a finding that recasts how underwriters and brokers should be thinking about risk selection. The cyber carrierโ€™s 2026 InsurSec Report, drawn from more than 6,500 claims and 100,000...

Source

OCR Announces Settlements of Four Ransomware Investigations that Affected Over 427,000 Individuals

By: Dissent
24 April 2026 at 07:59
Yesterday, the U.S. Department of Health and Human Services (HHS), Office for Civil Rights (OCR) announced settlements with four regulated entities following separate ransomware investigations under HIPAAโ€™S Security Rule. For those keeping count: the resolutions announced mark 19 completed investigations from ransomware breaches and 13 completed investigations in OCRโ€™s Risk Analysis Initiative. The settlements follow...

Source

Trigona Affiliates Deploy Custom Exfiltration Tool to Streamline Data Theft

By: Dissent
23 April 2026 at 12:42
From the so-there-they-are! dept Out of sight, out of mind? It seems like ages ago that DataBreaches last reported on the Trigona ransomware group, but it was actually in September 2023. After that, DataBreaches lost track of them, and after a few months, concluded that they had disappeared or disbanded. But a check of ransomlook.io...

Source

RAMP Uncovered: Anatomy of Russiaโ€™s Ransomware Marketplace

By: Dissent
23 April 2026 at 08:58
Pierluigi Paganini reports: A leaked database from RAMP gives us a rare look behind the curtain. It shows how cybercrime works when it becomes structured, commercial, and repeatable. Instead of random hackers acting alone, RAMP functioned like a business platform where criminals could sell access, recruit affiliates, advertise ransomware, and negotiate deals in private. What...

Source

NOT for Sale! BlueLeaks 2.0 Hacktivist decides not to sell dataset with sensitive data

By: Dissent
22 April 2026 at 18:39
Just when I thought I might be done with work for the day, DataBreaches received an email from โ€œInternet Yiff Machineโ€ (IYM),ย  the hacktivist responsible for hacking P3 Global Intel in what has been called the โ€œBlue Leaks 2.0โ€ breach. As most readers know by now, IYM provided a dataset of 8.3 million tips that...

Source

Outside FDA, Inside the Crosshairs: Cybersecurity Risks for General Wellness and Fitness Products

By: Dissent
22 April 2026 at 13:03
Troutman Pepper Locke writes: Inย Part Oneย of this series, we discussed how wellness products sit at the intersection of Food and Drug Administration (FDA), Health Insurance Portability and Accountability Act (HIPAA), Federal Trade Commission (FTC), and state privacy/breach laws. Inย Part Two, we analyzed FDAโ€™s 2026 General Wellness guidance and what it means for device-level cybersecurity expectations....

Source

Breach at BE PRIME cybersecurity company exposes client data and surveillance systems; Be Prime threatens journalists

By: Dissent
20 April 2026 at 08:57
Alberto Payo reports: A cybersecurity company based in Mexico,ย BePrime, was reportedly the victim of a cyberattack that allegedly resulted in theย leak of 12.6 GB of data and access to network infrastructure and video surveillance, according to information published by the supposed attacker on a cybercrime forum. The company, whichย provides connectivity and security servicesย to large corporations...

Source

AI ghost narratives create a minefield for entities and journalists

By: Dissent
17 April 2026 at 09:05
Thereโ€™s a thought-provoking article on CyberScoop by Mary Catherine Sullivan and Brett Callow of FTI. They provide examples of three types of incidents in which AI has created or contributed to fake narratives that can trigger a crisis response, require allocating significant resources, damage reputation, or give journalists a professional black eye: A company wakes...

Source

Are Former Black Basta Affiliates Automating Executive Targeting?

By: Dissent
17 April 2026 at 08:39
A new report by Reliaquest considers data suggesting that former Black Basta affiliates are not only using the gangโ€™s social engineering playbook, but have been successfully honing it and targeting corporate executives: A new campaign is successfully evolving โ€œBlack Bastaโ€™sโ€ย signature social engineering playbookย into a faster, more targeted, and increasingly automated intrusion method aimed at senior...

Source

Unpatched Microsoft Defender flaw lets hackers gain admin access

By: Dissent
16 April 2026 at 15:37
Laura Pippig reports: A security vulnerability was recently discovered in Microsoft Defender, the first-party Windows 11 antivirus tool used by millions. Attackers can exploit this vulnerability to gain elevated system privileges and cause significant damage without users noticing. The so-called โ€œRedSunโ€ vulnerability was discovered by security researcher Chaotic Eclipse, the same one who previouslyย published a...

Source

P3 Advertised 20+ Years and 0 Security Breaches. You Can Guess What Happened Next.

By: Dissent
16 April 2026 at 07:00
Introduction P3 Global Intel advertises itself as a โ€œfully integrated and state-of-the-art tip acquisition and tip management solution that has quickly become the leading choice of Crime Stoppers Programs, Law Enforcement Agencies, Campus Safety Programs, and Federal Agency Initiatives.โ€ย  35,000 U.S. schools use P3 Campus, which partners with โ€œsafer schoolโ€ initiatives such as Sandy Hook...

Source

A Silent Threat, Loud Consequences: Ransom Group Hits Law Firms Hard

By: Dissent
13 April 2026 at 13:07
When the FBI issued a Private Industry Notice in May 2025 about the Silent Ransom Group (SRG) targeting law firms, they were not exaggerating. The image on the left side of this post is not a new geometric wallpaper. The green boxes represent law firm listings on SRGโ€™s leak site. There are about 38 by...

Source

โŒ
โŒ