{"id":6395,"date":"2022-03-05T11:16:52","date_gmt":"2022-03-05T11:16:52","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/?p=6395"},"modified":"2023-03-27T08:45:07","modified_gmt":"2023-03-27T08:45:07","slug":"catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/","title":{"rendered":"Catalog of February 2022 Cyber Attacks and Data Breaches \u2013 5.1 million records breached"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span class=\"nectar-dropcap\" style=\" color: #2300ef;\">T<\/span>he cybersecurity sector, like the rest of the globe, is on edge. Even though we only had 83 data breaches and cyber attacks this month, which resulted in 5,127,241 compromised records, we can&#8217;t help but feel like we&#8217;re on the cusp of something big.<\/p>\r\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">There was an uptick in security incidents in connection with the situation in Ukraine in the month&#8217;s closing days. Ukraine retaliated with an attack on the Moscow Stock Exchange after Russia spooked the financial markets and government agencies.<\/p>\r\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">In response to pleas for assistance from Ukraine, the European Union has organized a cyber rapid-reaction team consisting of 12 volunteers. To give Vladimir Putin &#8220;a drink of his own bitter medicine,&#8221; the hacker collective Anonymous has become more proactive, initiating attacks across Europe.<\/p>\r\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p><a href=\"#Cyber attacks\"><strong>Cyber attacks<\/strong><\/a><\/p>\r\n<p><a href=\"#Ransomware\"><strong>Ransomware<\/strong><\/a><\/p>\r\n<p><a href=\"#Data breaches\"><strong>Data breaches<\/strong><\/a><\/p>\r\n<p><a href=\"#Financial information\"><strong>Financial information<\/strong><\/a><\/p>\r\n<p><a href=\"#Malicious insiders and miscellaneous incidents\"><strong>Malicious insiders and miscellaneous incidents<\/strong><\/a><\/p>\r\n<p><a href=\"#In other news\u2026\"><strong>In other news\u2026<\/strong><\/a><\/p>\r\n[\/vc_column_text][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][nectar_responsive_text]\r\n<p>Organizations across Europe, including Toyota&#8217;s Japanese facilities and an Isle of Man kettle manufacturer, have claimed delays as a result of alleged state-sponsored attacks.<\/p>\r\n[\/nectar_responsive_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Cyber attacks&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Cyber attacks<\/span><\/p>\r\n<ul class=\"wp-block-list\" style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.heraldscotland.com\/politics\/19914175.human-error-let-criminals-hack-sepas-systems-42m-unaccounted\/\"><span lang=\"en-AE\" style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Criminals phish SEPA, with \u00a342m unaccounted for<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bbc.co.uk\/news\/world-europe-isle-of-man-60555839\"><span lang=\"en-AE\" style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Isle of Man kettle-parts firm hit by cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bbc.co.uk\/news\/technology-60215252\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Oiltanking Deutschland GmbH &amp; Co. KG operating with limited service after cyber attack<\/span><\/a><span style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/data-breach-at-morley-companies\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Morley Companies, Inc. discloses security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (521,046)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.headlinesoftoday.com\/topic\/press-releases\/professional-personnel-service-inc-provides-notice-of-data-security-event.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Professional Personnel Service, Inc says it was struck with malware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (42,866)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.wired.com\/story\/north-korea-hacker-internet-outage\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">North Korea hacked him, so he took down its Internet<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/techxplore.com\/news\/2022-02-news-corp-hacked-potentially-china-tied.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">News Corp says it was hacked; believed to be linked to China<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.scmp.com\/news\/hong-kong\/society\/article\/3165948\/small-portion-customer-data-accessed-without-authorisation\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">A security breach at Hong Kong online shopping platform HKTV<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/therecord.media\/cyberattack-brings-down-vodafone-portugal-mobile-voice-and-tv-services\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Cyber attack brings down Vodafone Portugal mobile<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.msn.com\/en-us\/health\/medical\/information-for-over-6-000-memorial-hermann-patients-accessed-in-security-breach\/ar-AATCxBQ\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Memorial Hermann patients\u2019 data accessed in security breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (6,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.prnewswire.com\/news-releases\/lendus-llc-identified-and-addresses-data-security-incident-301477451.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">One year after it started, LendUs discloses that they had a breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/gbcode.rthk.hk\/TuniS\/news.rthk.hk\/rthk\/en\/component\/k2\/1633250-20220211.htm\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Harbour Plaza Hotel customers warned over data leak<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (1.2 million)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/therecord.media\/cyber-attack-disrupts-slovenias-top-tv-station\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Cyber attack disrupts Slovenia\u2019s top TV station<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/securityaffairs.co\/wordpress\/127919\/data-breach\/a1-hrvatska-data-breach.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Croatian phone carrier A1 Hrvatska discloses data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (200,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.prnewswire.com\/news-releases\/notice-of-data-security-incident-301481106.