This site uses cookies to improve your experience. To help us insure we adhere to various privacy regulations, please select your country/region of residence. If you do not select a country, we will assume you are from the United States. Select your Cookie Settings or view our Privacy Policy and Terms of Use.
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Used for the proper function of the website
Used for monitoring website traffic and interactions
Cookie Settings
Cookies and similar technologies are used on this website for proper function of the website, for tracking performance analytics and for marketing purposes. We and some of our third-party providers may use cookie data for various purposes. Please review the cookie settings below and choose your preference.
Strictly Necessary: Used for the proper function of the website
Performance/Analytics: Used for monitoring website traffic and interactions
In March 2020, KrebsOnSecurity alerted Swedish security giant Gunnebo Group that hackers had broken into its network and sold the access to a criminal group which specializes in deploying ransomware. Reached by phone today, Jansson said he quit the company in August, right around the time Gunnebo disclosed the thwarted ransomware attack.
agriculture could, in short order, lead to foot shortages and hunger in the U.S. First the Colonial Pipeline and then meat processor JBS were hobbled – temporarily – by criminal ransomware. Episode 158: How NotPetya has Insurers grappling with Systemic Cyber Risk. Forget about Colonial Pipeline and JBS. and abroad.
The company’s description of the incident suggested ransomware. This was confirmed about a fortnight later, in early November, when the ALPHV/BlackCat ransomware group took responsibility for the attack , claiming to have encrypted Henry Schein’s files and exfiltrated 35 TB of data. Data breached: over 300 million records.
suffers second ransomware attack in months Having been struck by a ransomware attack in October by the BlackSuit group , which led to operations and appointments being postponed, Akumin Inc. has suffered a second attack, this time by the BianLian ransomware group. Data breached: more than 59 million data records. Akumin Inc.
ALPHV/BlackCat ransomware gang adds 2.7 TB of ASA Electronics data to its leak site The ALPHV/BlackCat ransomware gang is attempting to extort a ransom from ASA Electronics for 2.7 Welfare Benefits Plan Source 1 ; source 2 New Healthcare USA Yes 13,079 Insurance ACE/Humana Inc. Date breached: 384,658,212 records.
Source (New) Finance USA Yes 3,494 Woodruff Sawyer Source (New) Insurance USA Yes 3,087 Blackburn College Source (New) Education USA Yes 3,039 CAIRE Inc. million last year, roughly a quarter of which was the due to the ransomware attack it suffered in March 2023.
Compromised data includes policyholders’ and their families’ civil status, dates of birth and social security numbers, as well as the name of their health insurer and information relating to their contracts. GB Signature Performance, Inc. GB Signature Performance, Inc.
Other databases contained health insurance data, such as patents’ names, dates of birth, addresses and medical data. EyeCare Services Partners exposes more 3.5 The biggest database in the blob contained 3.1 million patients and 1.6 million unique Social Security numbers. Source (New) Manufacturing USA Yes 1.1
The breached data may include names, Social Security numbers and health insurance information. For some victims, the stolen data also included Social Security numbers and health insurance information. This week, the Department informed the Maine regulator that an additional 474,936 individuals were impacted.
We organize all of the trending information in your field so you don't have to. Join 55,000+ users and stay up to date on the latest articles your peers are reading.
You know about us, now we want to get to know you!
Let's personalize your content
Let's get even more personalized
We recognize your account from another site in our network, please click 'Send Email' below to continue with verifying your account and setting a password.
Let's personalize your content