{"id":6392,"date":"2022-04-05T11:15:45","date_gmt":"2022-04-05T11:15:45","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/?p=6392"},"modified":"2023-03-27T08:44:58","modified_gmt":"2023-03-27T08:44:58","slug":"catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/","title":{"rendered":"Catalog of March 2022 Cyber Attacks and Data Breaches \u2013 3.99 million records breached"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span class=\"nectar-dropcap\" style=\" color: #2300ef;\">W<\/span>e found 88 cyber security incidents that were made public in March, resulting in 3,987,593 compromised records.<\/p>\r\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p><a href=\"#Cyber attacks\"><strong>Cyber attacks<\/strong><\/a><\/p>\r\n<p><a href=\"#Ransomware\"><strong>Ransomware<\/strong><\/a><\/p>\r\n<p><a href=\"#Data breaches\"><strong>Data breaches<\/strong><\/a><\/p>\r\n<p><a href=\"#Financial information\"><strong>Financial information<\/strong><\/a><\/p>\r\n<p><a href=\"#Malicious insiders and miscellaneous incidents\"><strong>Malicious insiders and miscellaneous incidents<\/strong><\/a><\/p>\r\n<p><a href=\"#In other news\u2026\"><strong>In other news\u2026<\/strong><\/a><\/p>\r\n[\/vc_column_text][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][nectar_responsive_text]\r\n<p>During the first three months of 2022, a total of 75,099,482 records were compromised.<\/p>\r\n[\/nectar_responsive_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Cyber attacks&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Cyber attacks<\/span><\/p>\r\n<ul class=\"wp-block-list\" style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/portswigger.net\/daily-swig\/uk-ferry-operator-wightlink-flags-potential-data-breach-after-highly-sophisticated-cyber-attack\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Ferry operator Wightlink flags potential data breach after \u2018highly sophisticated\u2019 cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.hhs.gov\/sites\/default\/files\/destructive-malware-targeting-organizations-ukraine.pdf\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Destructive malware targeting organisations in Ukraine<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/tdpelmedia.com\/hackers-interrupt-catholic-charitys-online-press-conference-on-ukraine\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Hackers interrupt Catholic charity\u2019s online press conference on Ukraine<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.prnewswire.com\/news-releases\/monongalia-health-system-inc-investigates-and-responds-to-data-security-incident-301492226.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Monongalia Health System in West Virginia hacked<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (398,164)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/crossroads-health-of-lake-county-discloses-breach-affecting-former-beacon-health-patients\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Crossroads Health of Lake County discloses security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (10,324)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/the-puerto-rican-organization-to-motivate-enltighten-and-serve-addicts-promesa-discloses-2020-data-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">The Puerto Rican Organization to Motivate, Enlighten, and Serve Addicts discloses 2020 data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (30,220)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.duncanregional.com\/notice-of-security-incident\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Duncan Regional Hospital notifies patients of data security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (92,398)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/adafruit-discloses-data-leak-from-ex-employees-github-repo\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Adafruit discloses data leak from ex-employee\u2019s GitHub repo<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.independent.co.uk\/tech\/cyber-attacks-refugees-ukraine-belarus-b2026659.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Pro-Russian hackers launch email attack to disrupt Ukraine refugee rescue attempts<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.dglobe.com\/news\/local\/district-518-is-investigating-whether-data-was-compromised-when-an-employees-email-account-was-hacked\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Minnesota District 518 investigating employee email account hack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.cnbc.com\/2022\/03\/09\/china-state-backed-hackers-compromised-6-us-state-governments-report.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">China state-backed hackers compromised networks of at least 6 U.S. state governments<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/russian-government-sites-hacked-in-supply-chain-attack\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Russian government sites hacked in supply chain attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.norwoodclinic.com\/forms\/cybernotice.pdf\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Unable to determine what files were accessed, Norwood Clinic notifies all patients<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (228,103)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/southdenver.com\/wp-content\/uploads\/2022\/03\/SDCA_Substitute-Notice.pdf\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">South Denver Cardiology Associates patients notified of breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (287,652)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.newstribune.com\/news\/2022\/mar\/12\/capital-region-reaching-out-to-patients-about\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Capital Region reaching out to patients about cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.labettehealth.com\/about-us\/labette-health-security-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Labette Health discloses data security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.benzinga.com\/pressreleases\/22\/03\/n26004477\/physynergy-llc-notice-of-data-privacy-event\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Another