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Comprehensive Health Services discloses breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (94,449)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/fl-jackson-county-hospital-district-notifying-patients-of-data-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Jackson County Hospital District notifying patients of data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/national-math-and-science-initiative-notifies-more-than-190000-of-data-security-incident\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">National Math and Science Initiative notifies those affected by data security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (191,255)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/spectrumlocalnews.com\/nys\/buffalo\/news\/2022\/02\/09\/williamsville-csd-reveals-2021-cybersecurity-breach\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Williamsville CSD reveals cyber security breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/pa-bible-fellowship-church-homes-notifies-residents-of-data-security-incident\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Bible Fellowship Church Homes notifies residents of data security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.charlotteobserver.com\/news\/business\/article258566848.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Charlotte Radiology notifies patients of December security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.prnewswire.com\/news-releases\/taylor-ganson--perrin-llp-provides-notice-of-data-privacy-event-301487863.html\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Boston law firm Taylor, Ganson &amp; Perrin notifies clients of breach<\/span><\/a><span style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/apps.web.maine.gov\/online\/aeviewer\/ME\/40\/fe144e20-24e4-4b3f-be70-94db46b992e8.shtml\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Logan Health Medical Center notifying patients of security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (213,554)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.prnewswire.com\/news-releases\/dr-douglas-c-morrow-od-provides-notification-of-data-security-incident-301489094.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Douglas C. Morrow, OD notifies patients of data security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.itgovernance.co.uk\/blog\/ukrainian-websites-struck-by-cyber-attacks-as-russia-launches-invasion\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Ukrainian websites struck by DDoS attacks as Russia launches invasion<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.securityweek.com\/cookware-distribution-giant-meyer-discloses-data-breach\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Cookware distribution giant Meyer discloses data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-cvs-pharmacy-inc-9742709\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">CVS Pharmacy discloses security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (6,221)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-ethos-technologies-inc-3197213\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Ethos Technologies targeted in \u2018sophisticated\u2019 cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (13,300)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-south-shore-hospital-7788461\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">South Shore Hospital Corporation says it was hit by criminal hackers<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (115,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-service-employees-1048488\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Service Employees International Union confirms cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (230,487)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-accutech-systems-3362333\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Accutech Systems Corporation discloses 2021 cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (39,500)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.forbes.com\/sites\/thomasbrewster\/2022\/02\/23\/hackers-sell-access-to-a-2-billion-nonprofit-a-californian-hospital-and-michigan-government\/?sh=322801e25758\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Hackers sell backdoors into a $2 billion non-profit, a Californian hospital, and Michigan government<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.hawaiinewsnow.com\/2022\/02\/24\/police-suspect-accused-hacking-banks-system-could-have-hit-other-institutions\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Suspect accused of hacking Hawaii bank<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.thenationalnews.com\/business\/technology\/2022\/02\/24\/dubai-based-gems-education-hit-by-cyber-attack\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Dubai-based Gems Education hit by cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-creative-services-inc-9224893\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Creative Services, Inc hit by cyber criminals<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (164,673)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-advantage-title-5643110\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">La<\/span><span lang=\"en-US\" style=\"font-family: Calibri; font-size: 11.0pt;\">w firm Advantage Title &amp; Escrow suffers security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-priority-health-7054014\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Priority Health faces ongoing security issue<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-pekin-insurance-9272622\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Pekin Insurance suffers breach after password gaffe<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (10,872)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-thybar-corporation-2821999\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Thybar Corporation suffers cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-manhattan-school-of-9857249\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Manhattan School of Music breached in cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (6,500)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-alliance-physical-2450120\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Alliance Physical Therapy Group