Skip to content
HACKMAGEDDON
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Menu Close
  • Donate
  • About
  • Timelines
  • Statistics
  • Cloud-Native Threats
  • Data Breaches
  • Leaky Buckets
  • Infographics
  • Submit
Read more about the article Leaky Buckets in 2022

Leaky Buckets in 2022

  • Post author:Paolo Passeri
  • Post last modified:August 14, 2022
  • Post category:Cloud/Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:February 21, 2022

Similarly to what I have done in 2021, I am now collecting the incidents due to cloud misconfigurations and leading to the exposure of data.

Continue ReadingLeaky Buckets in 2022
Read more about the article The Biggest Data Breaches of 2022
Photo by Tima Miroshnichenko from Pexels

The Biggest Data Breaches of 2022

  • Post author:Paolo Passeri
  • Post last modified:August 14, 2022
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:3 mins read
  • Post published:January 27, 2022

Similarly to what I have done in 2021, I am collecting all the mega breaches (with more than 1 million records leaked). The information is derived from the cyber attacks timelines...

Continue ReadingThe Biggest Data Breaches of 2022
Read more about the article Cloud-Native Threats in 2022
Photo by Soumil Kumar from Pexels

Cloud-Native Threats in 2022

  • Post author:Paolo Passeri
  • Post last modified:August 14, 2022
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:January 31, 2022

This blog post lists the main cloud-native threats, that is those cyber events exploiting the cloud in one or more stage of the kill chain. I have collected...

Continue ReadingCloud-Native Threats in 2022
Read more about the article 16-31 July 2022 Cyber Attacks Timeline
Photo by Markus Spiske on Unsplash

16-31 July 2022 Cyber Attacks Timeline

  • Post author:Paolo Passeri
  • Post last modified:August 9, 2022
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:August 9, 2022

The second cyber attacks timeline of July 2022 confirms the sustained level of activity. In this fortnight I have collected 139 entries, once again...

Continue Reading16-31 July 2022 Cyber Attacks Timeline
Read more about the article 1-15 July 2022 Cyber Attacks Timeline
Photo by Stillness InMotion on Unsplash

1-15 July 2022 Cyber Attacks Timeline

  • Post author:Paolo Passeri
  • Post last modified:July 21, 2022
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:July 21, 2022

The first cyber attacks timeline of July 2022 shows a sharp increase in the number of events. In this fortnight I have collected 131 entries, which...

Continue Reading1-15 July 2022 Cyber Attacks Timeline
Read more about the article 16-31 May 2022 Cyber Attacks Timeline
Photo by Philipp Katzenberger on Unsplash

16-31 May 2022 Cyber Attacks Timeline

  • Post author:Paolo Passeri
  • Post last modified:July 16, 2022
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:June 21, 2022

The second timeline of May 2022 is out. In the second half of the month I collected 120 events, corresponding to an average of 7.50 events/day, an important...

Continue Reading16-31 May 2022 Cyber Attacks Timeline
Read more about the article 1-15 May 2022 Cyber Attacks Timeline
Image by Gerd Altmann from Pixabay

1-15 May 2022 Cyber Attacks Timeline

  • Post author:Paolo Passeri
  • Post last modified:July 14, 2022
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:June 13, 2022

The first timeline of May 2022 is out. In the first half of the month I collected 101 events, that is an average of 6.73 events/day. The level of activity, reflected by...

Continue Reading1-15 May 2022 Cyber Attacks Timeline
Read more about the article 1-15 April 2022 Cyber Attacks Timeline
Image from Vic_B from Pixabay

1-15 April 2022 Cyber Attacks Timeline

  • Post author:Paolo Passeri
  • Post last modified:July 14, 2022
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:5 mins read
  • Post published:May 5, 2022

After the peak of March (in the meantime I have added more records to the previous timeline bringing the total to 150), the level of activity continues to be...

Continue Reading1-15 April 2022 Cyber Attacks Timeline
Read more about the article 16-30 April 2022 Cyber Attacks Timeline
Image by Riki32 from Pixabay

16-30 April 2022 Cyber Attacks Timeline

  • Post author:Paolo Passeri
  • Post last modified:July 14, 2022
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:May 30, 2022

The second timeline of April 2022 is finally out. In this fortnight I have collected 97 events that corresponds to an average of 6.47 events/day, despite...

Continue Reading16-30 April 2022 Cyber Attacks Timeline
Read more about the article 16-30 June 2022 Cyber Attacks Timeline
Photo by FLY:D on Unsplash

16-30 June 2022 Cyber Attacks Timeline

  • Post author:Paolo Passeri
  • Post last modified:July 11, 2022
  • Post category:Cyber Attacks Timelines/Security
  • Post comments:0 Comments
  • Reading time:4 mins read
  • Post published:July 11, 2022

And finally I can publish the second timeline of June 2022. In the second half of the month I collected 117 events, corresponding to...

Continue Reading16-30 June 2022 Cyber Attacks Timeline
  • 1
  • 2
  • 3
  • 4
  • …
  • 30
  • Go to the next page
Copyright 2021 - HACKMAGEDDON.COM