Technology Management Resources client reports a security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.zdnet.com\/article\/molson-coors-discloses-cyberattack-disrupting-its-brewery-operations\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Molson Coors Beverage Company discloses ongoing security breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-bako-diagnostics-5316822\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Bako Diagnostics discloses unauthorised access to it systems<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-central-bank-1560854\/\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Central Bank confirms unauthorised access to sensitive consumer information<\/span><\/a><span style=\"font-family: Calibri; font-size: 11.0pt;\"> (4,747)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-ascension-michigan-7166329\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Ascension Michigan confirms security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (27,177)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-first-guaranty-bank-8312142\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Louisiana-based First Guaranty Bank confirms security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.timesofisrael.com\/government-sites-crash-after-massive-cyberattack-officials-say\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Israeli government websites crash after \u2018massive\u2019 cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.etch.com\/about-us\/news\/2022\/east-tennessee-childrens-hospital-statement-on-security-issue\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">East Tennessee Children\u2019s Hospital statement on security issue<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jns.org\/iranian-hackers-leak-mossad-chiefs-personal-information\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Iranian hackers leak Mossad chief\u2019s personal information<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/mb.com.ph\/2022\/03\/17\/media-was-right-lawmakers-confirm-data-breach-hacking-of-voters-info\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Philippines\u2019 Commission on Elections\u2019 service contractor Smartmatic confirms security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.kpq.com\/chelan-douglas-health-district-warning-residents-of-2021-data-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Chelan Douglas Health District warning residents of 2021 security breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/health-insurance-data-of-more-than-500000-people-stolen-in-france\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">French healthcare insurer l\u2019Assurance\u202fmaladie suffers cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (519,000)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/and-as-the-work-week-draws-to-a-close\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Dialyze Direct, LLC\u202fin New Jersey suffers \u2018IT incident\u2019<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (14,203)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.horizonactuarial.com\/notice-of-data-incident.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Horizon Actuarial Services says it was hacked<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (39,418)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bostonglobe.com\/2022\/03\/18\/business\/school-milk-could-be-short-supply-after-hood-plants-hit-by-cyber-event\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Dairy supplier Hood suffers cyber security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bostonglobe.com\/2022\/03\/14\/marijuana\/hackers-hit-mass-background-check-firm-used-by-state-agencies-universities\/#:~:text=Computer%20hackers%20made%20off%20with,marijuana%20entrepreneurs%20to%20state%20employees%2C\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Hackers hit background-check firm used by state agencies<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (164,000)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/cointelegraph.com\/news\/blockfi-confirms-unauthorized-access-to-client-data-hosted-on-hubspot\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">BlockFi confirms unauthorised access to client data hosted on Hubspot<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-sudler-property-8387921\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Sudler Property Management says its systems were compromised<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-fci-constructors-inc-1572993\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">FCI Constructors, Inc. confirms security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (2,117)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-american-financial-4048938\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">American Financial Resources confirms security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-tops-staffing-llc-7575748\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">TOPS Staffing says employee data was compromised in cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (7,118)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-absolute-results-5254897\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Absolute Results Productions suffers malware attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/centraljersey.com\/2022\/03\/18\/east-windsor-township-computer-system-hacked\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">East Windsor Township computer system hacked<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/morgan-stanley-client-accounts-breached-in-social-engineering-attacks\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Morgan Stanley client accounts breached in social engineering attacks<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-websterrogers-llp-7379210\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">WebsterRogers reports cyber security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-tbk-bank-ssb-3819974\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">TBK Bank says an employee\u2019s account was breached<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/liberty-of-oklahoma-files-notice-of-9227794\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Liberty of Oklahoma files notice of recent data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (5,746)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/highmark-health-files-notice-of-recent-1721557\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Highmark Health suffers security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-southwest-health-inc-4738180\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Southwest Health victim of cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.thesunchronicle.com\/news\/local_news\/mansfield-company-hacked-personal-information-stolen\/article_93b8abd3-dcff-5f9e-954c-4e763a91a429.