Tag

data breach

1 views collected around this technical thread.

Java Tech Enthusiast
Java Tech Enthusiast
Apr 13, 2024 · Information Security

Why Websites Require Password Reset Instead of Revealing Original Passwords

Websites cannot reveal original passwords because they store only salted, one‑way hashes, not the plaintext, making recovery impossible; therefore, when users forget their credentials, the secure approach is to verify identity and issue a password reset rather than expose any stored data.

AuthenticationHashingMD5
0 likes · 6 min read
Why Websites Require Password Reset Instead of Revealing Original Passwords
php中文网 Courses
php中文网 Courses
Jul 6, 2023 · Information Security

Anonymous Sudan Claims to Have Stolen Microsoft Customer Database; Microsoft Denies the Allegations

Anonymous Sudan alleges it has breached Microsoft’s servers and obtained a database containing over 30 million customer credentials, while Microsoft firmly denies any such breach, prompting widespread debate over the hacker group’s capabilities, motives, and the broader implications for information security.

Anonymous SudanCyberattackMicrosoft
0 likes · 4 min read
Anonymous Sudan Claims to Have Stolen Microsoft Customer Database; Microsoft Denies the Allegations
Python Programming Learning Circle
Python Programming Learning Circle
Jul 5, 2023 · Information Security

Renmin University Student Data Breach and the Hacker's Background

A recent data breach at Renmin University's website exposed thousands of students' personal information, revealing that the hacker, a former graduate student with a strong academic record and industry experience, was arrested, highlighting serious privacy and information security concerns in China.

Renmin Universitychinadata breach
0 likes · 4 min read
Renmin University Student Data Breach and the Hacker's Background
IT Services Circle
IT Services Circle
Jul 8, 2022 · Information Security

Weak Passwords Lead to Massive AMD Data Breach: RansomHouse Exposes Security Lapses

A recent ransomware group called RansomHouse revealed that AMD suffered a massive data breach of over 450 GB due to employees using simple passwords like "admin" and "123456", highlighting the dangers of weak credentials and prompting urgent security awareness.

AMDdata breachinformation security
0 likes · 5 min read
Weak Passwords Lead to Massive AMD Data Breach: RansomHouse Exposes Security Lapses
Java Architect Essentials
Java Architect Essentials
Jun 12, 2021 · Information Security

China's First Nationwide Case of Illegal WeChat Data Harvesting via "Clean Fan" Software

In September 2022, Nantong police uncovered China's first nationwide case of illegal WeChat user data harvesting using a "clean fan" application, leading to the arrest of eight suspects who were convicted for illegally obtaining computer system data and controlling systems, highlighting severe information security risks.

WeChatchinacybercrime
0 likes · 7 min read
China's First Nationwide Case of Illegal WeChat Data Harvesting via "Clean Fan" Software
Top Architect
Top Architect
Feb 24, 2021 · Information Security

The Mystery of the Password “ji32k7au4a83” and How to Create Strong Passwords

The article explains why the rare password “ji32k7au4a83” appears in breach data, traces its origin to the Chinese Zhuyin phonetic system, presents statistics on common passwords, and offers expert advice on crafting secure, long, and varied passwords.

data breachinformation securitypassword best practices
0 likes · 4 min read
The Mystery of the Password “ji32k7au4a83” and How to Create Strong Passwords
Architect's Tech Stack
Architect's Tech Stack
Dec 5, 2020 · Information Security

Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences

In February 2020, a core operations engineer at Micro-Alliance maliciously deleted the company's production databases, causing over ten billion yuan in market loss, massive user disruption, and a six‑year prison sentence, while highlighting broader industry risks and the need for stronger security controls.

cybercrimedata breachdatabase deletion
0 likes · 8 min read
Case Study: Micro-Alliance Database Deletion Incident and Its Legal Consequences
Full-Stack Internet Architecture
Full-Stack Internet Architecture
Mar 25, 2020 · Information Security

Understanding Weibo Data Breaches: Credential Stuffing, Database Dumping, and Data Laundering

The article explains the recent Weibo data breach, describing how attackers used credential‑stuffing (撞库), data leakage (漏水), database dumping (拖库) and data laundering (洗库) to obtain millions of user records, the technical steps involved, and the security implications for both users and platforms.

Credential StuffingWeibodata breach
0 likes · 6 min read
Understanding Weibo Data Breaches: Credential Stuffing, Database Dumping, and Data Laundering
Architecture Digest
Architecture Digest
Feb 28, 2020 · Information Security

Insider Data Deletion Incident at Weimob Causes Over HK$1 Billion Loss

In late February 2023, a core operations engineer at Weimob maliciously accessed the internal network and deleted production data, causing a 24‑hour outage of numerous merchant mini‑programs, leading to over HK$1 billion in market value loss and prompting legal action.

Cloud ServicesWeimobdata breach
0 likes · 5 min read
Insider Data Deletion Incident at Weimob Causes Over HK$1 Billion Loss
Efficient Ops
Efficient Ops
Jun 13, 2018 · Information Security

AcFun Data Breach Exposes Millions – How to Safeguard Your Account

In early June, AcFun announced a massive hack that leaked nearly ten million user records, including IDs, nicknames and encrypted passwords, urging users—especially those who haven’t logged in since July 2017 or use weak passwords—to change them immediately, while noting that the data is already being sold on the dark web.

AcFundark webdata breach
0 likes · 4 min read
AcFun Data Breach Exposes Millions – How to Safeguard Your Account
Efficient Ops
Efficient Ops
May 30, 2016 · Information Security

Why Weak Passwords and Unpatched Redis Threaten Operational Security

The article explains how weak passwords, misconfigured services like Redis, careless port changes, and leaked data enable attackers to compromise servers and internal networks, illustrating each risk with real‑world case studies and offering practical mitigation advice for robust ops security.

Redis vulnerabilitydata breachincident response
0 likes · 11 min read
Why Weak Passwords and Unpatched Redis Threaten Operational Security
Efficient Ops
Efficient Ops
Mar 8, 2016 · Information Security

How to Build an Effective Information Security Response Plan Before a Breach

This article outlines why proactive information‑security preparedness, cross‑department response teams, and clear incident‑response checklists are essential for minimizing damage and maintaining trust when a data breach occurs.

data breachincident responseinformation security
0 likes · 14 min read
How to Build an Effective Information Security Response Plan Before a Breach