eupolicy.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
This Mastodon server is a friendly and respectful discussion space for people working in areas related to EU policy. When you request to create an account, please tell us something about you.

Server stats:

241
active users

#ransom

0 posts0 participants0 posts today

DISA Global Solutions reports more than 3.3 million people were affected by the 2024 data breach they experienced, but questions remain.

In an interim update that had been quoted by a law firm,, DISA had made an intriguing statement about steps they had taken to dissuade the unnamed threat actor from leaking the data and providing confirmation of deletion.

That's all missing from their final notification.

Why?

databreaches.net/2025/02/25/di

#databreach #ransom #extortion #transparency #notification

@campuscodi

An interaction with a threat actor this past week inspired this new post by me:

The U.K. is considering prohibiting ransom payments. It's a difficult issue.

databreaches.net/2025/01/20/th

#ransomware #ransom #extortion #prohibition #ban

Out of curiosity, as things stand today and if you are in the U.S., do you think the government should totally prohibit ransom payments, even in the private sector?

Two ransomware groups claimed they attacked Rutherford County Schools. in Tennessee. One leaked sensitive records.

I skimmed the data tranche and found tens of thousands of files with sensitive student information and personnel files. Read more about it here:

databreaches.net/2025/01/07/tw

#databreach #ransom #EduSec #cybersecurity

@douglevin @brett @funnymonkey

Not a Happy Christmas for this U.K. firm:

DEphoto, a U.K. photo business that does school photos, sports, and events was hacked on Christmas and then hacked again on December 29 after they wouldn't pay the threat actor's demands:

databreaches.net/2025/01/01/ha

To their credit, they promptly started notifying customers of the incident.

It appears Brain Cipher did leak the RIBridges data on their leak site, and it appears to be the same data they had provided to me pre-leak and that I described yesterday:

databreaches.net/2024/12/30/mo

And no, none of the data I inspected was encrypted.

The leak site is still iffy to connect to.

More details emerge about RIBridges data breach; Deloitte tells state threat actors have leaked data:

Threat actors’ leak site unreachable due to DoS attack; DataBreaches given exclusive preview of leak

databreaches.net/2024/12/30/mo

#databreach #ransom #Deloitte #cybersecurity #vendor #RIBridges

@campuscodi @euroinfosec @lawrenceabrams