Date

1.1.2015 1.1.2015 1.1.2015 1.1.2015 1.1.2015 1.1.2015 1.1.2015 2.1.2015 2.1.2015 2.1.2015 2.1.2015 3.1.2015 3.1.2015 4.1.2015 4.1.2015 4.1.2015 5.1.2015 5.1.2015 5.1.2015 6.1.2015 6.1.2015 6.1.2015 7.1.2015 7.1.2015 7.1.2015 7.1.2015 7.1.2015 8.1.2015 9.1.2015 10.1.2015 11.1.2015 11.1.2015 11.1.2015 11.1.2015 11.1.2015 11.1.2015 11.1.2015 12.1.2015 12.1.2015 12.1.2015 12.1.2015 12.1.2015 12.1.2015 14.1.2015 14.1.2015 14.1.2015 14.1.2015 14.1.2015 15.1.2015 15.1.2015 15.1.2015

16.1.2015 16.1.2015 16.1.2015 16.1.2015 16.1.2015 16.1.2015 17.1.2015 17.1.2015 17.1.2015 19.1.2015 19.1.2015 20.1.2015 20.1.2015 20.1.2015 21.1.2015 21.1.2015 22.1.2015 23.1.2015 23.1.2015 24.1.2015 24.1.2015 24.1.2015 25.1.2015 25.1.2015 26.1.2015 27.1.2015 27.1.2015 27.1.2015 27.1.2015 27.1.2015 28.1.2015 28.1.2015 29.1.2015 29.1.2015 29.1.2015 29.1.2015 30.1.2015 30.1.2015 30.1.2015 31.1.2015

1.2.2015 1.2.2015 1.2.2015 1.2.2015 1.2.2015 2.2.2015 2.2.2015 2.2.2015 2.2.2015 2.2.2015 4.2.2015 5.2.2015 5.2.2015 5.2.2015 6.2.2015 6.2.2015 7.2.2015 8.2.2015 8.2.2015 9.2.2015 9.2.2015 10.2.2015 10.2.2015 10.2.2015 10.2.2015 10.2.2015 10.2.2015 10.2.2015 10.2.2015 12.2.2015 12.2.2015 12.2.2015 12.2.2015 12.2.2015 13.2.2015 13.2.2015 14.2.2015 14.2.2015 14.2.2015 14.2.2015 14.2.2015 14.2.2015 14.2.2015

15.2.2015 16.2.2015 16.2.2015 16.2.2015 17.2.2015 17.2.2015 17.2.2015 17.2.2015 17.2.2015 17.2.2015 18.2.2015 18.2.2015 18.2.2015 18.2.2015 19.2.2015 21.2.2015 21.2.2015 22.2.2015 23.2.2015 23.2.2015 23.2.2015 23.2.2015 23.2.2015 23.2.2015 24.2.2015 24.2.2015 24.2.2015 24.2.2015 24.2.2015 25.2.2015 25.2.2015 25.2.2015 25.2.2015 25.2.2015 26.2.2015 27.2.2015 27.2.2015 27.2.2015 27.2.2015 27.2.2015 27.2.2015 28.2.2015 28.2.2015

1.3.2015 1.3.2015 1.3.2015 2.3.2015 2.3.2015 3.3.2015 3.3.2015 4.3.2015 4.3.2015 5.3.2015 5.3.2015 6.3.2015 7.3.2015 7.3.2015 8.3.2015 9.3.2015 9.3.2015 9.3.2015 10.3.2015 10.3.2015 11.3.2015 11.3.2015 11.3.2015 11.3.2015 12.3.2015 12.3.2015 12.3.2015 13.3.2015 13.3.2015 13.3.2015 13.3.2015 14.3.2015 14.3.2015 15.3.2015 15.3.2015 15.3.2015 15.3.2015

16.3.2015 16.3.2015 16.3.2015 17.3.2015 17.3.2015 17.3.2015 17.3.2015 18.3.2015 18.3.2015 18.3.2015 19.3.2015 20.3.2015 20.3.2015 20.3.2015 21.3.2015 21.3.2015 21.3.2015 22.3.2015 22.3.2015 23.3.2015 23.3.2015 23.3.2015 23.3.2015 24.3.2015 24.3.2015 25.3.2015 25.3.2015 25.3.2015 26.3.2015 26.3.2015 26.3.2015 26.3.2015 26.3.2015 27.3.2015 27.3.2015 27.3.2015 27.3.2015 28.3.2015 28.3.2015 28.3.2015 28.3.2015 29.3.2015 29.3.2015 29.3.2015 29.3.2015 29.3.2015 30.3.2015 30.3.2015 30.3.2015 31.3.2015 31.3.2015

1.4.2015 1.4.2015 2.4.2015 2.4.2015 3.4.2015 3.4.2015 4.4.2015 4.4.2015 4.4.2015 4.4.2015 5.4.2015 5.4.2015 5.4.2015 6.4.2015 6.4.2015 6.4.2015 6.4.2015 7.4.2015 7.4.2015 8.4.2015 8.4.2015 8.4.2015 9.4.2015 9.4.2015 9.4.2015 10.4.2015 10.4.2015 10.4.2015 10.4.2015 10.4.2015 11.4.2015 11.4.2015 11.4.2015 12.4.2015 12.4.2015 12.4.2015 12.4.2015 13.4.2015 13.4.2015 13.4.2015 13.4.2015 13.4.2015 14.4.2015 14.4.2015 14.4.2015 14.4.2015 14.4.2015 14.4.2015 14.4.2015 14.4.2015 15.4.2015

17.4.2015 17.4.2015 17.4.2015 18.4.2015 19.4.2015 20.4.2015 21.4.2015 21.4.2015 21.4.2015 21.4.2015 22.4.2015 22.4.2015 23.4.2015 23.4.2015 23.4.2015 24.4.2015 24.4.2015 24.4.2015 24.4.2015 25.4.2015 25.4.2015 25.4.2015 26.4.2015 27.4.2015 27.4.2015 27.4.2015 27.4.2015 27.4.2015 28.4.2015 29.4.2015 30.4.2015 30.4.2015 30.4.2015 30.4.2015 30.4.2015 30.4.2015

1.5.2015 1.5.2015 1.5.2015 1.5.2015 1.5.2015 1.5.2015 2.5.2015 2.5.2015 3.5.2015 3.5.2015 4.5.2015 4.5.2015 4.5.2015 4.5.2015 4.5.2015 4.5.2015 5.5.2015 5.5.2015 5.5.2015 6.5.2015 6.5.2015 6.5.2015 7.5.2015 7.5.2015 7.5.2015 7.5.2015 7.5.2015 7.5.2015 8.5.2015 8.5.2015 8.5.2015 11.5.2015 11.5.2015 11.5.2015 11.5.2015 11.5.2015 11.5.2015 11.5.2015 11.5.2015 11.5.2015 12.5.2015 13.5.2015 13.5.2015 13.5.2015 14.5.2015 14.5.2015 14.5.2015 14.5.2015 14.5.2015 14.5.2015 15.5.2015 15.5.2015

