ThreatWatch is a snapshot of the data breaches hitting organizations and individuals, globally, on a daily basis.
The information is based on accounts published by outside news organizations and researchers.
We have tried to provide you with a sample of the most prevalent and interesting cyber events. Each incident chronicled includes the suspected attackers' methods of penetration and apparent target to help highlight patterns of activity and emerging threats. The records are limited to episodes where data actually was compromised. These are not accounts of new viruses, spam, or malicious email campaigns that might lead to breaches.
Some of the events cited are more damaging than portrayed, while others may later turn out not to be hacks at all: as you’ll see, the number of people affected is one of the hardest measures to track.
About the map: the global map shows the location of the most recent breaches cited in the ThreatWatch database. When available, we also show the location of the hackers responsible for the breach.Collapse
Hacktivist Defaces Russian Ministry of Foreign Affairs’ Website
Government (Foreign) // Russia
A hacktivist retaliated against Russia for “meddling in U.S. affairs,” according to a blog post. CNN reported the Jester defaced a Russian ...
Denial-of-service attack; DNS hijacking
Widespread Outage of Popular Sites Because of DDoS Attacks
If Twitter is down, where do the masses go to complain when their other favorite websites aren’t loading? Early Friday, Domain Name System ...
Credential-stealing malware; Network intrusion
Credit Card-Skimming Malware Found on Senate Republican Fundraising Site
A Dutch developer found credit card-stealing code on a site to raise funds for Republican senators, according to a report. Developer Willem ...
WikiLeaks: Ecuador Cut Off Assange’s Internet Access
The founder of WikiLeaks can’t access the internet. WikiLeaks tweeted Monday a “state party” severed Julian Assange’s access and the ...
Hacker Uses Implanted Chips to Open Security Gates
A Hungarian man can wave his hands to open security doors. His hands have two implanted chips: one near-field communications chip and one ...
Blockchain Users Lose Access to Digital Wallets for Hours
The website for Blockchain.info, bitcoin wallet provider for 8 million users, went down for several hours Wednesday, leaving users without ...
Cyber espionage; Data dump; Network intrusion
WikiLeaks Publishes Batch After Batch of Clinton-Related Emails
WikiLeaks published another batch of emails from a Hillary Clinton adviser, making it three releases in the last week. The Tuesday batch ...
Data dump; Network intrusion; Spearphishing
WADA Questions Data in Latest Medical Records Dump
The Fancy Bear hacking collective released more confidential medical information on Olympic athletes, but this time the World Anti-Doping ...
Man-in-the-middle attack; Software vulnerability
Insulin Pump Vulnerability Lets Attackers Remotely Administer Dose
Healthcare and Public Health
A security firm found a flaw in a brand of insulin pump systems that could allow a hacker to remotely administer a dose of insulin. ...
Data dump; Network intrusion; User accounts compromised
OurMine Hackers Strike Back After Buzzfeed Story
Another hacking group appears to be retaliating against a media outlet. Buzzfeed on Tuesday published an investigation into hacking ...