{"id":6405,"date":"2022-06-05T10:57:59","date_gmt":"2022-06-05T10:57:59","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/?p=6405"},"modified":"2023-03-27T08:44:31","modified_gmt":"2023-03-27T08:44:31","slug":"catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/","title":{"rendered":"Catalog of May 2022 Cyber Attacks and Data Breaches \u2013 49.8 million records breached"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><span class=\"nectar-dropcap\" style=\" color: #2300ef;\">W<\/span>elcome to our May 2022 review of data breaches and cyber attacks. We identified 77 security incidents during the month, resulting in 49,782,129 compromised records.<\/p>\r\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p><a href=\"#Cyber attacks\"><strong>Cyber attacks<\/strong><\/a><\/p>\r\n<p><a href=\"#Ransomware\"><strong>Ransomware<\/strong><\/a><\/p>\r\n<p><a href=\"#Data breaches\"><strong>Data breaches<\/strong><\/a><\/p>\r\n<p><a href=\"#Financial information\"><strong>Financial information<\/strong><\/a><\/p>\r\n<p><a href=\"#Malicious insiders and miscellaneous incidents\"><strong>Malicious insiders and miscellaneous incidents<\/strong><\/a><\/p>\r\n<p><a href=\"#In other news\u2026\"><strong>In other news\u2026<\/strong><\/a><\/p>\r\n[\/vc_column_text][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][nectar_responsive_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">You can find the full list of data breaches below, with incidents affecting UK organisations listed in bold.<\/p>\r\n[\/nectar_responsive_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Cyber attacks&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Cyber attacks<\/span><\/p>\r\n<ul class=\"wp-block-list\" style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.law360.com\/legalethics\/articles\/1489335\/ga-bar-probing-unauthorized-access-to-computer-systems\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">State Bar of Georgia investigating cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/us-dod-tricked-into-paying-235-million-to-phishing-actor\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">US Department of Defense tricked into paying $23.5 million to phishing actor<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/insidebitcoins.com\/news\/opensea-discord-server-hacked-increasing-the-risk-of-phishing-scams\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">NFT marketplace OpenSea Discord server hacked<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/finance.yahoo.com\/news\/welldynerx-llc-provides-notice-data-210000871.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">WellDyneRx provides notice of data privacy notice<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/dxy063k3qcwfl.cloudfront.net\/PreliminaryNotice.pdf\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">North Alabama Bone &amp; Joint Clinic investigating suspicious activity<\/span><\/a><span style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/quantum-imaging-therapeutic-associates-notification-following-2021-data-security-incident\/\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Quantum Imaging &amp; Therapeutic Associates notification<\/span><\/a><span style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.itweb.co.za\/content\/PmxVE7KEABOqQY85\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Pharmacy\u00a0retail\u00a0giant\u00a0Dis-Chem becomes the latest South African cyber attack victim<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (3,687,881)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/krebsonsecurity.com\/2022\/05\/dea-investigating-breach-of-law-enforcement-data-portal\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">DEA investigating breach of law enforcement data portal<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.krgv.com\/news\/investigation-into-data-breach-that-affected-cameron-county-election-workers-continues\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Cameron County Elections Office reports security breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.missioncityrecord.com\/news\/mission-school-district-suffers-it-breach-phishing-emails-being-sent-from-teachers-accounts\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Mission School District suffers IT breach, phishing emails being sent from teachers\u2019 accounts<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.parker.com\/parkerimages\/Parker.com\/Countries-2011\/United%20States\/Web_Posting_Final.png\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Parker-Hannifin discloses security incident affecting employee health plan data<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/tribtown.com\/2022\/05\/13\/schneck-announces-data-security-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Schneck Medical Center notifying patients about data security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/lfpress.com\/news\/local-news\/elgin-county-data-breach-devastating-for-victims-at-risk-of-identity-theft-experts\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Elgin data breach \u2018devastating\u2019 for victims at risk of identity theft<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (330)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/oh-shaker-heights-city-school-district-discloses-hacking-incident\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Ohio\u2019s Shaker Heights City School District discloses hacking incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (3,725)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.wpxi.com\/news\/investigates\/how-criminals-got-away-with-hacking-pennsylvania-unemployment-accounts\/V67XRLCLRFEJJBFIYAHFSY2HJE\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Philadelphia government hit by cyber criminals<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.thevibes.com\/articles\/news\/61117\/hacker-group-claims-to-have-personal-details-of-22.5-mil-malaysians\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Hackers claim to have personal details of millions of Malaysians<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (22.5 million)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.jdsupra.com\/legalnews\/behavioral-health-partners-of-metrowest-8311157\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Behavioral Health Partners of Metrowest hit by cyber attackers<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (11,288)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/behavioral-health-entities-in-massachusetts-and-ohio-reportedly-victims-of-cyberattacks\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Allwell Behavioral Health Services leaked on dark web<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.13abc.com\/2022\/05\/18\/washington-local-schools-hit-by-cyber-attack\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Washington Local School District in Toledo, Ohio hit by cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/ottawa.citynews.ca\/local-news\/big-data-breach-confirmed-at-arnprior-regional-health-5389635\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Arnprior Regional Health says it has been the target of a cyber attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.businessinsider.com\/trust-stamp-ice-data-breach-facial-recognition-contractor-demo-app-2022-5?r=US&amp;IR=T\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Trust Stamp, a facial recognition company, had dozens of peoples\u2019 data exposed in breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/another-texas-state-agency-data-breach-this-time-its-the-department-of-transportation\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Texas Department of Transportation discloses security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (7,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/gizmodo.com\/gm-general-motors-discloses-data-breach-1848969086\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">General Motors discloses security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/medicine.wustl.edu\/news\/washington-university-school-of-medicine-notifies-patients-participants-of-privacy-incident\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Washington University School of Medicine in St. Louis has reported yet another data security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.cbc.ca\/news\/canada\/toronto\/scarborough-health-network-data-breach-1.6465355\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Data breach at Toronto health network possibly exposed patient information<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.vice.com\/en\/article\/wxdwxn\/hacker-steals-database-of-hundreds-of-verizon-employees\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Hacker steals database of hundreds of Verizon employees<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/secureservercdn.net\/45.40.146.94\/15b.604.myftpupload.com\/wp-content\/uploads\/2022\/05\/noticeofdataevent_05252022.pdf\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Ambulance billing service\u00a0Comstar in Massachusetts\u00a0notifying people following a data security breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.prnewswire.com\/news-releases\/cooper-university-health-care-provides-notice-of-data-security-incident-301555387.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Cooper University Health Care in NJ notifying those affected by security incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/ambulance-billing-service-and-two-health-systems-report-breaches-involving-protected-health-information\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">California\u2019s Alameda Health System discloses security breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (90,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/securityaffairs.co\/wordpress\/131733\/hacking\/100k-npm-credential-github-oauth-breach.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">NPM users\u2019 credentials stolen in the April OAuth token attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (100,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/globalnews.ca\/news\/8872996\/calgary-charity-data-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Calgary charity hit by data breach says it responded appropriately despite client concerns<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/portswigger.net\/daily-swig\/data-breach-at-australian-pension-provider-spirit-super-impacts-50k-victims-following-phishing-attack\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Australian pension provider Spirit Super caught out by phishing attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (50,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.itnews.com.au\/news\/ndis-case-management-system-provider-breached-580729\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Australia\u2019s National Disability Insurance Scheme