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Mansfield company hacked, personal information stolen<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (164,000)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/techcrunch.com\/2022\/03\/28\/lapsus-passwords-okta-breach\/?guccounter=1&amp;guce_referrer=aHR0cHM6Ly93d3cuZGF0YWJyZWFjaGVzLm5ldC8&amp;guce_referrer_sig=AQAAACJHOEk-FtE-0GZjIOV7HfdS0jyZR_1oaBw2rJ6BW6we9PtS4V6MKAEyMKTMA3tNPHzWXbmi56eWERPq9fCt4tmzyCCYLa885partJW5xxfoo6GG9Xgxwx7STuZBKsiJDPwYXWy6Bv8d-KCdn2PxITn53ic0RWWYrkey-UR3oOKM\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Lapsus$ found a spreadsheet of accounts as they breached Okta<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (366)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.connexionfrance.com\/article\/French-news\/French-health-insurance-data-leak-what-to-do-if-you-are-affected\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">French health insurance data leak<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (510,000)\u00a0<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Ransomware&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Ransomware<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.samh.org.uk\/about-us\/news-and-blogs\/samh-annoucenment-cybersecurity-attack\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Threat actors leak data from Scottish Association for Mental Health<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/hackers-leak-190gb-of-alleged-samsung-data-source-code\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Ransomware gang leak 190GB of alleged Samsung data, source code<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.wfmz.com\/news\/area\/berks\/authorities-investigate-ransomware-attack-in-fleetwood-asd\/article_97083be6-9c13-11ec-a4c7-8f1287ebf492.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Pennsylvania-based Fleetwood Area School District hit by ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.theverge.com\/2022\/3\/11\/22972768\/ubisoft-cyber-security-incident-hack\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Ubisoft says it experienced a \u2018cyber security incident\u2019, LAPSUS$ group claims credit for attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-practicemax-7499873\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">PracticeMax discloses security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (165,698)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-wagstaff-inc-1995346\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Wagstaff, Inc. hit by ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/mybroadband.co.za\/news\/security\/437922-transunion-hackers-demand-r224-million-ransom-threaten-to-leak-absa-fnb-standard-bank-data.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">TransUnion hackers demand R224-million ransom<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/wva-wheeling-health-right-victim-of-ransomware-attack\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Wheeling Health Right victim of ransomware attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/njbrainspine.com\/notice-of-data-security-incident\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">New Jersey Brain and Spine notifies those affected by ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (92,453)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/it-took-6-hours-to-get-access-to-every-it-system-of-argentinas-senate-vice-society\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Argentina\u2019s\u202fsenate\u202freveals that its website was hit by ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/microsoft\/microsoft-confirms-they-were-hacked-by-lapsus-extortion-group\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Microsoft confirms it was hacked by Lapsus$ extortion group<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bbc.co.uk\/news\/technology-60849687\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Hundreds of companies potentially hit by Okta hack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/oklahoma-city-indian-clinic-impacted-by-suncrypts-ransomware-attack\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Oklahoma City Indian Clinic impacted by Suncrypt\u2019s ransomware attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (20,000)\u00a0<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Data breaches&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Data breaches<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bbc.co.uk\/news\/uk-england-hampshire-60831683\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Isle of Wight children\u2019s details sent out in email gaffe<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (90)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/eu.dispatch.com\/story\/news\/local\/communities\/hilliard\/2022\/03\/02\/hilliard-schools-re-examining-public-information-protocols\/9334290002\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Hilliard City Schools evaluating protocols after leaking the names of students<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (4,200)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/mybroadband.co.za\/news\/security\/436546-nespresso-data-leak-in-south-africa.