16.5.2015 17.5.2015 17.5.2015 18.5.2015 18.5.2015 18.5.2015 18.5.2015 19.5.2015 20.5.2015 20.5.2015 21.5.2015 21.5.2015 21.5.2015 21.5.2015 21.5.2015 22.5.2015 22.5.2015 22.5.2015 22.5.2015 22.5.2015 23.5.2015 23.5.2015 24.5.2015 24.5.2015 24.5.2015 24.5.2015 24.5.2015 25.5.2015 25.5.2015 26.5.2015 26.5.2015 28.5.2015 28.5.2015 28.5.2015 30.5.2015 30.5.2015 30.5.2015

2.6.2015 2.6.2015 2.6.2015 2.6.2015 2.6.2015 3.6.2015 4.6.2015 4.6.2015 4.6.2015 4.6.2015 4.6.2015 4.6.2015 5.6.2015 5.6.2015 5.6.2015 5.6.2015 6.6.2015 8.6.2015 9.6.2015 9.6.2015 9.6.2015 10.6.2015 10.6.2015 10.6.2015 10.6.2015 10.6.2015 10.6.2015 10.6.2015 11.6.2015 11.6.2015 11.6.2015 11.6.2015 11.6.2015 11.6.2015 12.6.2015 12.6.2015 13.6.2015 14.6.2015 14.6.2015 15.6.2015 15.6.2015 15.6.2015 15.6.2015

1.7.2015 1.7.2015 1.7.2015 2.7.2015 2.7.2015 2.7.2015 3.7.2015 4.7.2015 5.7.2015 5.7.2015 6.7.2015 7.7.2015 7.7.2015 7.7.2015 7.7.2015 8.7.2015 8.7.2015 8.7.2015 8.7.2015 8.7.2015 9.7.2015 9.7.2015 9.7.2015 9.7.2015 10.7.2015 10.7.2015 10.7.2015 10.7.2015 11.7.2015 11.7.2015 12.7.2015 12.7.2015 12.7.2015 12.7.2015 12.7.2015 13.7.2015 13.7.2015 13.7.2015 13.7.2015 13.7.2015 13.7.2015 13.7.2015 13.7.2015 14.7.2015

16.7.2015 16.7.2015 17.7.2015 17.7.2015 17.7.2015 17.7.2015 18.7.2015 18.7.2015 19.7.2015 19.7.2015 20.7.2015 21.7.2015 22.7.2015 23.7.2015 23.7.2015 24.7.2015 24.7.2015 24.7.2015 25.7.2015 25.7.2015 25.7.2015 26.7.2015 26.7.2015 29.7.2015 29.7.2015 30.7.2015 30.7.2015 30.7.2015 30.7.2015 31.7.2015

1.8.2015 1.8.2015 1.8.2015 1.8.2015

1.8.2015 1.8.2015 2.8.2015 2.8.2015 3.8.2015 3.8.2015 4.8.2015 4.8.2015 4.8.2015 4.8.2015 5.8.2015 5.8.2015 5.8.2015 6.8.2015 6.8.2015 6.8.2015 6.8.2015 6.8.2015 6.8.2015 7.8.2015 7.8.2015 7.8.2015 8.8.2015 8.8.2015 8.8.2015 8.8.2015 9.8.2015 10.8.2015 10.8.2015 10.8.2015 10.8.2015 10.8.2015 11.8.2015 12.8.2015 12.8.2015 12.8.2015 13.8.2015 13.8.2015 13.8.2015 14.8.2015 14.8.2015 14.8.2015 14.8.2015

15.8.2015 15.8.2015 15.8.2015 16.8.2015

17.8.2015 17.8.2015 18.8.2015 18.8.2015 18.8.2015 18.8.2015 19.8.2015 19.8.2015 19.8.2015 19.8.2015 20.8.2015 20.8.2015 20.8.2015 21.8.2015 21.8.2015 21.8.2015 21.8.2015 23.8.2015 23.8.2015 23.8.2015 25.8.2015 25.8.2015 25.8.2015 26.8.2015 27.8.2015 27.8.2015 27.8.2015 27.8.2015 27.8.2015 27.8.2015 28.8.2015 31.8.2015

1.9.2015 1.9.2015 1.9.2015 1.9.2015 2.9.2015 2.9.2015 2.9.2015 2.9.2015 2.9.2015 2.9.2015 3.9.2015 3.9.2015 3.9.2015 4.9.2015 4.9.2015 4.9.2015 4.9.2015 5.9.2015 5.9.2015 8.9.2015 9.9.2015 9.9.2015 9.9.2015 10.9.2015 10.9.2015 10.9.2015 10.9.2015 11.9.2015 11.9.2015 11.9.2015 11.9.2015 11.9.2015 13.9.2015 13.9.2015 13.9.2015 14.9.2015 15.9.2015 15.9.2015

16.9.2015 16.9.2015 16.9.2015 16.9.2015 17.9.2015 17.9.2015 17.9.2015 17.9.2015 17.9.2015 17.9.2015 17.9.2015 18.9.2015 18.9.2015 18.9.2015 18.9.2015 18.9.2015 18.9.2015 19.9.2015 21.9.2015 22.9.2015 22.9.2015 22.9.2015 23.9.2015 23.9.2015 24.9.2015 24.9.2015 24.9.2015 25.9.2015 25.9.2015 25.9.2015 25.9.2015 25.9.2015 26.9.2015 26.9.2015 27.9.2015 27.9.2015 27.9.2015 28.9.2015 28.9.2015 28.9.2015

29.9.2015 29.9.2015 29.9.2015 30.9.2015 30.9.2015 30.9.2015

1.10.2015 2.10.2015 2.10.2015 2.10.2015 2.10.2015 3.10.2015 3.10.2015 5.10.2015 6.10.2015 6.10.2015 6.10.2015 7.10.2015 7.10.2015 7.10.2015 8.10.2015 8.10.2015 9.10.2015 9.10.2015 9.10.2015 9.10.2015 9.10.2015 9.10.2015 9.10.2015 9.10.2015 9.10.2015 9.10.2015 9.10.2015 9.10.2015 10.10.2015 10.10.2015 10.10.2015 11.10.2015 12.10.2015 12.10.2015 12.10.2015 13.10.2015 13.10.2015 14.10.2015 14.10.2015 14.10.2015 14.10.2015 14.10.2015 14.10.2015 15.10.2015 15.10.2015 15.10.2015 15.10.2015 15.10.2015

16.10.2015 16.10.2015 18.10.2015 18.10.2015 19.10.2015 20.10.2015 20.10.2015 20.10.2015 21.10.2015 21.10.2015 21.10.2015 22.10.2015 22.10.2015 23.10.2015 23.10.2015 23.10.2015 23.10.2015 24.10.2015 24.10.2015 25.10.2015 25.10.2015 26.10.2015 26.10.2015 27.10.2015 28.10.2015 28.10.2015 28.10.2015 28.10.2015 29.10.2015 29.10.2015 29.10.2015 29.10.2015 30.10.2015 30.10.2015