compromised in security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/data-breach-alert-cross-timbers-health-8575130\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Cross Timbers Health Clinics suffers security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.newschannel5.com\/news\/bridgestone-investigating-possible-information-security-breach\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Bridgestone investigating possible information security breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/toyota-halts-production-after-reported-cyberattack-on-supplier\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Toyota to halt operations at all Japan plants due to cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.reinsurancene.ws\/aon-hit-by-cyber-attack\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Aon hit by cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/news.sky.com\/story\/satellite-giant-viasat-probes-suspected-broadband-cyberattack-amid-russia-fears-12554004\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Satellite giant Viasat probes suspected broadband cyberattack amid Russia fears<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.infosecurity-magazine.com\/news\/moscow-exchange-cyber-attack\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Moscow stock exchange downed by cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Ransomware&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Ransomware<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><span style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">KP Snacks hit by ransomware, causing supply delays<\/span><span style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.suspectfile.com\/france-department-of-seine-saint-denis-ransomware-attack-several-municipalities-involved\/\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">French IT service provider Syndicat Intercommunal d\u2019Informatique hit by ransomware<\/span><\/a><span style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.itpro.co.uk\/security\/ransomware\/362171\/swissport-ransomware-attack-flight-delays\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Swissport ransomware attack leads to flight delays<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/puma-hit-by-data-breach-after-kronos-ransomware-attack\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Puma hit by data breach after Kronos ransomware attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/globalcirculate.com\/east-bay-community-college-data-breached-in-ransomware-attack\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">East Bay Community College data breached in ransomware attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/fl-ransomware-group-claims-to-have-stolen-data-on-260000-patients-from-jax-spine-and-pain-centers-victim-remains-silent\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Ransomware group claims to have stolen data on patients from Jax Spine and Pain Centers<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (260,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/thestack.technology\/optionis-data-breach-passwords\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">The Optionis data breach is worse than you can imagine<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/therecord.media\/san-francisco-49ers-confirm-ransomware-attack\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">San Francisco 49ers confirm ransomware attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/one-year-later-minimally-invasive-surgery-of-hawaii-notifies-patients-of-ransomware-incident\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Minimally Invasive Surgery of Hawaii notifies patients of ransomware incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"http:\/\/tigermedianet.com\/?p=63499\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Kansas\u2019 Hays School District hacked with ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.1news.co.nz\/2022\/02\/25\/nz-technology-company-hacked-data-stolen\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">NZ technology company iTCO hacked in ransomware attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/la-spine-diagnostic-pain-treatment-patient-files-show-up-on-ransomware-site\/\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Louisiana-based Spine Diagnostic &amp; Pain Treatment patient files show up on ransomware site<\/span><\/a><span style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bloomberg.com\/news\/articles\/2022-02-25\/nvidia-is-investigating-cyber-attack-but-business-uninterrupted\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Nvidia breached by attackers who seem shocked by hack-back<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/news.sophos.com\/en-us\/2021\/11\/18\/new-ransomware-actor-uses-password-protected-archives-to-bypass-encryption-protection\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Canadian healthcare firm breached by two ransomware gangs<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Data breaches&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Data breaches<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/uk-data-breach-as-corby-vaccine-trial-participants-details-inadvertently-shared-in-email-gaffe\/\"><span lang=\"en-AE\" style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Data breach as Corby vaccine trial participants\u2019 details inadvertently shared in email gaffe<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/uk-tens-of-thousands-of-nhs-patients-private-medical-information-leaked-in-shocking-data-breach\/\"><span lang=\"en-AE\" style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">NHS contractor PSL Print Management leaks patients\u2019 sensitive data<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.comparitech.com\/blog\/information-security\/secret-sharing-app-exposure\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">User information and messages from the Whisper app exposed on the web<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.safetydetectives.com\/news\/securitas-leak-report\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Securitas misconfiguration exposed airport employee info<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (1 million)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/seclists.org\/dataloss\/2022\/q1\/61#:~:text=(WCIA)%20%E2%80%94%20The%20Illinois%20Housing,documents%20submitted%20by%20other%20applicants.