sigmoid.social is one of the many independent Mastodon servers you can use to participate in the fediverse.
A social space for people researching, working with, or just interested in AI!

Server stats:

586
active users

#dataleak

7 posts7 participants0 posts today

So yesterday, I emailed a state court system that appears to be linked to the exposed data I mentioned recently and that the host notified on or about July 28.

No reply was received.

Today, I sent a contact form message to the lawyer for a juvenile whose records were sealed. Sealed, except 11 of them were exposed to anyone who can access the data. I told him what was going on and suggested he contact the court and tell them to get the data secured.

No reply was received.

Today, I sent an email to the judge who ordered the juvenile's records sealed and I cc:d the district attorney. I gave them the juvenile's name, case number and that I could see all the sealed records. I urged them to have their IT or vendor call me and I could give them the IP address over the phone, etc.

No reply was received.

Dear Russia, China, and North Korea:

You do not need to hack our courts. They are leaking like sieves and do not respond when we try to tell them they need to secure the data.

Yours in total frustration,

/Dissent

Hack laboratory

Datahack medical world turns out to be much bigger: also research skin, urine and penis stolen

By Daniël Verlaan © ANP RTL Nieuws

The data breach at the laboratory that conducts population cervical cancer screening is greater than reported. In addition to stolen data from 485,000 women who participated in that population survey, data from skin, urine and penis examinations have also been stolen. A small part of it is now on the dark web.

This is according to research by RTL Nieuws. It concerns names, residential addresses and dates of birth of patients, their social security numbers and information and results of the study. Advice has also been taken as a result of investigations.

These are patients who have had examinations performed by healthcare providers and independent clinics that have been sent to the Clinical Diagnostics laboratory.

Among other things, information and results of examinations on urine, skin, vagina, penis, anus and wound fluid have been published.

Hospitals and general practitioners

Based on the leaked data, these are patients from the Leiden University Medical Center, Amphia Hospital and Alrijne Hospital, among others. Many studies written out by general practitioners can also be found in the leaked data. The dates are from 2022 to this year.

The data put online by the criminals include 53,516 people who had an investigation done by the general practitioner, RTL Nieuws calculated. The actual number leaked is expected to be much higher: currently only about 100 megabytes of data have been published, the criminals claim to have stolen 300 gigabytes.

Both Clinical Diagnostics and the criminals behind the hack have been asked to respond.

Population survey

Among the 485,000 women who participated in the population survey for cervical cancer, in addition to their private data and citizen service number, test results of smears and self-tests were stolen.

Elza den Hertog, the chairman of the board of Population Research Netherlands, says that the institute is extremely shocked. "We understand that women who have participated in population surveys through us are of course also very frightened by this. I would like to say to them that we are very sorry that this happened."

[Dutch] rtl.nl/nieuws/binnenland/artik

Datahack medische wereld blijkt veel groter: ook onderzoek huid, urine en penis gestolen
RTL Nieuws · Datahack medische wereld blijkt veel groter: ook onderzoek huid, urine en penis gestolenBy Daniël Verlaan

Correcting this because it looks like this doesn't involve any federal court. But there are exposed sensitive records, some of which were ordered sealed.

NEW: Federal judiciary says it is boosting security after cyberattack; researcher finds new leaks

More of those frustrating leaks where, despite our best efforts, we have been unable to get the network shares locked down so far, even with the host's assistance.

This one involves two courts: and yes, we saw some files that were supposed to be sealed or confidential.

databreaches.net/2025/08/10/fe

Affaire piratage comptes clients Bouygues télécom:
"le meilleur c’est que la page web dédiée à informer les victimes contenait une balise “noindex” cachée. Pour ceux qui ne connaissent pas, ça veut dire que Google ne peut pas indexer la page. En gros, si vous cherchez des infos sur la cyberattaque Bouygues sur Google, vous ne trouverez pas leur page officielle. C’est surement pour pas flinguer leur branding !"
korben.info/bouygues-telecom-p
#cqfd
#dataleak

TeaOnHer app, rival to the Tea safety app leaks driver's licenses and personal data of 53,000 users

TeaOnHer, a controversial dating-related app for men, exposed personal data of approximately 53,000 users including driver's licenses, verification selfies, and private communications through critical security vulnerabilities that allow unauthorized access via publicly accessible web addresses without authentication. The breach also exposed the app creator's administrative credentials in plaintext.

****
#cybersecurity #infosec #incident #dataleak
beyondmachines.net/event_detai

BeyondMachinesTeaOnHer app, rival to the Tea safety app leaks driver's licenses and personal data of 53,000 usersTeaOnHer, a controversial dating-related app for men, exposed personal data of approximately 53,000 users including driver's licenses, verification selfies, and private communications through critical security vulnerabilities that allow unauthorized access via publicly accessible web addresses without authentication. The breach also exposed the app creator's administrative credentials in plaintext.

Promises, promises.

Exclusive: Brosix and Chatox promised to keep your chats secured. They didn’t.

A researcher found a misconfigured backup with -- yes, you guessed it -- everything in plaintext instead of encrypted.

Some entities that used the service are medical entities that were actually mentioning protected health information or attaching files with #PHI in the chat.

There were almost 5k Allstate employees using the service and sharing customer #PII in files.

And oh yeah, I found one company gossiping about me and plotting against me after I notified them they were leaking tons of #PHI. I've done them a favor by not publishing all their chat logs about me. :)

There also appeared to be some "dodgy" stuff on the backup, too.

Read the details about the exposed backup in my post at databreaches.net/2025/08/05/ex

#infosec #encryption #databreach #incidentresponse #chatox #brosix #dataleak

@zackwhittaker

From the "no-need-to-hack-when-it's-leaking-and-leaking-and-leaking" dept:

Website Planet recently reported on a leak Jeremiah Fowler discovered. But it wasn't the Gladney Adoption Center's first leak. And while Fowler praised the center for their response to his alert, DataBreaches wants to know what the Gladney Adoption Center is going to do to prevent more leaks. They've had 3 in the past few months alone.

databreaches.net/2025/07/17/gl

Great thanks to @JayeLTee for his help on this one.