30.10.2015 30.10.2015 31.10.2015 31.10.2015 31.10.2015 31.10.2015

1.11.2015 1.11.2015 1.11.2015 2.11.2015 3.11.2015 3.11.2015 3.11.2015 3.11.2015 4.11.2015 4.11.2015 4.11.2015 4.11.2015 4.11.2015 5.11.2015 5.11.2015 5.11.2015 5.11.2015

6.11.2015 6.11.2015 6.11.2015 6.11.2015 6.11.2015

8.11.2015 8.11.2015 8.11.2015 8.11.2015 9.11.2015 9.11.2015 10.11.2015 10.11.2015 10.11.2015 10.11.2015 10.11.2015 10.11.2015 10.11.2015 10.11.2015 10.11.2015 10.11.2015 11.11.2015 11.11.2015 11.11.2015 11.11.2015 11.11.2015 11.11.2015 12.11.2015 13.11.2015 14.11.2015 15.11.2015 15.11.2015

16.11.2015 17.11.2015

17.11.2015 17.11.2015 17.11.2015 17.11.2015 17.11.2015 18.11.2015 18.11.2015 18.11.2015 19.11.2015 20.11.2015 20.11.2015 21.11.2015 22.11.2015 22.11.2015 23.11.2015 23.11.2015 23.11.2015 23.11.2015 23.11.2015 23.11.2015 24.11.2015 24.11.2015 26.11.2015 26.11.2015 26.11.2015 27.11.2015 27.11.2015 27.11.2015 27.11.2015 27.11.2015 30.11.2015 30.11.2015 30.11.2015 30.11.2015

1.12.2015 1.12.2015 1.12.2015 1.12.2015 1.12.2015 2.12.2015 2.12.2015 2.12.2015 2.12.2015

3.12.2015 3.12.2015 3.12.2015 4.12.2015 4.12.2015 5.12.2015 6.12.2015 6.12.2015 7.12.2015

7.12.2015 7.12.2015 7.12.2015 7.12.2015 8.12.2015 8.12.2015 8.12.2015 8.12.2015 8.12.2015 8.12.2015 9.12.2015 9.12.2015 9.12.2015 9.12.2015 9.12.2015 9.12.2015 10.12.2015 10.12.2015 11.12.2015 11.12.2015 13.12.2015 14.12.2015 14.12.2015 14.12.2015 14.12.2015 14.12.2015 14.12.2015 14.12.2015 15.12.2015 15.12.2015