breached<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Ransomware&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Ransomware<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.theregister.com\/2022\/05\/02\/in_brief_security\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">American Dental Association fears ransomware infection<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bitdefender.com\/blog\/hotforsecurity\/lockbit-ransomware-attack-cripples-parts-of-german-library-service\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Lockbit ransomware attack cripples parts of German library service<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/ktvz.com\/news\/election\/2022\/05\/09\/cyber-attack-prompts-security-response-by-oregon-secretary-of-state\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Opus Interactive\u00a0hit by ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/omnicell-reveals-ransomware-incident-in-sec-filing\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Omnicell reveals ransomware incident in SEC filing<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/refuah-health-center-recently-discovered-a-breach-that-was-listed-on-the-dark-web-in-june-2021\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Refuah Health Center \u201crecently discovered\u201d a breach that was listed on the dark web in June, 2021<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/media.dojmt.gov\/wp-content\/uploads\/Vicksburg-Warren-School-District-.pdf\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Vicksburg-Warren School District sends notifications for 2021 ransomware attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.itgovernance.co.uk\/blog\/Mercyhurst%20University%20in%20Pennsylvania%20to%20any%20list%20of%20post-secondary%20educational%20entities%20hit%20by%20ransomware\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Mercyhurst University\u00a0in Pennsylvania hit by ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.govinfosecurity.com\/avoslocker-claims-data-theft-from-another-healthcare-entity-a-19083\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Christus Health ransomware incident involved theft of sensitive patient and employee data<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.databreaches.net\/vice-society-claims-to-have-acquired-patient-files-from-atlanta-perinatal-associates\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Ransomware groups claims to have acquired patient files from Atlanta Perinatal Associates<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/chicago.suntimes.com\/education\/2022\/5\/20\/23132983\/cps-public-schools-data-breach-students-employees-records-battelle-kids#:~:text=The%20staff%20and%20student%20information,.%201%2C%20the%20district%20said.&amp;text=Almost%20500%2C000%20Chicago%20Public%20Schools,to%20a%20massive%20data%20breach.\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Battelle for Kids ransomware attack compromised records of Chicago Public School students, employees<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (560,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.wgem.com\/2022\/05\/09\/troup-quincy-facing-one-worst-cyber-attacks-ever-hit-community\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Quincy facing one of the \u2018worst cyber attacks\u2019 to ever hit the community<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bitdefender.com\/blog\/hotforsecurity\/greenland-hit-by-cyber-attack-finds-its-health-service-crippled\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Greenland hit by cyber attack, finds its health service crippled<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/therecord.media\/k-12-cyberattacks-new-mexico-ohio\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Fort Sumner Municipal Schools in New Mexico and Washington Local Schools in Ohio hit by ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.cbc.ca\/news\/canada\/saskatchewan\/regina-ransomware-attack-1.6468848\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Cyberattack against Regina Public Schools likely ransomware<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.prnewswire.com\/news-releases\/martin-university-announces-data-security-incident-301555691.html\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Martin University discloses ransomware incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.theregister.com\/2022\/05\/29\/security_roundup\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Somerset County, NJ hit by a ransomware attack<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">\u00a0(unknown)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Data breaches&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Data breaches<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bbc.co.uk\/news\/uk-england-essex-61312383\"><span lang=\"en-AE\" style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">University of Essex data breach being taken \u201cvery seriously\u201d<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (400)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bbc.co.uk\/news\/uk-england-cornwall-61404948\"><span lang=\"en-AE\" style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Cornwall Council accidentally publish data of schoolchildren<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (5)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bedfordshirelive.co.uk\/news\/bedfordshire-news\/central-bedfordshire-council-slammed-incompetent-7076326\"><span lang=\"en-AE\" style=\"font-weight: bold; font-family: Calibri; font-size: 