shakedown.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A community for live music fans with roots in the jam scene. Shakedown Social is run by a team of volunteers (led by @clifff and @sethadam1) and funded by donations.

Administered by:

Server stats:

264
active users

#databreach

8 posts6 participants0 posts today
Dissent Doe :cupofcoffee:<p>NEW: </p><p>Paying cyberattackers is wrong, right? Should Taos County's incident be an exception?</p><p>CAUTION: Post contains mention of CSA:</p><p><a href="https://databreaches.net/2025/07/23/paying-cyberattackers-is-wrong-right-should-taos-countys-incident-be-an-exception/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">databreaches.net/2025/07/23/pa</span><span class="invisible">ying-cyberattackers-is-wrong-right-should-taos-countys-incident-be-an-exception/</span></a></p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/extortion" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>extortion</span></a> <a href="https://infosec.exchange/tags/govsec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>govsec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://infosec.exchange/tags/accountability" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>accountability</span></a></p>
DevaOnBreaches<p>The U.S. Nuclear Weapons Agency was hacked in a Microsoft SharePoint attack, exposing sensitive data. </p><p>The <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> targeted vulnerabilities in SharePoint, allowing unauthorized access.</p><p><a href="https://www.bleepingcomputer.com/news/security/us-nuclear-weapons-agency-hacked-in-microsoft-sharepoint-attacks/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bleepingcomputer.com/news/secu</span><span class="invisible">rity/us-nuclear-weapons-agency-hacked-in-microsoft-sharepoint-attacks/</span></a></p>
Chum1ng0 - Security Research :verified:<p>Two new victims of Safepay ransomware. We've emailed these companies to confirm their attacks, but none have responded.</p><p><a href="https://www.security-chu.com/2025/07/Safepay-ransomware-ataca-%20nuevamente.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">security-chu.com/2025/07/Safep</span><span class="invisible">ay-ransomware-ataca-%20nuevamente.html</span></a></p><p><a href="https://infosec.exchange/tags/cyberattack" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cyberattack</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/LATAM" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>LATAM</span></a> <a href="https://infosec.exchange/tags/Peru" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Peru</span></a> <a href="https://infosec.exchange/tags/Paraguay" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Paraguay</span></a> <a href="https://infosec.exchange/tags/Cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Cybersecurity</span></a> <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a></p>
Dissent Doe :cupofcoffee:<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@sawaba" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>sawaba</span></a></span> Here's another one to investigate/add to your potentially fatal data breaches sheet: </p><p>Ascension Health Services LLC dba Alpha Wellness &amp; Alpha Medical Centre in Alpharetta, Georgia was hit by RansomHub on February 3, 2025. On February 18, RansomHub leaked the data. </p><p>On April 4, Alpha Medical announced it was closing totally due to the incident and its last day would be April 18 (screenshot below). </p><p>On July 8, Alpha notified HHS that 1,714 patients were affected.</p><p>Substitute notice/notification letter: <a href="https://alphamedctr.com/assets/files/AHS%20Security%20Notice.pdf" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">alphamedctr.com/assets/files/A</span><span class="invisible">HS%20Security%20Notice.pdf</span></a></p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a></p>
Dissent Doe :cupofcoffee:<p>The St. Lawrence Lewis Board of Cooperative Educational Services ("BOCES") in New York has reported a breach that impacted 10,993 people. The types of information involved included: SSN, name, address, DOB, tax identification number, medical information, and financial account information.</p><p>The "cybersecurity incident" was discovered on August 12, 2024 and just reported this week to the Maine Attorney General's Office, although letters were sent out to those affected in June. </p><p><a href="https://www.maine.gov/agviewer/content/ag/985235c7-cb95-4be2-8792-a1252b4f8318/64a4742c-859e-400b-8098-589299a4052c.html" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">maine.gov/agviewer/content/ag/</span><span class="invisible">985235c7-cb95-4be2-8792-a1252b4f8318/64a4742c-859e-400b-8098-589299a4052c.html</span></a></p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/EduSec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>EduSec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> </p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@douglevin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>douglevin</span></a></span> <span class="h-card" translate="no"><a href="https://freeradical.zone/@funnymonkey" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>funnymonkey</span></a></span></p>
Dissent Doe :cupofcoffee:<p>The Clearbrook-Gonvick School District in Minnesota has disclosed a breach that occurred in October 2024. The types of information involved included names, Social Security numbers, driver's license or state ID numbers, individual taxpayer identification numbers, financial account information, and student identification numbers.</p><p><a href="https://markets.financialcontent.com/stocks/article/accwirecq-2025-7-21-notice-of-data-privacy-incident" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">markets.financialcontent.com/s</span><span class="invisible">tocks/article/accwirecq-2025-7-21-notice-of-data-privacy-incident</span></a></p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/Edusec" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Edusec</span></a> <a href="https://infosec.exchange/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a></p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@douglevin" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>douglevin</span></a></span> <span class="h-card" translate="no"><a href="https://freeradical.zone/@funnymonkey" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>funnymonkey</span></a></span></p>