16.12.2015 16.12.2015 16.12.2015

17.12.2015 17.12.2015 17.12.2015 18.12.2015 18.12.2015 19.12.2015 19.12.2015 19.12.2015 20.12.2015 20.12.2015 21.12.2015 22.12.2015 23.12.2015 24.12.2015 24.12.2015 24.12.2015 24.12.2015 24.12.2015 24.12.2015 24.12.2015 25.12.2015 25.12.2015 25.12.2015 27.12.2015 27.12.2015 27.12.2015 28.12.2015 28.12.2015 28.12.2015 28.12.2015 29.12.2015 29.12.2015 30.12.2015 30.12.2015 31.12.2015 31.12.2015 31.12.2015 31.12.2015 Link http://venturebeat.com/2014/12/30/hackers-are-breaking-into-origin-and-making-fraudulent-purchases/ https://www.op.fi/op/op-pohjola-group/op-pohjola-group?cid=-66116&srcpl=4 http://www.independent.co.uk/life-style/gadgets-and-tech/gaming/xbox-one-leak-could-allow-people-to-make-their-own-games-for-the-console-9951531.html http://pastebin.com/Wp8xCir3 http://pastebin.com/SJc2xDr8 http://pastebin.com/CbJuyzua http://www.techworm.net/2015/01/snookis-instagram-account-hacked-by-arabic-speaking-.html http://www.connexionfrance.com/shoppers-data-hacked-tf1-magazine-subscription-website-16506-view-article.html http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/11321499/Bristol-bus-timetable-hacked-by-terrorists.html http://www.scmagazine.com/attempted-access-to-fast-forward-academy-systems-puts-data-at-risk/article/390923/ https://www.cyberguerrilla.org/blog/croatia-government-corruption-and--prosecutor-general-office-massive-hack-leak-symantec-hackers/ https://nakedsecurity.sophos.com/2015/01/06/mit-sites-defaced-in-lead-up-to-anniversary-of-aaron-swartzs-death/ https://twitter.com/ulzr1z/status/551210327459631104 http://hackread.com/united-nation-pakistan-website-hacked-free-syrian-/ http://www.straitstimes.com/news/singapore/more-singapore-stories/story/hospital-says--account-staff-anti-singaporean-co http://www.databreaches.net/universities-hacked-data-dumped-by-marxistattorney/ http://arstechnica.com/security/2015/01/bitcoin-exchange-bitstamp-claims-hack-siphoned-up-to-5-2-million/ http://www.zataz.com/10-millions-de-donnees-volees-a-orange-espagne/#axzz3NuauSVJs http://www.eastbourneherald.co.uk/news/local/security-breaches-over-christmas-on-police-s-website-1-6500878 http://www.scmagazine.com/pro-isis-group-hijacks-twitter-accounts-of-local-media-outlets/article/391900/ http://hackread.com/hackers-deface-two-more-ec-council-sub-domains/ http://www.itv.com/news/tyne-tees/2015-01-06/sowerby-school-website-hacked/ http://www.bloomberg.com/news/2015-01-09/hackers-demand-12-000-for-client-data-stolen-from-geneva-bank.html http://www.ibtimes.com/pro-russian-hacker-group-cyberberkut-claims-attack-german-government-websites-1775874 http://webcache.googleusercontent.com/search?q=cache:-pps3WwGyGIJ:pastebin.com/igrhVWss+&cd=1&hl=en&ct=clnk&gl=uk http://www.databreaches.net/hirsche-private-asset-emergency-announcement-regarding-breach-of-it-security-by-hacker-group/ http://www.databreaches.net/u-of-hawaii-and-cornell-university-hacked-by-marxistattorney/ http://arstechnica.com/security/2015/01/8chan-related-sites-go-down-in-lizard-squad-powered-ddos/ http://www.zdnet.com/article/malvertising-campaign-strikes-news-outlets-through-aol/ http://www.techworm.net/2015/01/extratorrent-down-hackers-launch-ddos-attack.html http://arstechnica.com/security/2015/01/surprise-north-koreas-official-news-site-delivers--too/ http://kotaku.com/kim-jong-un-video-game-hacked-creators-claim-1678859600 http://grahamcluley.com/2015/01/hacked-road-sign/ http://www.tripwire.com/state-of-security/off-topic/anonymous-attacks-jihadist-websites/ http://pastebin.com/Kf626EQj http://pastebin.com/PWx2rCM2 http://www.couriermail.com.au/news/queensland/bundaberg-library-website-hacked-by-people-claiming-to-be-from-free-syrian-people/story-fnn8dlfs-1227181518953?nk=6e492609ecada6b9cfe30ae627da5a85 http://www.bbc.co.uk/news/world-us-canada-30785232 http://www.nydailynews.com/news/national/thousands-american-united-airlines-accounts-hacked-article-1.2075162 https://nakedsecurity.sophos.com/2015/01/14/crayolas-facebook-page-hijacked-redrawn-in-nsfw-style/ http://news.softpedia.com/news/Notepad-plus-plus-Releases-Je-suis-Charlie-Edition-Website-Gets-Defaced-469956.shtml http://www.theregister.co.uk/2015/01/12/boomerang_security_breach_fears_credit_card_details/ http://pastebin.com/FdWHMA2U http://www.scmagazine.com/payment-cards-targeted-in-attack-on-pet-supplies-website/article/392821/ http://pastebin.ca/2906107 https://twitter.com/zyclonb4u/status/555202661331763200 https://twitter.com/zyclonb4u/status/555158182050680832 https://twitter.com/zyclonb4u/status/555178224050012161 http://www.net-security.org/secworld.php?id=17832 http://www.ibtimes.co.uk/politicians-military-personal-journalists-hacked-pirate-party-stunt-1483499 http://hackread.com/ohio-city-website-hacked-by-free-syrian-hacker/ http://www.metrostate.edu/qa.pdf http://arstechnica.com/security/2015/01/hack-on-ps-and-xbox-attackers-leaks-ddos-customers-plaintext-passwords/ http://news.softpedia.com/news/New-York-Post-UPI-Twitter-Accounts-Compromised-470320.shtml http://www.scmagazine.com/grill-parts-website-experiences-system-intrusion-payment-card-breach/article/394116/ http://www.hackread.com/pro-isis-group-hacked-isle-wight-virginia-website/ http://siph0n.net/exploits.php?id=3653 http://www.zdnet.com/article/microsoft-outlook-hacked-following-gmail-block-in-china/ http://pastebin.com/beMffePX http://siph0n.net/exploits.php?id=3654 http://www.zdnet.com/article/government-sites-hit-by-aussie-travel-cover-hacker/ http://www.stuff.co.nz/technology/digital-living/65198165/islamic-hackers-target-nz-websites http://www.bloomberg.com/news/articles/2015-01-25/hacker-steals-20-million-passwords-from-unidentified-dating-site http://www.reuters.com/article/2015/01/21/cybercrime-lemonde-idUSL4N0V01IW20150121 http://www.scmagazine.com/malware-found-on-pos-systems-at-four-wingstop-locations/article/393402/ http://www.bbc.co.uk/news/world-africa-30914000 http://www.zataz.com/modification-despaces-du-ministere-de-linterieur-et-de-la-defense/#axzz3QWpGPw00 http://www.databreaches.net/u-chicago-hacked-by-teamcarbonic-claim/ http://allafrica.com/stories/201501250109.html http://siph0n.net/exploits.php?id=3665 http://www.hackread.com/bitcoin-news-website-coinfire-website-twitter-hacked/ http://pastebin.com/ZGfRR7mL http://siph0n.net/exploits.php?id=3668 http://www.zdnet.com/article/lizard-squad-hit-malaysia-airlines-website/ http://pastebin.com/0ekAGZWs http://www.databreaches.net/ca-victor-valley-college-hit-by-computer-security-breach-entire-it-dept-put-on-leave/ http://www.databreaches.net/rex-mundi-dumps-more-data-after-another-entity-doesnt-pay-extortion-demands