11.0pt;\">Central Bedfordshire Council leaked special educational needs students\u2019 personal details<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/news.yahoo.com\/hard-drives-equipment-containing-personal-170353324.html\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Hard drives, equipment containing personal information stolen from L&amp;I in Tukwila<\/span><\/a><span style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.cbc.ca\/news\/canada\/prince-edward-island\/pei-covid-privacy-health-hiv-1.6435748\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">COVID-19 patient sues Health P.E.I. for privacy breach at hospital<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.news24.com\/news24\/southafrica\/local\/peoples-post\/alleged-docket-dumping-probed-20220502\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Investigation launched after South African police alleged to have dumped sensitive data<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.safetydetectives.com\/news\/breastcancer-leak-report\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Breast cancer support organisation leaks data despite multiple notifications<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (350,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/thejournal.com\/articles\/2022\/05\/03\/illuminate-education-data-breach-impacted-at-least-24-districts-18-charter-schools-in-ny.aspx?m=1\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Illuminate Education data breach affects more than 500 New York schools<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (1 million)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.rnz.co.nz\/news\/national\/466834\/data-breach-on-aa-traveller-website\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Data breach detected on New Zealand AA Traveller website<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.hackread.com\/personal-details-supervpn-geckovpn-users-telegram-leaked\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Personal details of SuperVPN, GeckoVPN users leaked on Telegram<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (21 million)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/stratcann.com\/2022\/05\/10\/ocs-confirms-data-leak-opp-opens-investigation\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Ontario Cannabis Store confirms data leak<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.miaminewtimes.com\/news\/data-breach-florida-attorney-allegedly-leaked-private-confidential-records-of-96-individuals-14417436\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Boca Raton attorney allegedly leaked clients\u2019 confidential files<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (96)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.vice.com\/en\/article\/7kbnna\/anonymous-social-media-app-yik-yak-exposed-users-precise-locations\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Social media app Yik Yak exposed users\u2019 precise locations<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.law.com\/thelegalintelligencer\/2022\/05\/13\/law-firm-cyber-breach-may-impact-23k-including-financial-institution-clients-customers\/\"><span style=\"font-family: Calibri; font-size: 11.0pt;\">Stevens &amp; Lee\u00a0data breach affects financial institution\u2019s client data<\/span><\/a><span style=\"font-family: Calibri; font-size: 11.0pt;\"> (23,066)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/eu.cincinnati.com\/story\/news\/2022\/05\/13\/cyber-mistake-cincinnati-posted-city-workers-data-online\/9767660002\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Cincinnati inadvertently posted employees\u2019 personal data online<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (2,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.haaretz.com\/2022-05-22\/ty-article\/.premium\/interior-ministry-illegally-shared-millions-of-biometric-images-of-israelis\/00000180-f6c4-d18b-a787-f7edc56c0000\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Israeli Ministry illegally shared biometric images of millions with unknown agency<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.tapinto.net\/towns\/bayonne\/sections\/law-and-justice\/articles\/bayonne-police-sergeant-used-law-enforcement-database-for-personal-use-prosecutor-charges\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Bayonne Police Sergeant charged with unauthorised use of law enforcement database<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/dailypost.ng\/2022\/05\/23\/robbers-attack-npc-office-steal-birth-certificates\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Robbers attack Nigerian Population Commission office, steal birth certificates<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.nzherald.co.nz\/nz\/potential-privacy-breach-after-documents-stolen-from-abandoned-auckland-police-station\/BQWJJEYSNGEHF2K7ER4KDKCGUQ\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Potential privacy breach after documents stolen from abandoned Auckland police station<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Financial information&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Financial information<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/techdator.net\/nb65-hackers-stole-qiwi-credit-card-data\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">NB65 hackers reportedly stole credit card data of QIWI clients<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/coinfomania.com\/another-weekend-another-hack-defi-lender-fei-protocol-suffers-80m-security-breach\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Fei