DevaOnBreaches<p>World Leaks, the rebranded Hunters International ransomware gang, leaked 1.3 TB of data allegedly from Dell Technologies. The files, including internal scripts, employee data, and product info, were posted on the dark web. <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> </p><p><a href="https://hackread.com/world-leaks-dell-data-breach-leaks-1-3-tb-of-files/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/world-leaks-dell-</span><span class="invisible">data-breach-leaks-1-3-tb-of-files/</span></a></p>
Europe Says<p><a href="https://www.europesays.com/2260259/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="">europesays.com/2260259/</span><span class="invisible"></span></a> Queensland data security breach exposes data of thousands as man hacks into multiple financial service offices <a href="https://pubeurope.com/tags/AustraliaDataSecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>AustraliaDataSecurity</span></a> <a href="https://pubeurope.com/tags/Data" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Data</span></a> <a href="https://pubeurope.com/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://pubeurope.com/tags/DataBreachVictims" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreachVictims</span></a> <a href="https://pubeurope.com/tags/FinancialServicesSecurityBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>FinancialServicesSecurityBreach</span></a> <a href="https://pubeurope.com/tags/fraud" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fraud</span></a> <a href="https://pubeurope.com/tags/ITPTaxOffice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ITPTaxOffice</span></a> <a href="https://pubeurope.com/tags/MortgageChoice" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>MortgageChoice</span></a> <a href="https://pubeurope.com/tags/PersonalDataTheft" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>PersonalDataTheft</span></a> <a href="https://pubeurope.com/tags/QueenslandDataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>QueenslandDataBreach</span></a></p>
Dissent Doe :cupofcoffee:<p>North Country Health in Arizona sent me a statement in response to Stormous' claims. As I had previously reported, I was unable to verify the patient data sample Stormous had provided and reported that it appeared fake. </p><p>North Country Health was also unable to verify the alleged patient data and states, "Independent cybersecurity experts have reviewed the data posted and found it to be inconsistent, unverifiable, and likely fabricated." </p><p><a href="https://databreaches.net/2025/07/17/north-country-healthcare-responds-to-stormouss-claims-of-a-breach/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">databreaches.net/2025/07/17/no</span><span class="invisible">rth-country-healthcare-responds-to-stormouss-claims-of-a-breach/</span></a></p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/fake" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>fake</span></a> </p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@lawrenceabrams" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>lawrenceabrams</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@zackwhittaker" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>zackwhittaker</span></a></span> <span class="h-card" translate="no"><a href="https://mastodon.social/@campuscodi" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>campuscodi</span></a></span></p>
DevaOnBreaches<p>Britain set up a secret scheme to relocate thousands of Afghans after a major <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> exposed their details, risking Taliban reprisals. </p><p>The breach, from 2022, led to a 2 billion-pound program for their safety.</p><p><a href="https://www.reuters.com/world/uk/thousands-afghans-secretly-moved-britain-after-data-leak-2025-07-15/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">reuters.com/world/uk/thousands</span><span class="invisible">-afghans-secretly-moved-britain-after-data-leak-2025-07-15/</span></a></p>
Dissent Doe :cupofcoffee:<p>NEW: RansomedVC is back — and is still attacking its competitors: </p><p><a href="https://databreaches.net/2025/07/17/ransomedvc-is-back-and-is-still-attacking-its-competitors/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">databreaches.net/2025/07/17/ra</span><span class="invisible">nsomedvc-is-back-and-is-still-attacking-its-competitors/</span></a></p><p>RansomedVC has a history of leaking its competitors' data. Heck, they even leaked their own to get attention. Now they're back, and one of their first targets was the Medusa ransomware gang. </p><p><a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://infosec.exchange/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://infosec.exchange/tags/SnapAv" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SnapAv</span></a> <a href="https://infosec.exchange/tags/SnapOne" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>SnapOne</span></a> <a href="https://infosec.exchange/tags/Medusa" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Medusa</span></a> <a href="https://infosec.exchange/tags/RansomedVC" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>RansomedVC</span></a> </p><p><span class="h-card" translate="no"><a href="https://infosec.exchange/@amvinfe" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>amvinfe</span></a></span></p>
Ian Brown 👨🏻‍💻<p>Sir Geoffrey Clifton-Brown, chairman of the 🇬🇧 parliament public accounts committee, said: “We…have already made preliminary arrangements to ask officials from the Ministry of Defence to come and explain all of this in a public session in the autumn.” <a href="https://eupolicy.social/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://apple.news/AJNr5CuRmQCCRibFmCozBEg" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">apple.news/AJNr5CuRmQCCRibFmCo</span><span class="invisible">zBEg</span></a></p>