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Nespresso data leak in South Africa<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.law.com\/therecorder\/2022\/03\/14\/state-bar-breach-exposed-thousands-more-confidential-records-than-original-estimates-investigation-shows\/?slreturn=20220217121609\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">State Bar breach exposed thousands more confidential records than original estimates<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (322,525)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/techcrunch.com\/2022\/03\/18\/india-cisf-security-data-exposed\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">A security lapse exposed India\u2019s CISF personnel files and health records<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.safetydetectives.com\/news\/doctorsme-leak-report\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Japanese medical online consultation site leaking consumer-submitted images of symptoms<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (12,000)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.aljazeera.com\/news\/2022\/3\/24\/hotel-wifi-across-mena-compromised-and-exposing-private-data\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Hotel WiFi across MENA compromised and exposing private data<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/careoregon-advantage-files-notice-of-6998144\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">CareOregon Advantage files notice of recent data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (10,467)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.christieclinic.com\/news\/5880\/news-detail\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Christie Clinic, CSI Laboratories report breaches<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/personal-data-of-820k-nyc-students\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Personal Data of 820,000 NYC Students Exposed<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (820,000)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/names-and-addresses-of-620-fsb-officers-published-in-data-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Names and addresses of 620 FSB officers published in data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (620)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/uk-confidential-documents-were-blown-into-gardens-in-data-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Confidential documents were blown into gardens in data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (1)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.benzinga.com\/markets\/cryptocurrency\/22\/03\/26355003\/infinitys-ronin-network-says-about-620m-stolen-in-major-security-breach\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Infinity\u2019s Ronin Network Says About $620M Stolen In Major Security Breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (0)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/ca.finance.yahoo.com\/news\/apple-meta-gave-user-data-175918825.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Apple and Meta Gave User Data to Hackers Who Used Forged Legal Requests<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/chathamvoice.com\/2022\/03\/30\/120-patients-victims-of-ckha-privacy-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">120 patients victims of CKHA privacy breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (120)\u00a0<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Financial information&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Financial information<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/dominicantoday.com\/dr\/economy\/2022\/03\/14\/dominican-republic-hackers-steal-us2-7m-in-welfare-cards\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Dominican Republic hackers steal US$2.7M in welfare cards<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (30,000)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.fresnobee.com\/news\/local\/article259205608.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Fresno lost more than $600,000 to a phishing scam<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-bonita-springs-3901370\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Bonita Springs Utilities detects suspicious activity on customer payments<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (4,419)\u00a0<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Malicious insiders and miscellaneous incidents&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Malicious insiders and miscellaneous incidents<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/oag.ca.gov\/system\/files\/Sample%20Individual%20Notice_1.PDF\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Canada-based GreenSlate makes notification of data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.doj.nh.gov\/consumer\/security-breaches\/documents\/litchfield-school-district-20220119.pdf\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Litchfield School District employee wrongdoing created student data security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (198)\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.thespec.com\/news\/hamilton-region\/2022\/03\/24\/st-joseph-healthcare-hamilton-privacy-breach-hospital-records.html\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">St. Joe\u2019s fires employee who snooped into medical records \u2018out of curiosity\u2019<\/span><\/a><span style=\"font-family: Calibri; font-size: 11.0pt;\"> (49)\u00a0<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;In other news\u2026&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">In other news\u2026<\/span><\/p>\r\n<ul>\r\n<li style=\"list-style-type: none;\">\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bankinfosecurity.com\/blogs\/breach-notification-poor-transparency-complicates-response-p-3191\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Breach notification: Poor transparency complicates response<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.engage.hoganlovells.com\/knowledgeservices\/news\/nis-20the-eu-looks-to-bolster-its-cybersecurity-laws\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">NIS 2.0\u2014the EU looks to