protocol suffers an extensive security breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.abc.net.au\/news\/2022-05-18\/13000-more-sa-public-servants-involved-in-data-breach\/101078646\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">South Australian public servants now involved in payroll data breach<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (13,088)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.americanpress.com\/2022\/05\/31\/school-board-hacked-after-emails-of-contractors-compromised\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">The Calcasieu Parish School Board has been the victim of a cyber fraud incident<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;In other news\u2026&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">Malicious insiders and miscellaneous incidents<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/english.alaraby.co.uk\/news\/france-probes-far-right-website-muslim-data-breach\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Far-right France website probed after \u2018leak\u2019 of Muslim personal data<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.hackread.com\/anonymous-leak-police-emails-australia-offshore-detention\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Anonymous leak 82GB of police emails against Australia\u2019s offshore detention<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (285,365)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/toronto.ctvnews.ca\/ikea-canada-confirms-data-breach-involving-personal-information-of-approximately-95-000-customers-1.5892457\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">IKEA Canada confirms data breach involving employee<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (95,000)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/nltimes.nl\/2022\/05\/13\/citizens-data-stolen-eindhoven-police-cadets-car\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Citizens\u2019 data stolen from Eindhoven police cadet\u2019s car<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (unknown)<\/span><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.aljazeera.com\/news\/2022\/5\/24\/xinjiang-leak-sheds-new-light-on-chinas-uighur-camps#:~:text=A%20leak%20of%20thousands%20of,China%20calls%20it%20%27lies%27.&amp;text=A%20leak%20of%20thousands%20of%20photos%20and%20official%20documents%20from,in%20China%27s%20far%20western%20region.\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Hacked data reveals classified documents from China\u2019s Uyghur<\/span><\/a><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\"> (2,884)<\/span><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][divider line_type=&#8221;No Line&#8221; custom_height=&#8221;20&#8243;][vc_row_inner column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; text_align=&#8221;left&#8221; row_position=&#8221;default&#8221; row_position_tablet=&#8221;inherit&#8221; row_position_phone=&#8221;inherit&#8221; overflow=&#8221;visible&#8221; pointer_events=&#8221;all&#8221; el_id=&#8221;Malicious insiders and miscellaneous incidents&#8221;][vc_column_inner column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; overflow=&#8221;visible&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\r\n<p style=\"margin: 0in; font-family: Calibri; font-size: 18.0pt;\"><span style=\"font-weight: bold;\">In other news\u2026<\/span><\/p>\r\n<ul style=\"direction: ltr; unicode-bidi: embed; margin-top: 0in; margin-bottom: 0in;\" type=\"disc\">\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/google\/google-fights-doxxing-with-updated-personal-info-removal-policy\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Google fights doxxing with updated personal info removal policy<\/span><\/a><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.zdnet.com\/article\/mozilla-finds-mental-health-apps-fail-spectacularly-at-user-data-security\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Mozilla finds mental health apps fail \u2018spectacularly\u2019 at user security, data policies<\/span><\/a><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.bleepingcomputer.com\/news\/security\/conti-ransomware-shuts-down-operation-rebrands-into-smaller-units\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">Conti ransomware shuts down operation, rebrands into smaller units<\/span><\/a><\/li>\r\n<li style=\"margin-top: 0; margin-bottom: 0; vertical-align: middle;\"><a href=\"https:\/\/www.hackread.com\/goodwill-ransomware-food-poor-decrypt-locked-files\/\"><span lang=\"en-AE\" style=\"font-family: Calibri; font-size: 11.0pt;\">GoodWill Ransomware demands food for the poor to decrypt locked files<\/span><\/a><\/li>\r\n<\/ul>\r\n[\/vc_column_text][\/vc_column_inner][\/vc_row_inner][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][\/vc_column][\/vc_row]","protected":false},"excerpt":{"rendered":"<p>[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221;&#8230;<\/p>\n","protected":false},"author":1,"featured_media":6408,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[23,24],"tags":[35,30,34],"class_list":{"0":"post-6405","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-cyber-attack","8":"category-data-breaches","9":"tag-cyber-attack","10":"tag-cyber-security","11":"tag-data-breach"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Catalog of May 2022 Cyber Attacks and Data Breaches \u2013 49.8 million records breached - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"elcome to our May 2022 review of data breaches and cyber attacks. We identified 77 security incidents during the month, resulting in 49,782,129\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Catalog of May 2022 Cyber Attacks and Data Breaches \u2013 49.8 million records breached - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"elcome to our May 2022 review of data breaches and cyber attacks. We identified 77 security incidents during the month, resulting in 49,782,129\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-05T10:57:59+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T08:44:31+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/12\/wepik-futuristic-gradient-cybercode-logo-2022927-82217.jpeg\" \/>\n\t<meta property=\"og:image:width\" content=\"1280\" \/>\n\t<meta property=\"og:image:height\" content=\"720\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"15 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"Catalog of May 2022 Cyber Attacks and Data Breaches \u2013 49.8 million records breached\",\"datePublished\":\"2022-06-05T10:57:59+00:00\",\"dateModified\":\"2023-03-27T08:44:31+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\\\/\"},\"wordCount\":2942,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/wepik-futuristic-gradient-cybercode-logo-2022927-82217.jpeg\",\"keywords\":[\"Cyber Attack\",\"Cyber Security\",\"Data Breach\"],\"articleSection\":[\"Cyber Attack\",\"Data Breaches\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\\\/\",\"name\":\"Catalog of May 2022 Cyber Attacks and Data Breaches \u2013 49.8 million records breached - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/wepik-futuristic-gradient-cybercode-logo-2022927-82217.jpeg\",\"datePublished\":\"2022-06-05T10:57:59+00:00\",\"dateModified\":\"2023-03-27T08:44:31+00:00\",\"description\":\"elcome to our May 2022 review of data breaches and cyber attacks. We identified 77 security incidents during the month, resulting in 49,782,129\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/wepik-futuristic-gradient-cybercode-logo-2022927-82217.jpeg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/12\\\/wepik-futuristic-gradient-cybercode-logo-2022927-82217.jpeg\",\"width\":1280,\"height\":720},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Catalog of May 2022 Cyber Attacks and Data Breaches \u2013 49.8 million records breached\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Catalog of May 2022 Cyber Attacks and Data Breaches \u2013 49.8 million records breached - Sajin Shivdas | Cybersecurity","description":"elcome to our May 2022 review of data breaches and cyber attacks. We identified 77 security incidents during the month, resulting in 49,782,129","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/","og_locale":"en_US","og_type":"article","og_title":"Catalog of May 2022 Cyber Attacks and Data Breaches \u2013 49.8 million records breached - Sajin Shivdas | Cybersecurity","og_description":"elcome to our May 2022 review of data breaches and cyber attacks. We identified 77 security incidents during the month, resulting in 49,782,129","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2022-06-05T10:57:59+00:00","article_modified_time":"2023-03-27T08:44:31+00:00","og_image":[{"width":1280,"height":720,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/12\/wepik-futuristic-gradient-cybercode-logo-2022927-82217.jpeg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"15 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"Catalog of May 2022 Cyber Attacks and Data Breaches \u2013 49.8 million records breached","datePublished":"2022-06-05T10:57:59+00:00","dateModified":"2023-03-27T08:44:31+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/"},"wordCount":2942,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/12\/wepik-futuristic-gradient-cybercode-logo-2022927-82217.jpeg","keywords":["Cyber Attack","Cyber Security","Data Breach"],"articleSection":["Cyber Attack","Data Breaches"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/","name":"Catalog of May 2022 Cyber Attacks and Data Breaches \u2013 49.8 million records breached - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/12\/wepik-futuristic-gradient-cybercode-logo-2022927-82217.jpeg","datePublished":"2022-06-05T10:57:59+00:00","dateModified":"2023-03-27T08:44:31+00:00","description":"elcome to our May 2022 review of data breaches and cyber attacks. We identified 77 security incidents during the month, resulting in 49,782,129","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/12\/wepik-futuristic-gradient-cybercode-logo-2022927-82217.jpeg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/12\/wepik-futuristic-gradient-cybercode-logo-2022927-82217.jpeg","width":1280,"height":720},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/catalog-of-may-2022-cyber-attacks-and-data-breaches-9-8-million-records-breached\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"Catalog of May 2022 Cyber Attacks and Data Breaches \u2013 49.8 million records breached"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6405","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6405"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6405\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6408"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6405"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6405"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6405"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}