David Hollingworth<p>I've seen some pretty poor responses to a ransomware attack, but simply saying 'we can't work out what data was exfiltrated and it's up to you, not us, to work it out' is about has brazen an abnegation of responsibility I've seen since I've started covering this beat.</p><p>Absolutely WILD.</p><p><a href="https://mastodon.social/tags/ransomware" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>ransomware</span></a> <a href="https://mastodon.social/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> <a href="https://mastodon.social/tags/auspol" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>auspol</span></a> </p><p><a href="https://www.cyberdaily.au/security/12393-uap-confirms-ransomware-attack-personal-data-and-email-correspondence-exposed" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">cyberdaily.au/security/12393-u</span><span class="invisible">ap-confirms-ransomware-attack-personal-data-and-email-correspondence-exposed</span></a></p>
The New Oil<p>Thousands of Afghans secretly moved to <a href="https://mastodon.thenewoil.org/tags/Britain" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Britain</span></a> after data leak</p><p><a href="https://www.reuters.com/world/uk/thousands-afghans-secretly-moved-britain-after-data-leak-2025-07-15/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">reuters.com/world/uk/thousands</span><span class="invisible">-afghans-secretly-moved-britain-after-data-leak-2025-07-15/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/Afghanistan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Afghanistan</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://mastodon.thenewoil.org/tags/politics" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>politics</span></a></p>
DevaOnBreaches<p>Co-op CEO confirms that 6.5 million members’ data was stolen in April's cyberattack, including names, addresses &amp; contact information (no financial data). </p><p>Four suspects arrested &amp; bailed. </p><p>The CEO apologizes, says it’s personal. <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> </p><p><a href="https://www.bbc.com/news/articles/cql0ple066po" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">bbc.com/news/articles/cql0ple0</span><span class="invisible">66po</span></a></p>
Ian Brown 👨🏻‍💻<p>‘When that data falls into the hands of the <a href="https://eupolicy.social/tags/Taliban" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Taliban</span></a> it will lead to my arrest, torture and death’ <a href="https://eupolicy.social/tags/UK" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>UK</span></a> <a href="https://eupolicy.social/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://eupolicy.social/tags/Afghanistan" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Afghanistan</span></a> <a href="https://www.theguardian.com/world/2025/jul/16/when-that-data-falls-into-the-hands-of-the-taliban-it-will-lead-to-my-arrest-torture-and-death?CMP=Share_iOSApp_Other" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://www.</span><span class="ellipsis">theguardian.com/world/2025/jul</span><span class="invisible">/16/when-that-data-falls-into-the-hands-of-the-taliban-it-will-lead-to-my-arrest-torture-and-death?CMP=Share_iOSApp_Other</span></a></p>
DevaOnBreaches<p>Episource, a medical billing giant owned by Optum, confirms a <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> exposing personal &amp; health data of 5.4M people in the U.S, exposing sensitive info like medical records, insurance details, and contact info.</p><p><a href="https://techcrunch.com/2025/07/14/episource-is-notifying-millions-of-people-that-their-health-data-was-stolen/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/07/14/epis</span><span class="invisible">ource-is-notifying-millions-of-people-that-their-health-data-was-stolen/</span></a></p>
The New Oil<p><a href="https://mastodon.thenewoil.org/tags/Episource" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>Episource</span></a> is notifying millions of people that their <a href="https://mastodon.thenewoil.org/tags/health" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>health</span></a> data was stolen</p><p><a href="https://techcrunch.com/2025/07/14/episource-is-notifying-millions-of-people-that-their-health-data-was-stolen/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">techcrunch.com/2025/07/14/epis</span><span class="invisible">ource-is-notifying-millions-of-people-that-their-health-data-was-stolen/</span></a></p><p><a href="https://mastodon.thenewoil.org/tags/cybersecurity" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>cybersecurity</span></a> <a href="https://mastodon.thenewoil.org/tags/privacy" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>privacy</span></a> <a href="https://mastodon.thenewoil.org/tags/DataBreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>DataBreach</span></a> <a href="https://mastodon.thenewoil.org/tags/healthcare" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>healthcare</span></a></p>
DevaOnBreaches<p>Louis Vuitton investigates a <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> in the UK that exposed customer info (names, contact details, purchase history) on July 2, 2025.</p><p>This is the third breach in 3 months across LVMH brands, raising concerns over cybersecurity practices.</p><p><a href="https://hackread.com/louis-vuitton-uk-cyberattack-3-lvmh-breach-3-months/" rel="nofollow noopener" translate="no" target="_blank"><span class="invisible">https://</span><span class="ellipsis">hackread.com/louis-vuitton-uk-</span><span class="invisible">cyberattack-3-lvmh-breach-3-months/</span></a></p>
XposedOrNot<p><span class="h-card" translate="no"><a href="https://infosec.exchange/@XposedOrNot" class="u-url mention" rel="nofollow noopener" target="_blank">@<span>XposedOrNot</span></a></span> += Tigo Data Breach</p><p>The Tigo <a href="https://infosec.exchange/tags/databreach" class="mention hashtag" rel="nofollow noopener" target="_blank">#<span>databreach</span></a> in mid-2023 involved the exposure of 300GB of data from the Chinese video chat platform, containing over 100M records. The breach included more than 2.7M unique names, usernames, email and IP addresses, genders, profile photos, and private messages.</p><p>Exposed data: Names, Usernames, Email addresses, IP addresses, Genders, Profile photos, Private messages</p><p>Potential risks: Privacy breaches, Identity exposure, Unauthorized access</p>