{"id":6380,"date":"2022-02-02T11:00:07","date_gmt":"2022-02-02T11:00:07","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/?p=6380"},"modified":"2023-03-27T08:45:33","modified_gmt":"2023-03-27T08:45:33","slug":"catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/","title":{"rendered":"Catalog of January 2022 Cyber Attacks and Data Breaches \u2013 66 million records breached"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span class=\"nectar-dropcap\" style=\" color: #2300ef;\"> O<\/span>ur inaugural list of data breaches and cyber attacks of 2022 should dispel any illusion that the cybersecurity landscape would suddenly improve that year.<\/p>\r\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">Following is a comprehensive list of data breaches, with those involving UK institutions highlighted for ease of reference.<\/p>\r\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p><a href=\"#Cyber attacks\"><strong>Cyber attacks<\/strong><\/a><\/p>\r\n<p><a href=\"#Ransomware\"><strong>Ransomware<\/strong><\/a><\/p>\r\n<p><a href=\"#Data breaches\"><strong>Data breaches<\/strong><\/a><\/p>\r\n<p><a href=\"#Financial information\"><strong>Financial information<\/strong><\/a><\/p>\r\n<p><a href=\"#Malicious insiders and miscellaneous incidents\"><strong>Malicious insiders and miscellaneous incidents<\/strong><\/a><\/p>\r\n<p><a href=\"#In other news\u2026\"><strong>In other news\u2026<\/strong><\/a><\/p>\r\n[\/vc_column_text][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][nectar_responsive_text]\r\n<p>In January, we found 95 security incidents that exposed 65,984,648 records.<\/p>\r\n[\/nectar_responsive_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Cyber attacks&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Cyber attacks<\/span><\/p>\r\n<ul class=\"wp-block-list\" style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bbc.co.uk\/news\/uk-england-gloucestershire-60045060\"><span lang=\"en-AE\" style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Gloucester Council cyber attack linked to Russian hackers<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.liverpoolecho.co.uk\/news\/liverpool-news\/parents-warned-after-data-breach-22865428\"><span lang=\"en-AE\" style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Parents warned after scam emails at Liverpool secondary school<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/have-i-been-pwned-warns-of-datpiff-data-breach-impacting-millions\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">DatPiff data being sold online after password-cracking attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (7.5 million)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/ag.ny.gov\/press-release\/2022\/attorney-general-james-alerts-17-companies-credential-stuffing-cyberattacks\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">New York Attorney General alerts companies to credential-stuffing cyber attacks<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (1.1 million)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.hipaajournal.com\/jefferson-surgical-clinic-announces-june-2021-data-breach-impacting-174769-patients\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Jefferson Surgical Clinic notifies those affected by 2021 data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (174,769)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.asiaone.com\/singapore\/og-department-store-customers-personal-details-leaked-data-breach\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Singapore-based department store OG suffers security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/en.tempo.co\/read\/1547439\/health-ministry-responds-to-massive-data-leak-of-medical-records\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Indonesian govt responds to massive data leak of medical records<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (6 million) <\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/monroe-public-schools-notifies-1201-of-data-breach-in-june\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Monroe Public Schools notifies those affected by malware attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (1,201)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bangkokpost.com\/thailand\/general\/2245063\/huge-patient-data-leak-from-siriraj-hospital\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Data captured from Siriraj Hospital put up for sale on dark web<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (39 million)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/thesungazette.com\/article\/education\/2022\/01\/12\/vusd-says-personal-info-was-obtained-in-data-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Visalia Unified School District notifying employees and students about security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (35,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bitdefender.com\/blog\/hotforsecurity\/hackers-raided-panasonic-server-months-stealing-data-job-seekers\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Hackers raided Panasonic server for months, stealing personal data of job seekers<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/oh-memorial-health-system-notifies-216478-patients-of-malware-incident-last-july\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Memorial Health System notifies patients of malware incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (216,478)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.brantfordexpositor.ca\/news\/city-hall-privacy-breach-affects-staff\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Canadian city of Brantford says its city hall has been breached<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/finance.yahoo.com\/news\/several-ukraine-ministry-websites-struck-061706429.html?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZGF0YWJyZWFjaGVzLm5ldC8&amp;guce_referrer_sig=AQAAAHw4yEgEQsSzpZjXExGPtOJDtEjyLOh3zw7fBQKLr1fSc5pOI1unrAYlo0xsBhE-mcvLKuAHF49FbaqyPCBqAdL7sYpcB2QoLZU0eHhFNgNz_X3IKE-EhE_qEBtkIDcknZgu7up0Oau5fW-eXqRcj50_mlt4aX-7gs4vKu0rXkDS\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Cyber attack hits Ukrainian websites as Russia tensions mount<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.theolympian.com\/news\/local\/article257335777.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">City of Tenino loses $280,309 to phishing email scam<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.insideottawavalley.com\/news-story\/10555563-cyberattack-at-arnprior-regional-health-data-stolen\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Data stolen in attack at Arnprior Regional Health<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/themarketperiodical.com\/2022\/01\/17\/another-hack-faced-by-lympo-lost-165-2-million-lmt-tokens-worth-18-7-million\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Another hack on Lympo, lost 165.2 million LMT tokens<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.icrc.org\/en\/document\/sophisticated-cyber-attack-targets-red-cross-red-crescent-data-500000-people\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Red Cross discloses cyber attack affecting \u201chighly vulnerable people\u201d<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (515,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.newindianexpress.com\/nation\/2022\/jan\/21\/thousands-of-indians-covid-19-related-dataleaked-online-2409653.