\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Illinois Housing Development Authority addresses data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.govtech.com\/security\/georgia-voter-info-posted-online-after-software-company-breach\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Georgia voter info posted online after breach of software company<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/techcrunch.com\/2022\/02\/08\/ottawa-trucker-freedom-convoy-exposed-donation\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Donation site for Ottawa truckers\u2019 \u2018Freedom Convoy\u2019 protest exposed donors\u2019 data<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.theglobeandmail.com\/canada\/article-military-sexual-misconduct-settlement-hit-by-privacy-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Military sexual misconduct settlement hit by privacy breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (40)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.brisbanetimes.com.au\/politics\/federal\/sensitive-business-addresses-among-500-000-published-in-covid-data-breach-20220214-p59wal.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Sensitive business addresses published in Australian COVID data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (500,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.sixthtone.com\/news\/1009661\/metaverse-like-app-pauses-user-registration-over-data-leak-claims-\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Chinese social media app Zheli pauses user registration over data leak claim<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/freepressokc.com\/okc-police-rape-kit-info-exposed-in-data-breach-of-dna-contractor\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">OKC Police rape kit info exposed in data breach of DNA contractor<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/abc13.com\/houston-health-department-covid-19-testing-portal-breach-online\/11596613\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Houston Health Department working to fix website \u2018glitch\u2019 that exposed patients\u2019 COVID test results<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (10,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/dallas-it-worker-erased-police-files-by-accident-didnt-have-enough-training-report-says\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Dallas IT worker erased police files by accident, report confirms<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.dailynews.com\/2022\/02\/26\/260000-confidential-attorney-discipline-records-published-after-data-breach-state-bar-says\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Confidential attorney discipline records published after data breach, State Bar of California says<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (260,000)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Financial information&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Financial information<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/blockworks.co\/in-second-largest-defi-hack-ever-blockchain-bridge-loses-320m-ether\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">In second largest DeFi hack ever, Blockchain bridge loses $320M ether<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/documentedny.com\/2022\/02\/11\/excluded-workers-fund-card-fraud\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Scammer steals $15K from Excluded Workers Fund<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Malicious insiders and miscellaneous incidents&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Malicious insiders and miscellaneous incidents<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.dailyrecord.co.uk\/in-your-area\/lanarkshire\/cop-appears-hamilton-sheriff-court-26315351\"><span lang=\"en-AE\" style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Cop appears at Hamilton Sheriff Court on trial over data protection breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/ny-nassau-notifies-209-workers-their-confidential-personal-data-may-have-been-breached-by-employees\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Nassau notifies workers their confidential personal data may have been breached by employees<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (209)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/nsuh.northwell.edu\/sites\/northwell.edu\/files\/2022-02\/NSUH-data-breach-media-notice.pdf\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">North Shore University Hospital notifies patients of unauthorised access to personal information<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (7,614)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/thethaiger.com\/hot-news\/technology\/another-day-another-data-breach-thai-students-data-hacked-sold-on-dark-web\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Thai University Central Admission System hacked<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (23,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bbc.com\/news\/business-60456196\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Whistle-blower leaks sensitive data from Credit Suisse<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (18,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.uofmhealth.org\/michigan-medicine-notifies-patients-data-information-breach\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Michigan Medicine notifies patients after discovering a snooping employee<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (269)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;In other news\u2026&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">In other news\u2026<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.wired.com\/story\/trickbot-malware-group-internal-messages\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Inside Trickbot, Russia\u2019s notorious ransomware gang<\/span><\/a><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/a-look-at-the-new-sugar-ransomware-demanding-low-ransoms\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">A look at the new Sugar ransomware demanding low ransoms<\/span><\/a><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.makeuseof.com\/elephant-beetle-hacker-group\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Elephant