bolster its cybersecurity laws<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">\u00a0<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bbc.co.uk\/news\/technology-60864283\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Oxford teen accused of being multi-millionaire cyber criminal<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">\u00a0<\/span><\/li>\r\n<\/ul>\r\n<\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6397,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[2],"tags":[35,30,34],"class_list":{"0":"post-6392","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-digital-forensics","8":"tag-cyber-attack","9":"tag-cyber-security","10":"tag-data-breach"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Catalog of March 2022 Cyber Attacks and Data Breaches \u2013 3.99 million records breached - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"e found 88 cyber security incidents that were made public in March, resulting in 3,987,593 compromised records. Cyber attacks Ransomware Data breaches\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Catalog of March 2022 Cyber Attacks and Data Breaches \u2013 3.99 million records breached - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"e found 88 cyber security incidents that were made public in March, resulting in 3,987,593 compromised records. Cyber attacks Ransomware Data breaches\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2022-04-05T11:15:45+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T08:44:58+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/03\/wepik-futuristic-gradient-cybercode-logo-2022926-224641.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"14 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"Catalog of March 2022 Cyber Attacks and Data Breaches \u2013 3.99 million records breached\",\"datePublished\":\"2022-04-05T11:15:45+00:00\",\"dateModified\":\"2023-03-27T08:44:58+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\\\/\"},\"wordCount\":2863,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/wepik-futuristic-gradient-cybercode-logo-2022926-224641.jpeg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"Data Breach\"],\"articleSection\":[\"Digital Forensics\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\\\/\",\"name\":\"Catalog of March 2022 Cyber Attacks and Data Breaches \u2013 3.99 million records breached - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/wepik-futuristic-gradient-cybercode-logo-2022926-224641.jpeg\",\"datePublished\":\"2022-04-05T11:15:45+00:00\",\"dateModified\":\"2023-03-27T08:44:58+00:00\",\"description\":\"e found 88 cyber security incidents that were made public in March, resulting in 3,987,593 compromised records. Cyber attacks Ransomware Data breaches\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/wepik-futuristic-gradient-cybercode-logo-2022926-224641.jpeg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/03\\\/wepik-futuristic-gradient-cybercode-logo-2022926-224641.jpeg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Catalog of March 2022 Cyber Attacks and Data Breaches \u2013 3.99 million records breached\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Catalog of March 2022 Cyber Attacks and Data Breaches \u2013 3.99 million records breached - Sajin Shivdas | Cybersecurity","description":"e found 88 cyber security incidents that were made public in March, resulting in 3,987,593 compromised records. Cyber attacks Ransomware Data breaches","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/","og_locale":"en_US","og_type":"article","og_title":"Catalog of March 2022 Cyber Attacks and Data Breaches \u2013 3.99 million records breached - Sajin Shivdas | Cybersecurity","og_description":"e found 88 cyber security incidents that were made public in March, resulting in 3,987,593 compromised records. Cyber attacks Ransomware Data breaches","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2022-04-05T11:15:45+00:00","article_modified_time":"2023-03-27T08:44:58+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/03\/wepik-futuristic-gradient-cybercode-logo-2022926-224641.jpeg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"14 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"Catalog of March 2022 Cyber Attacks and Data Breaches \u2013 3.99 million records breached","datePublished":"2022-04-05T11:15:45+00:00","dateModified":"2023-03-27T08:44:58+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/"},"wordCount":2863,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/03\/wepik-futuristic-gradient-cybercode-logo-2022926-224641.jpeg","keywords":["Cyber Attack","Cyber Security","Data Breach"],"articleSection":["Digital Forensics"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/","name":"Catalog of March 2022 Cyber Attacks and Data Breaches \u2013 3.99 million records breached - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/03\/wepik-futuristic-gradient-cybercode-logo-2022926-224641.jpeg","datePublished":"2022-04-05T11:15:45+00:00","dateModified":"2023-03-27T08:44:58+00:00","description":"e found 88 cyber security incidents that were made public in March, resulting in 3,987,593 compromised records. Cyber attacks Ransomware Data breaches","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/03\/wepik-futuristic-gradient-cybercode-logo-2022926-224641.jpeg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/03\/wepik-futuristic-gradient-cybercode-logo-2022926-224641.jpeg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-march-2022-cyber-attacks-and-data-breaches-3-99-million-records-breached\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"Catalog of March 2022 Cyber Attacks and Data Breaches \u2013 3.99 million records breached"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6392","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6392"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6392\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6397"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6392"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6392"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6392"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}