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Thousands of Indians\u2019 Covid-19 related data leaked online<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (20,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/wtop.com\/anne-arundel-county\/2022\/01\/anne-arundel-medical-center-announces-potential-breach-of-patient-information\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Anne Arundel Medical Center discloses phishing attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/ga-peachtree-orthopaedic-clinic-reports-breach-to-hhs\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Peachtree Orthopaedic Clinic reports breach to HHS<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (53,686)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/pio.saccounty.gov\/Pages\/Report-of-Phishing-Attack-and-Data-Breach.aspx\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Sacramento County employee fell for phishing scam<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (2,096)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/playcrazygame.com\/2022\/01\/23\/central-bank-reports-pix-key-data-leak\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Brazil\u2019s Acesso Solu\u00e7\u00f5es de Pagamento suffers cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (160,100)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.kxly.com\/patient-info-possibly-disclosed-in-spokane-health-district-data-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Patient info possibly disclosed in Spokane Health District phishing attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (1,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/canadas-foreign-affairs-ministry-hacked-some-services-down\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Canada\u2019s Foreign Affairs Ministry hacked<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/levittownnow.com\/2022\/01\/24\/pennsburys-computer-system-breached-incident-under-investigation\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Pennsbury School District\u2019s computer system breached<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.reuters.com\/world\/asia-pacific\/nkorean-internet-downed-by-suspected-cyber-attacks-researchers-2022-01-26\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">North Korean Internet downed by DDoS attacks<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.prnewswire.com\/news-releases\/nhs-management-continues-investigation-of-data-incident-301461476.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">NHS Management discloses incident from last May<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/nobel-foundation-site-hit-by-ddos-attack-on-award-day\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Nobel Foundation site hit by DDoS attack on award day<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-spencer-gifts-llc-3346140\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Mall retailer Spencer Gifts discloses cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-true-health-new-mexico-9480226\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">True Health New Mexico says it was targeted by cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (62,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-startek-inc-6733982\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">StarTek says it was hit by cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"http:\/\/www.trhosp.org\/getpage.php?name=Urgent_Notice\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Taylor Regional Hospital phone lines still down after reported cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Ransomware&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Ransomware<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/mo-tague-family-practice-patient-records-stolen-and-leaked\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Tague Family Practice patient records stolen and leaked<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/uk.sports.yahoo.com\/news\/cyber-attack-causes-chaos-costa-164513016.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Ransomware causes chaos in Costa Rica government systems<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.pressdemocrat.com\/article\/news\/ransomware-group-claims-responsibility-for-partnership-healthplan-internet\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Partnership HealthPlan of California hit by ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (850,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/snap-on-discloses-data-breach-claimed-by-conti-ransomware-gang\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Snap-on hit by ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/french-hospital-group-disconnects-internet-after-hackers-steal-data\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">The GHT Coeur Grand Est. Hospitals and Health Care group discloses ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/oag.ca.gov\/system\/files\/Sample%20Individual%20Notice.PDF\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Smile Brands discloses a ransomware incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (2,592,494)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/renewablesnow.com\/news\/deutsche-windtechnik-hit-by-targeted-cyberattack-781048\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Deutsche Windtechnik hit by ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/american-dental-association-hit-by-new-black-basta-ransomware\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">American Dental Association hit by new Black Basta ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/austin-peay-state-university-resumes-after-ransomware-cyber-attack\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Austin Peay State University resumes after ransomware cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.fox19.com\/2022\/04\/27\/current-former-lakota-local-schools-students-possibly-impacted-by-data-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Current, former Lakota Local Schools students possibly impacted by third-party data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-davis-instruments-1461698\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">California-based Davis Instruments hit by ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-florida-international-1589269\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Florida International University suffers ransomware attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-jon-don-llc-5714934\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Jon-Don struck by ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/cjoy.com\/news\/8788980\/elgin-county-data-ransomeware-crime\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Purported Elgin County data posted online by ransomware group<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Data breaches&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Data breaches<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.theguardian.com\/technology\/2022\/apr\/13\/home-offices-visa-service-apologises-for-email-address-data-breach\"><span lang=\"en-AE\" style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Home Office\u2019s visa service apologises for email address data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (170)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.sunstar.com.ph\/article\/1925294\/manila\/local-news\/smartmatic-admits-data-leak-but-not-related-to-2022-polls\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Smartmatic admits \u2018data leak\u2019 but not related to 2022 polls<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/thehackernews.com\/2022\/03\/hondas-keyless-access-bug-could-let.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Honda\u2019s keyless access bug could let thieves remotely unlock and start vehicles<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.marketwatch.com\/story\/parker-hannifin-says-a-third-party-hacked-its-systems-on-march-14-and-may-have-accessed-personal-information-on-workers-2022-04-05\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Aerospace firm Parker-Hannifin discloses breach in regulatory filing<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.insurancejournal.com\/news\/southcentral\/2022\/04\/06\/661539.htm\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Texas Department of Insurance reveals data leak<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (1.8 million)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/sports.yahoo.com\/data-compromised-1-100-members-175942696.html#:~:text=Health%20insurance%20provider%20SummaCare%20is,2%25%20of%20its%2061%2C000%20members.\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">SummaCare says system vulnerability breached customer data<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (1,100)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.thenewsminute.com\/article\/massive-data-leak-devotees-meenakshi-temple-admin-claims-technical-glitch-162805\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Amid data leak of devotees from Meenakshi temple, admin claims technical glitch<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.beckershospitalreview.com\/cybersecurity\/1-700-health-records-exposed-during-metrohealth-system-s-ehr-upgrade.html#:~:text=1%2C700%20health%20records%20exposed%20during%20MetroHealth%20System%27s%20EHR%20upgrade,-Naomi%20Diaz%20%2D%20Thursday&amp;text=Cleveland%2Dbased%20MetroHealth%20System%20experienced,confirmed%20to%20Becker%27s%20April%2013.\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">MetroHealth patients affected by data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (1,700)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.queensjournal.ca\/story\/2022-04-14\/university\/life-sciences-students-facing-mass-data-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Canada\u2019s University Life Sciences students facing mass data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hetzner-lost-customer-data-and-gave-20-as-compensation\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Hetzner lost customer data and gave \u20ac20 as compensation<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/breakingdefense.com\/2022\/04\/exclusive-army-futures-command-potentially-exposed-info-of-users-over-ms-teams\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">MS Teams users at Army Futures Command potentially exposed private info<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/planmember-securities-corporation-7147789\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">PlanMember Securities Corporation discloses data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Financial information&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Financial information<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/fake-trezor-data-breach-emails-used-to-steal-cryptocurrency-wallets\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Fake Trezor data breach emails used to steal cryptocurrency wallets<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (106,856)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.theregister.com\/2022\/04\/04\/emma_the_sleep_company_admits\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Emma Sleep Company admits checkout Magecart attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/jamaica-gleaner.com\/article\/news\/20220425\/mailpac-customers-affected-aeropost-data-breach\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Courier company\u00a0Mailpac Group Limited reports credit card data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-maplesoft-5009141\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Maplesoft announces malware attack on its online store<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-update-cmg-mortgage-inc-4980149\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">CMG Financial says hackers stole payment card info<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/techdator.net\/nb65-hackers-stole-qiwi-credit-card-data\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Russian payments company QIWI hacked<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Malicious insiders and miscellaneous incidents&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Malicious insiders and miscellaneous incidents<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/globalnews.ca\/news\/8728074\/campbellford-memorial-hospital-patient-privacy-breaches\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Two staff fired for patient privacy breaches at Campbellford Memorial Hospital<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (500)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bellingcat.com\/news\/rest-of-world\/2022\/04\/01\/food-delivery-leak-unmasks-russian-security-agents\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Food delivery service Yandex blames insiders for data