ThreatWatch is a snapshot of the data breaches hitting organizations and individuals, globally, on a daily basis.
The information is based on accounts published by outside news organizations and researchers.
We have tried to provide you with a sample of the most prevalent and interesting cyber events. Each incident chronicled includes the suspected attackers' methods of penetration and apparent target to help highlight patterns of activity and emerging threats. The records are limited to episodes where data actually was compromised. These are not accounts of new viruses, spam, or malicious email campaigns that might lead to breaches.
Some of the events cited are more damaging than portrayed, while others may later turn out not to be hacks at all: as you’ll see, the number of people affected is one of the hardest measures to track.
About the map: The global map visualizes real-time malicious activity data captured by sensors used by the experimental Honeynet Project, an international non-profit security research organization dedicated to investigating the latest attacks and developing open source tools to improve Internet security. The green dots indicate the geographic locations of outgoing malicious activity. The map represents only some of the activity detected at any given time because not all of the project's sensors push their data.Collapse
Cyber espionage; Social engineering; User accounts compromised
Hackers Launch Campaign of Intimidation against Iranian Expat Writer
Media // United States
The opinionated Iranian author Roya Hakakian, who has spent 30 years living in the United States, was subjected to cyber espionage starting ...
Unauthorized use of system administrator privileges
Web Scrape of Buried Twitter Financials Technically Amounts to a Hack
Financial-intelligence firm Selerity took credit for publishing Twitter's earnings announcement before NASDAQ's closing bell. It says it ...
Cyber espionage; Social engineering; Stolen credentials; User accounts compromised
Brigham and Women’s & Mass General Entangled in Partners HealthCare Breach
Healthcare and Public Health // Massachusetts, United States
Partners HealthCare employees responded to “phishing” e-mail lures, which allowed intruders to open their e-mail accounts. Some of the ...
Network intrusion; Unauthorized use of system administrator privileges
Hackers Manipulated Ratings of Pro-Russian Videos
Entertainment // Social Media // Web Services
Hacktivists and/or cybercrooks compromised the computers of victims to invisibly load propaganda videos and ads, upping the click-views, ...
User accounts compromised
Ryanair Defrauded of $5 Million, Money Transferred Via Chinese Bank
Financial Services // Transportation // Ireland
A criminal scam, of unknown origin, removed millions of dollars from one of the airline’s bank accounts through an electronic transaction. ...
Cyber espionage; Network intrusion; Social engineering; Stolen credentials
Confidential Data on Taipei Officials Stolen, Messaging App Implicated In the Plot
Government (Foreign) // Taipei, Taiwan
It’s possible the hackers are planning to use the personal information in a so-called social engineering gambit to tease out even more ...
Accidentally leaked credentials; Insider attack
Indian Telecom Regulators Leak 1.1 Million Email Addresses of Citizen Commenters
Government (Foreign) // India
“The Telecom Regulatory Authority of India dumped more than a million Indian netizens' traceable personal details online,” after choosing ...
Network intrusion; Stolen credentials; Unauthorized use of system administrator privileges; User accounts compromised
Internal System at Email Delivery Service SendGrid Hacked
Web Services // United States
An employee account was compromised and hijacked to access other internal systems that contained customer and employee credentials. On ...
Insider attack; Stolen laptop
Insider Stole CENTCOM Computers That Wound Up on eBay
Government (U.S.) // Florida, United States
Scott Duty, a former civilian CENTCOM employee, copped to the theft after a supervisor tasked Duty with taking stock of the very inventory ...
User accounts compromised; Man-in-the-middle attack
Tesla’s Online Presence Hijacked
Social Media // Transportation // Web Services
The website and Twitter account of the e-car maker were hacked, while Tesla CEO Elon Musk briefly lost control of his personal Twitter ...