http://www.scmagazine.com/malware-infects-payment-card-system-at-french-lick-resort/article/395040/ http://www.zataz.com/le-twitter-christine-the-queens-pirate/#axzz3QWpGPw00 http://mashable.com/2015/01/27/taylor-swift-hack/ https://blog.malwarebytes.org/exploits-2/2015/01/top-adult-site-xhamster-involved-in-large-malvertising-campaign/ http://raptr.com/TinyDino/news/54c97a8f298193813f/raptr-announcement http://www.bbc.co.uk/news/world-africa-31019887 http://www.mirror.co.uk/news/technology-science/technology/lizard-squad-hackers-hacked—5067436 http://q13fox.com/2015/01/29/some-university-of-washington-websites-hacked-extremist-group-claims-responsibility/ http://siph0n.net/exploits.php?id=3670 http://www.zataz.com/plusieurs-centaines-de-sites-du-cnrs-et-des-restaurants-du-coeur-pirates/#axzz3QWpGPw00 http://www.novinite.com/articles/165828/Website+of+Bulgaria%27s+Energy+Watchdog+Hacked http://www.thirdsector.co.uk/womens-resource-centre-website-hacked-people-claiming-support-isis/communications/article/1331684 http://pastebin.com/KJ7JEpQS http://siph0n.net/exploits.php?id=3676 https://blog.hipchat.com/2015/02/01/hipchat-security-notice-and-password-reset/ http://webcache.googleusercontent.com/search?q=cache:Ob_i3m8d2fIJ:pastebin.com/ccvEBFzY+&cd=1&hl=en&ct=clnk&gl=uk http://krebsonsecurity.com/2015/02/banks-card-thieves-hit-white-lodging-again/ http://www.gmanetwork.com/news/story/422037/scitech/technology/hackers-deface-gov-t-websites-to-demand-justice-for-slain-saf-officers http://www.gmanetwork.com/news/story/421932/scitech/technology/hackers-demand-respect-justice-for-fallen-44-from-pnoy-via-journo-s-website http://arstechnica.com/information-technology/2015/02/syrian-rebels-lured-into-malware-honeypot-sites-through-sexy-online-chats/ http://krebsonsecurity.com/2015/02/target-hackers-hit-third-parking-service/ http://www.hackread.com/arizona-army-national-guard-website-hacked-3xp1r3-cyber-army/ http://www.hackread.com/stop-supporting-isis-anonymous-kurdistan-hacks-turkish-govt-sites/ http://azeri.meximas.com/am/photostock.am.php http://arstechnica.com/security/2015/02/spyware-aimed-at-western-governments-journalists-hits-ios-devices/ http://arstechnica.com/security/2015/02/string-of-big-data-breaches-continues-with-hack-on-health-insurer-anthem/ http://webcache.googleusercontent.com/search?q=cache:qnKLMfxtrlYJ:pastebin.com/TbKj9jHu+&cd=1&hl=en&ct=clnk&gl=uk http://www.channelnewsasia.com/news/singapore/nanyang-polytechnic/1648374.html http://news.softpedia.com/news/Website-of-European-Parliament-President-Hacked-472575.shtml http://www.therepublic.com/view/story/f947e092b9bc4cbe92cfacbe6aa8de61/MO–Gateway-Arch-Data-Breach http://www.databreaches.net/hirsche-private-asset-emergency-announcement-regarding-breach-of-it-security-by-hacker-group/ https://nakedsecurity.sophos.com/2015/02/09/chipotle-apologises-for-offensive-tweets-says-account-was-hacked/ http://www.techworm.net/2015/02/radhika-apte-leaked-selfie-hacked.html http://www.zdnet.com/article/anonymous-targets-isis-social-media-recruitment-drives-in-opisis-campaign/ http://news.softpedia.com/news/Brazilian-Boletos-Stolen-Through-DNS-Cache-Poisoning-472970.shtml http://www.invincea.com/2015/02/chinese-espionage-campaign-compromises-forbes/ http://www.zdnet.com/article/ddos-attack-leaves-dutch-websites-offline-for-hours/ https://nakedsecurity.sophos.com/2015/02/12/twitter-cfo-anthony-noto-has-account-hijacked/ http://krebsonsecurity.com/2015/02/defense-contract-management-agency-probes-hack/#more-29823 http://www.reuters.com/article/2015/02/10/us-cybersecurity-newsweek-idUSKBN0LE22Z20150210 http://www.reuters.com/article/2015/02/10/us-delta-air-lines-cybercrime-idUSKBN0LE2UT20150210 http://pastebin.com/YnR7GaWs http://www.databreaches.net/attempted-hack-of-jacksonville-aviation-authority-disclosed/ http://news.softpedia.com/news/Chinese-Cybercriminals-Hit-South-Korean-Mobile-Users-Hard-473007.shtml http://www.dailystar.com.lb/News/Middle-East/2015/Feb-12/287210-observatory-hacked-by-syrian-electronic-army.ashx http://www.databreaches.net/au-5000-university-of-sydney-students-notified-that-hack-exposed-their-details/ http://news.softpedia.com/news/DDoS-Launched-Against-Columbia-City-Website-473132.shtml http://www.net-security.org/secworld.php?id=17964 http://pastebin.com/Es7q2AX9 http://pastebin.com/SRLffY85 http://www.nytimes.com/2015/02/15/world/bank-hackers-steal-millions-via-malware.html?_r=1 http://www.hackread.com/standard-chartered-bank-hacked-money-stole-via-atms/ http://pastebin.com/AjwULdWB http://thenextweb.com/insider/2015/02/16/chinese-bitcoin-exchange-bter-hacked-1-75-million-worth-cryptocurrency-stolen/ https://www.hackread.com/uae-al-ittihad-newspaper-website-hacked-by-isis-hackers/ http://www.techworm.net/2015/02/everything-fair-love-hacking-twitter-account-nissan-say-love-just-much.html http://www.tripwire.com/state-of-security/latest-security-news/haskell-confirms-security-breach-in-debian-builds/ http://pastebin.com/L3iepYp7 http://www.kaspersky.com/about/news/virus/2015/equation-group-the-crown-creator-of-cyber-espionage http://www.forbes.com/sites/thomasbrewster/2015/02/16/nsa-equation-cyber-tool-treasure-chest/ https://nakedsecurity.sophos.com/2015/02/17/lizard-squad-returns-claims-attack-on-xbox-live-and-daybreak-games/ http://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/operation-arid-viper-bypassing-the-iron-dome https://twitter.com/gren_siahaan/status/567561518867574785 http://pastebin.com/W0AFixVw https://www.hackread.com/opsaudi-hackers-shutdown-saudi-bank-site/ http://www.hackread.com/pro-isis-group-hacked-isle-wight-virginia-website/ http://www.hackread.com/wwe-superstar-cesaros-twitter-account-hacked/ http://www.scmagazine.com/bulk-reef-supply-website-compromised-credit-cards-at-risk/article/400727/ https://blog.malwarebytes.org/exploits-2/2015/02/celebrity-chef-jamie-olivers-website-hacked-redirects-to-exploit-kit/ http://www.net-security.org/secworld.php?id=17962 http://www.infosecurity-magazine.com/news/redtube-porn-site-to-serve-malware/ http://grahamcluley.com/2015/02/bitcoin-exchange-shuts-down/ http://www.tmz.com/2015/02/21/kris-jenner-nude-video-stolen-icloud-hacked-phone/ http://pastebin.com/i6JQX5QJ https://twitter.com/data_siph0n/status/569287862195265536 http://www.ibtimes.co.uk/google-vietnam-domain-name-briefly-hacked-hijacked-by-lizard-squad-1489293 http://threatpost.com/komodia-website-under-ddos-attack/111195 https://www.hackread.com/isis-supporters-hack-chiles-ministry-defense-website/ https://www.hackread.com/opsaudi-hackers-shutdown-saudi-arab-national-bank-website/ http://www.dnainfo.com/new-york/20150225/civic-center/email-hacking-attack-hits-city-government