leak<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/techcrunch.com\/2022\/04\/05\/block-cash-app-data-breach\/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZGF0YWJyZWFjaGVzLm5ldC8&amp;guce_referrer_sig=AQAAAFbEt3yec_TMu0TvxXt0F5az_ZKBns7NdieltSDGa6227ubKJWNEt9aMr__IHXUZLrr_iUQ4NB1Pk2FhVc_HRBr0R_iWrfVO3LqPhoYlkpM6pZEQu7ZFtZ6ckKYgX6YJn0r4giGG1PWtX5K7u1qF8y9MB6l6gdUSaahyi-t20MYR\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Block confirms Cash App breach after former employee accessed customer data<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (8.2 million)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/eu.courierpress.com\/story\/news\/2022\/04\/16\/deaconess-vanderburgh-county-womens-personal-medical-data\/7335573001\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Deaconess Health employee viewed women\u2019s personal, medical data without cause<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;In other news\u2026&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">In other news\u2026<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.courthousenews.com\/texas-tech-company-cant-dodge-investor-suit-over-massive-cyberattack\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">SolarWinds can\u2019t dodge investor suit over massive cyber attack<\/span><\/a><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.dw.com\/en\/germany-closes-russian-darknet-market-hydra\/a-61362417\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Germany closes Russian darknet market Hydra<\/span><\/a><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.wweek.com\/technology\/2022\/04\/14\/fake-phishing-email-sent-by-ohsu-to-employees-to-gauge-employee-gullibility-draws-sharp-criticism-from-labor-union\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Fake phishing email sent by OHSU to gauge employee gullibility draws criticism from labour union<\/span><\/a><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,24],"tags":[35,30,34],"class_list":{"0":"post-6380","1":"post","2":"type-post","3":"status-publish","4":"format-standard","6":"category-cyber-attack","7":"category-data-breaches","8":"tag-cyber-attack","9":"tag-cyber-security","10":"tag-data-breach"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Catalog of January 2022 Cyber Attacks and Data Breaches \u2013 66 million records breached - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"ur inaugural list of data breaches and cyber attacks of 2022 should dispel any illusion that the cybersecurity landscape would suddenly improve that year.\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Catalog of January 2022 Cyber Attacks and Data Breaches \u2013 66 million records breached - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"ur inaugural list of data breaches and cyber attacks of 2022 should dispel any illusion that the cybersecurity landscape would suddenly improve that year.\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2022-02-02T11:00:07+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T08:45:33+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/hacker-stealing-information-hacking-internet-dark-face-made-by-aiartificial-intelligence.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"1000\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"Catalog of January 2022 Cyber Attacks and Data Breaches \u2013 66 million records breached\",\"datePublished\":\"2022-02-02T11:00:07+00:00\",\"dateModified\":\"2023-03-27T08:45:33+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\\\/\"},\"wordCount\":2789,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"Data Breach\"],\"articleSection\":[\"Cyber Attack\",\"Data Breaches\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\\\/\",\"name\":\"Catalog of January 2022 Cyber Attacks and Data Breaches \u2013 66 million records breached - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"datePublished\":\"2022-02-02T11:00:07+00:00\",\"dateModified\":\"2023-03-27T08:45:33+00:00\",\"description\":\"ur inaugural list of data breaches and cyber attacks of 2022 should dispel any illusion that the cybersecurity landscape would suddenly improve that year.\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\\\/\"]}]},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Catalog of January 2022 Cyber Attacks and Data Breaches \u2013 66 million records breached\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Catalog of January 2022 Cyber Attacks and Data Breaches \u2013 66 million records breached - Sajin Shivdas | Cybersecurity","description":"ur inaugural list of data breaches and cyber attacks of 2022 should dispel any illusion that the cybersecurity landscape would suddenly improve that year.","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/","og_locale":"en_US","og_type":"article","og_title":"Catalog of January 2022 Cyber Attacks and Data Breaches \u2013 66 million records breached - Sajin Shivdas | Cybersecurity","og_description":"ur inaugural list of data breaches and cyber attacks of 2022 should dispel any illusion that the cybersecurity landscape would suddenly improve that year.","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2022-02-02T11:00:07+00:00","article_modified_time":"2023-03-27T08:45:33+00:00","og_image":[{"width":1000,"height":1000,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/02\/hacker-stealing-information-hacking-internet-dark-face-made-by-aiartificial-intelligence.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"Catalog of January 2022 Cyber Attacks and Data Breaches \u2013 66 million records breached","datePublished":"2022-02-02T11:00:07+00:00","dateModified":"2023-03-27T08:45:33+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/"},"wordCount":2789,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"keywords":["Cyber Attack","Cyber Security","Data Breach"],"articleSection":["Cyber Attack","Data Breaches"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/","name":"Catalog of January 2022 Cyber Attacks and Data Breaches \u2013 66 million records breached - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"datePublished":"2022-02-02T11:00:07+00:00","dateModified":"2023-03-27T08:45:33+00:00","description":"ur inaugural list of data breaches and cyber attacks of 2022 should dispel any illusion that the cybersecurity landscape would suddenly improve that year.","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/"]}]},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-january-2022-cyber-attacks-and-data-breaches-66-million-records-breached\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"Catalog of January 2022 Cyber Attacks and Data Breaches \u2013 66 million records breached"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6380","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6380"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6380\/revisions"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6380"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6380"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6380"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}