Beetle: Stealthy hacker group stole millions undetected<\/span><\/a><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.wilx.com\/2022\/02\/18\/watching-your-wallet-only-3-consumers-freeze-credit-after-data-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Only 3% of consumers freeze credit after data breach<\/span><\/a><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/ukrainian-cyberpolice-recruit-help-fighting-russia\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Ukrainian cyber police recruit help fighting Russia<\/span><\/a><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][\/vc_row]","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6393,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,24],"tags":[35,30,34],"class_list":{"0":"post-6395","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-attack","8":"category-data-breaches","9":"tag-cyber-attack","10":"tag-cyber-security","11":"tag-data-breach"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Catalog of February 2022 Cyber Attacks and Data Breaches \u2013 5.1 million records breached - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"he cybersecurity sector, like the rest of the globe, is on edge. Even though we only had 83 data breaches and cyber attacks this month, which resulted in\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Catalog of February 2022 Cyber Attacks and Data Breaches \u2013 5.1 million records breached - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"he cybersecurity sector, like the rest of the globe, is on edge. Even though we only had 83 data breaches and cyber attacks this month, which resulted in\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2022-03-05T11:16:52+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T08:45:07+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/12\/wepik-futuristic-gradient-cybercode-logo-2022926-223243.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"Catalog of February 2022 Cyber Attacks and Data Breaches \u2013 5.1 million records breached\",\"datePublished\":\"2022-03-05T11:16:52+00:00\",\"dateModified\":\"2023-03-27T08:45:07+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\\\/\"},\"wordCount\":3051,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/wepik-futuristic-gradient-cybercode-logo-2022926-223243.jpeg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"Data Breach\"],\"articleSection\":[\"Cyber Attack\",\"Data Breaches\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\\\/\",\"name\":\"Catalog of February 2022 Cyber Attacks and Data Breaches \u2013 5.1 million records breached - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/wepik-futuristic-gradient-cybercode-logo-2022926-223243.jpeg\",\"datePublished\":\"2022-03-05T11:16:52+00:00\",\"dateModified\":\"2023-03-27T08:45:07+00:00\",\"description\":\"he cybersecurity sector, like the rest of the globe, is on edge. Even though we only had 83 data breaches and cyber attacks this month, which resulted in\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/wepik-futuristic-gradient-cybercode-logo-2022926-223243.jpeg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/wepik-futuristic-gradient-cybercode-logo-2022926-223243.jpeg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Catalog of February 2022 Cyber Attacks and Data Breaches \u2013 5.1 million records breached\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Catalog of February 2022 Cyber Attacks and Data Breaches \u2013 5.1 million records breached - Sajin Shivdas | Cybersecurity","description":"he cybersecurity sector, like the rest of the globe, is on edge. Even though we only had 83 data breaches and cyber attacks this month, which resulted in","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/","og_locale":"en_US","og_type":"article","og_title":"Catalog of February 2022 Cyber Attacks and Data Breaches \u2013 5.1 million records breached - Sajin Shivdas | Cybersecurity","og_description":"he cybersecurity sector, like the rest of the globe, is on edge. Even though we only had 83 data breaches and cyber attacks this month, which resulted in","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2022-03-05T11:16:52+00:00","article_modified_time":"2023-03-27T08:45:07+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/12\/wepik-futuristic-gradient-cybercode-logo-2022926-223243.jpeg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"Catalog of February 2022 Cyber Attacks and Data Breaches \u2013 5.1 million records breached","datePublished":"2022-03-05T11:16:52+00:00","dateModified":"2023-03-27T08:45:07+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/"},"wordCount":3051,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/12\/wepik-futuristic-gradient-cybercode-logo-2022926-223243.jpeg","keywords":["Cyber Attack","Cyber Security","Data Breach"],"articleSection":["Cyber Attack","Data Breaches"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/","name":"Catalog of February 2022 Cyber Attacks and Data Breaches \u2013 5.1 million records breached - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/12\/wepik-futuristic-gradient-cybercode-logo-2022926-223243.jpeg","datePublished":"2022-03-05T11:16:52+00:00","dateModified":"2023-03-27T08:45:07+00:00","description":"he cybersecurity sector, like the rest of the globe, is on edge. Even though we only had 83 data breaches and cyber attacks this month, which resulted in","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/12\/wepik-futuristic-gradient-cybercode-logo-2022926-223243.jpeg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/12\/wepik-futuristic-gradient-cybercode-logo-2022926-223243.jpeg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-february-2022-cyber-attacks-and-data-breaches-5-1-million-records-breached\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"Catalog of February 2022 Cyber Attacks and Data Breaches \u2013 5.1 million records breached"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6395","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6395"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6395\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6393"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6395"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6395"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6395"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}