http://www.dnainfo.com/new-york/20150226/civic-center/hack-attack-that-hit-city--may-have-come-from-russia-sources http://www.scmagazine.com/malware-on-lime-crime-website-payment-cards-compromised/article/400192/ http://thehill.com/policy/cybersecurity/233641-prominent-dc-think-tank-hacked https://mega.nz/#F!aZohDAZY!6qXfu2r474LWqSymo_LsaQ http://pastebin.com/mWNSa1mt http://nypost.com/2015/02/27/cyber-hacking-si-student-changed-grades-from-his-smartphone-cops/ http://www.techworm.net/2015/02/rapper-griminals-twitter-hacked-hackers-post-suicidal-tweets.html http://krebsonsecurity.com/2015/02/webnic-registrar-blamed-for-hijack-of-lenovo-google-domains/ http://arstechnica.com/security/2015/02/attackers-take-control-of-lenovo-com-hijacking-e-mail-and-web-servers/ http://webcache.googleusercontent.com/search?q=cache:OUWrRVCdO40J:pastebin.com/bypLKQRi+&cd=1&hl=en&ct=clnk&gl=uk http://thehill.com/policy/cybersecurity/233825-national-archives-hit-with-data-breach http://pastebin.com/L5YZ6py1 http://www.theregister.co.uk/2015/02/27/talktalk_admits_massive_data_breach/ http://cyberwarzone.com/asml-hack-global-chip-machine-producer-in-the-netherlands-and-france-has-been-hacked/ http://www.zdnet.com/article/uber-admits-database-breach-putting-driver-data-at-risk/ http://www.cyber-berkut.org/en/ http://cyberwarzone.com/anonymous-hacked-lisbon-university-published-the-passwords/ http://pastebin.com/zuiNjfL8 http://networksecurityreport.siteblogs.net/2015/02/28/play-com-compromised-and-security-breach-admitted/ http://siph0n.net/exploits.php?id=3729 http://www.scmagazine.com/attacks-attempt-to-access-rewardsrus-accounts/article/401160/ http://news.softpedia.com/news/Rogers-Communications-Hacked-Using-Simple-Social-Engineering-474675.shtml http://pastebin.com/ZjYLwYUZ https://krebsonsecurity.com/2015/03/natural-grocers-investigating-card-breach/ http://siph0n.net/exploits.php?id=3731 https://www.hackread.com/larimer-county-sheriffs-office-website-hacked-by-pro-palestinian-hackers/ http://www.techworm.net/2015/03/vigilante-justice-wrong-hacker-mistakenly-hacks-city-police-websites-two-years-after-cop-jailed.html http://krebsonsecurity.com/2015/03/credit-card-breach-at-mandarian-oriental/ http://news.softpedia.com/news/Website-for-Religious-Classes-Tainted-with-Malvertising-474789.shtml http://news.softpedia.com/news/Russian-Orthodox-Search-Engine-Knocked-Offline-Hours-after-Launch-474945.shtml https://www.hackread.com/larimer-county-sheriffs-office-hacked-again/ http://pastebin.com/2Z61PsCa http://pastebin.com/0acgrsqG https://www.hackread.com/anti-israeli-hackers-target-police-jury-bank-websites/ http://www.welivesecurity.com/2015/03/09/femsplain-ddos-attack/ https://krebsonsecurity.com/2015/03/point-of-sale-vendor-nextep-probes-breach/ http://www.bbc.co.uk/newsbeat/31798990 http://securityaffairs.co/wordpress/34637/hacking/fbi-investigating-alleged-isis-attacks.html http://news.softpedia.com/news/San-Francisco-Bistro-Burger-Compromised-Financial-Info-Exposed-for-Two-Months-475430.shtml http://pastebin.com/GsHk4M1V http://www.techworm.net/2015/03/anonymous-take-down-madison-police-department-website-over-tony-robinson-jr-shooting.html http://www.securityweek.com/mybb-says-hacker-didnt-access-user-data-source-code http://pastebin.com/NP3JZNAi http://www.databreaches.net/university-of-racism-hacked-will-others-go-after-u-of-oklahoma-student-records/ https://www.hackread.com/redhack-hacks-istanbul-police-assoc-website-berkin-elvan/ http://www.infosecurity-magazine.com/news/proisis-facebook-site-taken-offline/ http://www.databreaches.net/university-of-racism-hacked-will-others-go-after-u-of-oklahoma-student-records/ http://arstechnica.com/security/2015/03/mysterious-snafu-hijacks-uk-nukes-makers-traffic-through-ukraine/ http://news.softpedia.com/news/Financial-Malware-Infects-Aurora-Health-Care-Workstations-475771.shtml http://www.bbc.com/news/technology-31869595 http://www.zataz.com/les-pirates-de-rex-mundi-sattaquent-a-un-laboratoire-danalyse-de-sang-francais/#axzz3UX2dr6Zt http://www.insidehalton.com/news-story/5476951-thousands-of-email-addresses-leaked-from-government-website/ http://www.cnet.com/news/state-department-takes-network-offline-for-security-scrub/ http://tuoitrenews.vn/business/26762/vietnamese-hackers-allegedly-steal-50000-accounts-from-local-telecom-giant http://www.pnj.com/story/news/2015/03/16/sacred-heart-health-system-billing-information-hacked/24859975/ http://www.databreaches.net/bitcoin-baron-tells-moore-oklahoma-thanks-for-letting-me-into-your-system-now-pay-me/ https://www.allcrypt.com/blog/2015/03/what-happened-and-whats-going-on/ http://www.scmagazine.com/sacred-heart-health-system-notifies-14k-patients-of-breach/article/404377/ http://www.databreaches.net/computer-hack-in-kazakhstan-exposes-client-emails-with-curtis/ http://www.databreaches.net/websitepipeline-notifying-clients-of-breach/ http://www.reuters.com/article/2015/03/17/us-cyberattack-premera-idUSKBN0MD2FF20150317 http://arstechnica.com/security/2015/03/south-korea-claims-north-hacked-nuclear-data/ http://www.scmagazine.com/more-than-150k-patients-impacted-in-advantage-dental-breach/article/403888/ http://pastebin.com/sa1WMcfN http://blog.trendmicro.com/trendlabs-security-intelligence/operation-woolen-goldfish-when-kittens-go-/ http://www.theregister.co.uk/2015/03/20/hacker_british_judo_cyber_defences_oh_shido/ http://www.databreaches.net/au-fit-college-hacked-because-they-need-better-security/ http://www.databreaches.net/credit-card-data-breach-at-lax/ http://www.theregister.co.uk/2015/03/20/greatfire_chinese_activists_under_ddos/ http://www.scmagazine.com/st-marys-health-breach-affects-thousands/article/404720/ http://pastebin.com/Qy3Mzfp2 https://www.hackread.com/pro-isis-hackers-hacks-richland-county-sheriffs-dept-website/ http://pastebin.com/mL7pdLv6 http://pastebin.com/3W6a7WZz http://www.nydailynews.com/new-york/nypd-union-site-hit-hackers-article-1.2159071 http://arstechnica.com/gaming/2015/03/malicious-user-hides-trojan-links-in-cloned-steam-greenlight-pages/ http://arstechnica.com/security/2015/03/twitch-resets-user-passwords-following-breach/ http://www.pressherald.com/2015/03/24/maine-gov-website-down-for-second-day/ http://www.ddosattacks.net/maine-nh-websites-taken-down-by-spam-ddos-attack/ http://www.gmanetwork.com/news/story/457189/scitech/technology/pnp-website-defaced-by-pro-palestine-hackers http://krebsonsecurity.com/2015/03/kreditech-investigates-insider-breach/#more-30264 http://www.databreaches.net/oregon-agency-hacked-governor-calls-for-study-changes/ http://news.softpedia.com/news/Cyber-Caliphate-Hackers-Deface-600-Russian--Resources-476718.shtml