Every industry is fair game for hackers. One mistake with any account information like reusing or sharing passwords and your organization can be shaken down for millions. So remember to practice good cybersecurity: do not reuse passwords, always confirm whom you are sharing sensitive information with, and be careful when clicking on suspicious links.
Share this post with your friends as a reminder to why “password” should not be their password.
The breach began on or before December 23, 2013, and dragged on until May 11, 2015. After gaining entry to Excellus Health Plan’s systems, malicious hackers installed malware and conducted reconnaissance activities that ultimately resulted in the disclosure of protected health information (PHI) of more than 9.3 million individuals.
Ransomware gangs are increasingly adding an extra layer of extortion to attacks by not only encrypting networks and demanding hundreds of thousands or even millions of dollars in bitcoin to restore them, but also stealing sensitive information and threatening to publish it if the ransom isn’t paid.
If you suspect your information has been part of a data leak, use HackNotice Instant Check for free and see if your data is being shared by hackers. Simply click HERE and enter the information you want checked.

The European Medicines Agency (EMA) today revealed that some of the stolen Pfizer/BioNTech vaccine candidate data was doctored by threat actors before being leaked online with the end goal of undermining the public’s trust in COVID-19 vaccines.
Dublin man (21), who pleaded guilty in Irish court to theft of Bitcoin, no longer facing possible sentence of 108 years in US jail.
Since 2016, Ardit Ferizi, a Kosovan national, has been serving a 20-year prison sentence for providing details about 1,300 U.S. military and government personnel to the Islamic State terrorist group. A judge in December awarded Ferizi, who is overweight and has asthma, compassionate release, citing his vulnerability to COVID-19.
Ready to see how HackNotice can help you avoid data breaches like these? Request a demo now!

Leave A Comment