ThreatWatch is a snapshot of the data breaches hitting organizations and individuals, globally, on a daily basis.
The information is based on accounts published by outside news organizations and researchers.
We have tried to provide you with a sample of the most prevalent and interesting cyber events. Each incident chronicled includes the suspected attackers' methods of penetration and apparent target to help highlight patterns of activity and emerging threats. The records are limited to episodes where data actually was compromised. These are not accounts of new viruses, spam, or malicious email campaigns that might lead to breaches.
Some of the events cited are more damaging than portrayed, while others may later turn out not to be hacks at all: as you’ll see, the number of people affected is one of the hardest measures to track.
About the map: The global map visualizes real-time malicious activity data captured by sensors used by the experimental Honeynet Project, an international non-profit security research organization dedicated to investigating the latest attacks and developing open source tools to improve Internet security. The green dots indicate the geographic locations of outgoing malicious activity. The map represents only some of the activity detected at any given time because not all of the project's sensors push their data.Collapse
Network intrusion; Stolen credentials; Unauthorized use of system administrator privileges
Hack Attack Hits Catholic Agency Workers
Nonprofit // Detroit, United States
The problem surfaced in late July, when IT staff for the Michigan Catholic Conference found a suspicious file deep within the ...
Accidentally leaked credentials; Insider attack
Travel Operator Thomson Leaks Customer Data
Hospitality // UK
The UK vacation services company accidentally exposed personal information on clients in an email. The data affected includes customer ...
Payment device infection; User accounts compromised
Cards Used at Totally Promotional eTailer Fall Into Crooks Hands
Retailer // United States
Hackers entered the computer system of Casad Company, the firm that operates totallypromotional.com, and deposited malware that sucks out ...
User accounts compromised
Thousands of Women’s Email Accounts Hacked at University of Rhode Island
Education // Rhode Island, United States
A data breach potentially compromised the usernames and passwords of predominantly female current and former students. "We've determined ...
Network intrusion; Stolen credentials
Web.com Customers: Check Your Credit Card Statements
Web Services // Florida, United States
The website-hosting company on Aug. 13 discovered unauthorized activity during regular security operations. “Scheduled monitoring found the ...
Insider attack; Spearphishing; Software vulnerability
Misogynist Hackers Allegedly Leaked Addresses From Motherhood Website
Social Media // UK
A hacking group going by the Twitter name @DadSecurity appears to have posted personal information of members of Mumsnet.com's parenting ...
Payment device infection; Software vulnerability
Hackers Take a Swipe at California Wineries
Retailer // California, United States
Special payment software used by 70 Northern California sellers was breached, handing wine drinkers’ personal and financial data to crooks. ...
Accidentally leaked credentials; Data dump; Insider attack
FOIA Goof Exposes Illinois Prison Personnel Records
Government (U.S.) // Illinois, United States
The Social Security numbers and other personal data of Illinois Department of Corrections employees were inadvertently included in a ...
Cyber espionage; User accounts compromised; Software vulnerability
University of Virginia Hacked in Suspected Chinese Espionage Case
Education // Virginia, United States
The data breach allegedly targeted the email accounts of two employees whose work is connected to China. UVA disclosed the incident on ...
Credential-stealing malware; Network intrusion; Stolen credentials
Crooks Nab Payment Details from Fred's Super Dollar Stores Nationwide
A hacker implanted data-slurping software into two servers that process information from cards swiped at registers. The malware was ...