• Log In
  • Skip to primary navigation
  • Skip to main content
  • Skip to primary sidebar

Ethical Hacking

Wade Mackey

Ethical Hacking

MIS 5211.001 ■ Fall 2019 ■ Wade Mackey
  • Home
  • About
  • Syllabus
  • Gradebook

5 Places Where Hackers Are Stealthily Stealing Your Data In 2019

October 31, 2019 by Numneung Koedkietpong Leave a Comment

The article states that there are top five places in 2019 where hackers can steal corporate and government data without detection. The details are as follow;

  1. Misconfigured cloud storage: “(ISC)² Cloud Security Report 2019 assets that 64% of cybersecurity professionals perceive data loss and leakage as the biggest risk associated with the cloud.” In order to mitigate this, a cloud security policy should be established and regularly updated inventory of cloud infrastructure.
  2. Darkweb: “Notorious Collection #1, revealed in 2019 by security expert Troy Hunt, is a set of email addresses and plaintext passwords totaling 2,692,818,238 rows”. To protect, set up holistic password policy and incident response plan.
  3. Abandoned and unprotected websites: “The same report revealed that 25% of e-banking applications were not even protected with a Web Application Firewall (WAF). Eventually, 85% of applications failed GDPR compliance tests, 49% did not pass the PCI DSS test.” To mitigate, the in-depth web penetration testing should be conducted.
  4. Mobile Applications’ backends: There is a vulnerability on API. To protect, conduct mobile penetration testing.
  5. Public code repositories: Some organization store high sensitive data in the open and accessible repositories like GitHub. To mitigate this, the policy related to code storage and access management should be established and then enforcing it to both internal and third-party.

Filed Under: Uncategorized, Week 09: Web Application Hacking Tagged With:

Reader Interactions

Leave a Reply Cancel reply

You must be logged in to post a comment.

Primary Sidebar

Weekly Discussions

  • Uncategorized (55)
  • Week 01: Overview (6)
  • Week 02: TCP/IP and Network Architecture (2)
  • Week 03: Reconnaisance (7)
  • Week 04: Network Mapping and Vulnerability Scanning (4)
  • Week 05: Metasploit (9)
  • Week 06: More Metasploit (8)
  • Week 07: Social Engineering (11)
  • Week 08: Malware (19)
  • Week 09: Web Application Hacking (14)
  • Week 10: SecuritySheperd (12)
  • Week 11: Intro to Dark Web and Intro to Cloud (10)
  • Week 12: Introduction to Wireless Security with WEP and WPA2 PSK (6)
  • Week 13: WPA2 Enterprise and Beyond WiFi (11)
  • Week 14: Jack the Ripper, Cain and Able, and Ettercap (9)

Copyright © 2025 · Course News Pro on Genesis Framework · WordPress · Log in