government healthcare social media service provider fine education finance dark web law enforcement retail web telecoms phama travel manufacturing operating system charity insurance legal app tech gaming publishing transport utilities
story hacked malware unauthorised access ransomware vulnerability accidental disclosure phishing unsecured database poor security insider threat unsecured server hacked email lost device website hacked identity theft ddos stolen documents Trojans financial inside job spear phishing RDP skimming spyware
cyber attack privacy breach notification security flaw legislation poor operations user credentials physical security customer data third party Cryptocurrency enforcement email hacked insecure storage court action encryption fraud VPN passwords zero day 3rd parties state hacking employee data remote working stolen data

Hackers leak 16,000 Tas documents on dark web | Bega District News | Bega, NSW
Proskauer Cyber Attack Left Sensitive Client Data Unguarded
MSI Confirms Cyberattack, Advises Caution With Firmware | Tom's Hardware
Culbertson Memorial Hospital hit by cyber-attack
New Batch of Classified Documents Appear on Social Media Sites – DNyuz
MERCURY and DEV-1084: Destructive attack on hybrid environment - Microsoft Security Blog
Media Briefing: Proposed UN Cybercrime Treaty Negotiations Headed in Troubling Direction, Sidestepping Human Rights Protections and Threatening Free Expression, EFF and Allies Warn | Electronic Frontier Foundation
Killer Instinct discloses data breach | Cybernews
UK criminal records office confirms cyber incident behind portal issues
OCR Labs denies breach report details, patches vulnerability | Biometric Update
Customers of Winnipeg's Thermea spa alarmed after notification of significant data breach | CBC News
Softwareleverancier Nebu moet van rechter meer informatie geven over datalek | Tech | NU.nl
NuLife Med data breach class action settlement - Top Class Actions
Money Message ransomware gang claims MSI breach, demands $4 million
Tesla workers shared sensitive images recorded by customer cars
Two-Fifths of IT Pros Told to Keep Breaches Quiet - Infosecurity Magazine
Cyber Attack Hits NJ Police Department – NBC New York
Sentiment recovers $870K after negotiations with hacker
Microsoft leads effort to disrupt illicit use of Cobalt Strike, a dangerous hacking tool in the wrong hands | CyberScoop
Throne fixes security bug that exposed creators' private home addresses | TechCrunch
Service NSW breach exposes personal data affecting thousands of customers | 7NEWS
TAFE data breach uncovered by SA Police - Security - iTnews
17 arrests in NL as Operation Cookiemonster takes down hacker site - DutchNews.nl
Japan braced for rise in ransomware attacks after data breach | Markets Insider
Criminal Marketplace Disrupted in International Cyber Operation | OPA | Department of Justice
Rogers Communications data allegedly sold on a hacker forum | Cybernews
Hospitals Notify Patients About 2021 Phishing Attack on Adelanto HealthCare Ventures
Israeli cyber security website briefly taken down in cyberattack - Israel News - The Jerusalem Post
Check Point Research (CPR) and Check Point Incident Response Team (CPIRT) encountered a previously unnamed ransomware strain, we dubbed Rorschach, deployed against a US-based company.
FBI Seizes Bot Shop ‘Genesis Market’ Amid Arrests Targeting Operators, Suppliers – Krebs on Security
W. Virginia Hospital Will Report Breach in 'Donut' Data Leak
Ukrainian Hackers Spend $25,000 of Russian Funds on Sex Toys | Atlas News
Data Breech Under HIPAA Costs Company Almost 300,000 DOJ
Cyberwarfare is all in the mind, says Britain | The Economist
Notice of Third-Party Security Incident Impacting CHSPSC Affiliate Data - Community Health Systems (CHS)
What Is CIRCIA and How Does This Cybersecurity Law Impact You?
Alcohol recovery startups Monument and Tempest shared patients' private data with advertisers | TechCrunch
School principal resigns after paying Elon Musk impersonator • The Register
Western Digital says hackers stole data in 'network security' breach
Unpacking the Structure of Modern Cybercrime Organizations