Anatomy of a Data Breach
February 5, 2019
Excerpt: Hacking can indeed be a passion, proving that you can outfox governments and big league corporations. The thrill of the chase can be addictive – and the addiction is fueled by the monies to be made.
Breaches come in many variants, far too many to cover in a single article. But there is a general flow to a breach. Since we make a living investigating breaches and remediating the vulnerabilities that caused them, let us take you on an anatomical tour of a typical breach, highlighting some of the common elements.
To make the reading more fun, we have offered up “quotes” from the players typically involved in a breach. Many are taken from real-life incidents.
Read the entire article here.