https://blog.malwarebytes.org/exploits-2/2015/03/adult-site-xtube-serves-malware-via-neutrino-ek/ http://www.mirror.co.uk/news/uk-news/hackers-break-schools-twitter-feed-5395784 http://arstechnica.com/security/2015/03/github-battles-largest-ddos-in-sites-history-targeted-at-anti-censorship-tools/ http://arstechnica.com/security/2015/04/ddos-attacks-that-crippled-github-linked-to-great-firewall-of-china/ http://www.zdnet.com/article/bitcoin-exchange-cryptoine-hacked/ http://yle.fi/uutiset/police_website_target_of_repeated_denial_of_service_attacks/7891226 http://pastebin/7bnCqQ1p http://www.wired.com/2015/03/slack-admits-hacked-enables-2-factor-authentication/ http://www.scmagazine.com/nite-ize-website-attack-impacts-credit-cards-possibly-customer-database/article/406835/ http://news.softpedia.com/news/Multiplay-Servers-Breached-Users-Asked-to-Change-Password-477078.shtml http://www.databreaches.net/direct-marketing-association-data-breach/ https://www.hackread.com/hackers-knockdown-indiana-state-website-against-anti-lgbt-religious-freedom-law/ http://www.channelstv.com/2015/03/28/inec-restores-hacked-website/ http://pastebin.com/7wgN3J3G http://pastebin.com/J1VfT3kT http://www.theguardian.com/business/2015/mar/29/british-airways-frequent-flyer-accounts-hacked http://www.scmagazine.com/cyber-attack-on-puush-prompts-password-changes/article/406201/ http://www.ibtimes.co.uk/syrian-electronic-army-hacks-hosting-services-supporting-terrorist-websites-1494393 http://www.ibtimes.co.uk/air-france-website-hacked-by-algerian-mujahideen-1494085 http://pastebin.com/v5WEi2BJ http://fortune.com/2015/03/31/spies-malware-energy-email/ http://bradley.edu/databreach/ https://www.hackread.com/u-s-army-picatinny-arsenal-website-hacked-by-saudi-hackers/ http://blog.checkpoint.com/2015/03/31/volatilecedar/ http://pastebin/cNrvnYD6 http://www.business-standard.com/article/pti-stories/pcda-o-website-hacked-personal-details-feared-compromised-115040801249_1.html http://pastebin.com/vngXKQF2 http://securityintelligence.com/dyre-wolf/#.VSluChfSiDq http://www.frontpagemag.com/2015/frontpagemag-com/the-cyber-attack-on-frontpage/ http://www.scmagazine.com/biggby-coffee-announces-website-intrusion-access-gained-to-database/article/408510/ https://www.hackread.com/anonymous-philippines-hacks-chinese-govt-websites-over-territorial-disputes/ http://lists.linux.org.au/pipermail/linux-aus/2015-April/022049.html http://news.softpedia.com/news/SRI-Inc-s-Website-Hacked-Tax-IDs-and-SSNs-Exposed-477605.shtml http://missoulian.com/news/local/hackers-accessed-patients-credit-card-information-western-montana-clinic-says/article_a2410583-b3bd-5cf8-afcb-8d65828fc2c0.html http://pastebin.com/AExE3A7g https://www.hackread.com/anonymous-exposes-list-of-sites-supporting-isis-and-hosting-companies-protecting-them/ https://www.hackread.com/indonesian-hackers-deface-subdomain-of-united-nations-website/ http://www.databreaches.net/wellesley-college-data-dumped-server-vulnerable-to-sqli/ http://news.softpedia.com/news/Anonymous-Dumps-Email-Facebook-Accounts-and-Card-Data-of-Israelis-477710.shtml http://news.softpedia.com/news/Anonymous-Dumps-Email-Facebook-Accounts-and-Card-Data-of-Israelis-477710.shtml http://news.softpedia.com/news/AnonGhost-Hackers-Donate-Israeli-Money-to-Palestinian-Charities-478250.shtml http://www.databreaches.net/northwestern-u-hacked-but-no-personal-info-on-server/ http://www.hotforsecurity.com/blog/uk-government-website-hijacked-by-islamist-hackers-11676.html https://www.hackread.com/opisrael-700-sites-hacked-thousands-of-social-media-paypal-crenential-leaked/ http://edition.cnn.com/2015/04/07/politics/how-russians-hacked-the-wh/index.html http://arstechnica.com/security/2015/04/french-tv-network-blames-an-islamist-group-for-11-station-blackout/ http://www.welivesecurity.com/2015/04/08/kendall-jenner-twitter-hacked/ http://difusionlibre.com/anonymous-cuba/anonymous-cuba-hacks-over-a-dozen-travel-agencies-in-oppigsinblankets#axzz3XkItIBlZ https://www.hackread.com/operationchina-anonymous-hacks-chinese-police-govt/ http://pastebin.com/UcAHrKn6 http://www.reuters.com/article/2015/04/10/germany-cybersecurity-lufthansa-idUSL5N0X724G20150410 http://www.scmagazine.com/operation-buhtrap-campaign-targets-russian-organizations/article/408523/ https://www.hackread.com/opisrael-anonymous-hacks-israeli-gun-shop-site/ http://www.rferl.org/content/turkmen-embassy-in-minsk-hacked/26947114.html http://www.databreaches.net/walters-mccann-fanska-notifies-clients-of-network-security-breach/ https://www.hackread.com/anonymous-shuts-down-montreal-police-website/ http://pastebin.com/1kvj9h3k http://pastebin.com/pZ9t468L http://pastebin.com/rPitQf9z http://www.scmagazine.com/ddos-attack-on-belgian-media-group-lasts-hours/article/408998/ http://www.zdnet.com/article/hobart-airport-website-down-after-pro-is-hack/ https://www.hackread.com/irani-state-tv-social-media-hacked-saudi-hackers/ http://krebsonsecurity.com/2015/04/white-lodging-confirms-second-breach/ https://grahamcluley.com/2015/04/the-kelly-brook-nude-photos-hack-part-94/ http://www.scmagazine.com/california-based-home-care-services-co-notifies-employees-of-data-breach-tax-fraud/article/409006/ http://pastebin.com/eKHDGgE6 http://www.zdnet.com/article/fireeye-claims-discovery-of-10-year-hack-campaign-by-china/ http://www.thelocal.fr/20150415/french-state-tv-hit-by-massive-hacker-heist https://www.hackread.com/toronto-university-website-hacked-isis-hackers/ https://www.hackread.com/bangladesh-hacked-google-images-yahoo-malaysia/ https://www.hackread.com/hackers-shut-down-vatican-city-website/ http://www.bbc.com/news/technology-32301117 http://focustaiwan.tw/news/aipl/201504140024.aspx http://www.pokernewsdaily.com/ddos-attacks-plague-online-poker-once-again-26945/ https://www.hackread.com/pro-israeli-jewish-press-website-hacked/ http://arstechnica.com/security/2015/04/elite-cyber-crime-group-strikes-back-after-attack-by-rival-apt-gang/ http://pastebin/G59j3wLs http://pastebin.com/i4BLTKeP http://www.reuters.com/article/2015/04/18/us-cyberattack-israel-idUSKBN0N81KY20150418 http://www.zdnet.com/article/russian-hackers-exploit-flash-windows-flaws-to-spy-on-diplomat-targets/ https://www.hackread.com/anonymous-hacks-animal-abuse-websites/ http://pastebin.com/GtfTAEv4 https://securelist.com/blog/research/69731/the-cozyduke-apt/ https://www.hackread.com/anonymous-hacks-israel-arms-website-data-leak/ http://www.databreaches.net/ca-detour-gold-corporation-hacked/ http://www.csoonline.com/article/2912891/data-breach/hyatt-resets-gold-passport-account-passwords-after-security-incident.html http://minnesota.cbslocal.com/2015/04/22/officials-mca-testing-suspended-due-to-cyber-attack/ http://www.ibtimes.co.uk/gta-5-accounts-not-hacked-says-rockstar-despite-reports-thousands-players-1497912 http://www.bloomberg.com/news/articles/2015-04-25/tesla-hacked-on-twitter-media-relations-e-mail-accounts http://news.softpedia.com/news/Privacy-Centric-Email-Service-SIGAINT-in--Targeted-by-70-Bad-Exit-Relays-479227.shtml http://patch.com/massachusetts/wilmington/developing-wilmington-schools-website-possibly-hacked-terrorist-group-0 https://www.hackread.com/armenia-turkish-hackers-cyberwar/ http://news.softpedia.com/news/My-Freedom-Smokes-Website-Burnt-By-Malware-479314.shtml https://www.hackread.com/anonymous-cyber-attack-x-rated-animal-abuse-forum/ http://www.databreaches.net/oh-those-old-files-left-lying-around-on-your-server-saturday-edition/ http://www.nytimes.com/2015/04/26/us/russian-hackers-read-obamas-unclassified-emails-officials-say.html https://www.hackread.com/indonesian-hackers-hack-mastercard-website/ http://www.cambridge-news.co.uk/Hacked-Tesco-Costa-Coffee-cards-breached/story-26392209-detail/story.html http://pastebin.com/bwbcicbk http://www.zdnet.com/article/sendgrid-confirms-hack-says-usernames-and-passwords-were-hashed/ https://blog.malwarebytes.org/malvertising-2/2015/04/malvertising-strikes-adult-site-xhamster-again/ http://www.scmagazine.com/about-25k-people-impacted-in-saint-agnes-health-care-breach/article/411636/ http://www.theregister.co.uk/2015/04/27/indian_gov_dumps_net_neutrality_campaigners_details_online/ http://pastebin.com/aT2QEieR http://www.nj.com/middlesex/index.ssf/2015/04/cyber_attack_against_rutgers_causes_internet_servi.html http://www.independent.ie/business/irish/ryanair-hit-for-millions-of-euro-in-international-chinese-banking-scam-31180849.html http://www.databreaches.net/uc-berkeley-announces-another-data-breach/ http://krebsonsecurity.com/2015/05/harbortouch-is-latest-pos-vendor-breach/ http://www.scmagazine.com/texas-based-seton-family-of-hospitals-notifies-39k-patients-of-breach/article/412138/ http://abcnews.go.com/Technology/wireStory/partners-healthcare-notifies-3300-patients-email-breach-30716877 https://www.hackread.com/palestinian-hacks-indian-portal-rediff/ https://www.proofpoint.com/threat-insight/post/Foot-in-the-Door http://www.adn.com/article/20150506/38m-alaska-native-corp-money-sent-offshore-account-cyberfraud-attack http://www.net-security.org/secworld.php?id=18342 http://news.softpedia.com/news/Hacker-Hits-World-Trade-Organization-Leaks-Personal-Details-480166.shtml http://news.softpedia.com/news/Compromised-PoS-Systems-at-Compass-Group-Expose-Payment-Info-479842.shtml http://pastebin.com/CriVaiJL http://www.lastampa.it/2015/05/01/societa/expo2015/speciale/attacco-hacker-di-anonymous-al-sito-di-expo-qvoywnauKjRqpBwrO0um9J/pagina.html http://siph0n.net/exploits.php?id=3824 https://www.secureworldexpo.com/anonghost-hacking-group-hits-govguam-websites http://news.softpedia.com/news/Hackers-Leak-Baltimore-Police-Data-480036.shtml https://www.hackread.com/pro-palestinian-hackers-red-bull-malaysia-website/ http://www.infosecurity-magazine.com/news/russian-spies-target-ukraine/ http://www.businesswire.com/news/home/20150504005672/en/Sally-Beauty-Holdings-Statement#.VVbdnxeaTLA http://www.theregister.co.uk/2015/05/04/hard_rock_breach/ https://blog.malwarebytes.org/exploits-2/2015/05/fiesta-ek-wreaks-havoc-on-popular-torrent-site/ http://news.softpedia.com/news/Hackers-Leak-Passwords-for-Baltimore-Police-Emails-480182.shtml https://www.whaxy.com/news/smoke-weed-everyday-sign http://www.scmagazine.com/retail-capital-notifies-hundreds-following-security-incident/article/413042/ http://www.ibtimes.com/anonymous-opgreenrights-hack-team-knocked-nuclear-corporation-areva-offline-leaked-1909527 http://pastebin.com/qi9H3vy1 http://firekeeperscasino.com/data-sec http://pastebin.com/auhZuhQb https://www.hackread.com/brazilian-mma-ufc-fighter-vitor-belforts-website-hacked/ https://blog.malwarebytes.org/malvertising-2/2015/05/malvertising-strikes-on-dozens-of-top-adult-sites/ http://blog.trendmicro.com/trendlabs-security-intelligence/ad-network-compromised-users-victimized-by-nuclear-exploit-kit/ https://www.hackread.com/saudi-hackers-iran-defense-ministry-website/ http://www.mirror.co.uk/news/uk-news/david-camerons-wikipedia-page-hacked-5653877 http://www.databreaches.net/intercontinental-hotel-groups-alerted-by-secret-service-to-breach/ http://www.hotnewhiphop.com/ilovemakonnens-twitter-hacked-drake-and-rihanna-dissed-news.15287.html?image=1&gallery=0 http://www.welivesecurity.com/2015/03/09/femsplain-ddos-attack/ http://www.harrogateadvertiser.co.uk/news/crime/thousands-of-customers-details-accessed-following-bettys-data-breach-1-7266657 http://pastebin.com/6f74diGE https://bobsullivan.net/cybercrime/identity-theft/exclusive-hackers-target-starbucks-mobile-users-steal-from-linked-credit-cards-without-knowing-account-number/# https://www.hackread.com/kenya-president-website-hacked-indonesia-crew/ http://news.softpedia.com/news/Hacktivists-Bring-Down-Brazilian-Government-Sites-in-OpGreenRights-480821.shtml https://twitter.com/gren_siahaan/status/597707545285767170 http://pastebin/sBzUJwjc http://pastebin.com/qYpd2Ec4 http://pastebin/QsfF4cGW http://news.asiaone.com/news/singapore/govts-it-networks-beefed-after-attack http://democratherald.com/news/local/hacker-steals-from-company/article_1766668e-59dc-5169-a1cf-62384d720d3b.html http://pastebin.com/H0XWm1VB https://blog.malwarebytes.org/exploits-2/2015/05/jamie-olivers-website-hacked-again-drops-password-stealer/ http://www.scmagazine.com/cycyberespionage-group-apt28-expands-sights-beyond-govt-military-orgs/article/414586/ http://abcnews.go.com/US/wireStory/minnesota-school-testing-interrupted-hacking-31025798 http://www.washingtonpost.com/blogs/the-switch/wp/2015/05/14/the-syrian-electronic-army-just-hacked-the-washington-post-again/ http://www.v3.co.uk/v3-uk/news/2408533/apt17-deputydog-hackers-are-pushing-blackcoffee-malware-using-technet http://www.infosecurity-magazine.com/news/naikon-apt-stealing-state-secrets/ http://krebsonsecurity.com/2015/05/mobile-spy-software-maker-mspy-hacked-customer-data-leaked/ http://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/operation-tropic-trooper-infiltrates-secret-keepers http://motherboard.vice.com/read/someone-hacked-a-billboard-in-atlanta-to-display-goatse http://arstechnica.com/security/2015/05/penn-state-severs-engineering-network-after-incredibly-serious-intrusion/ http://www.thelocal.de/20150515/hacker-attack-targets-bundestag-data http://pastebin.com/ek1fXHPp https://www.hackread.com/anonymous-hacks-chile-government/ http://www.theregister.co.uk/2015/05/20/car_park_vehicle_locks_hacked_en_masse/ https://www.stlouisfed.org/news-releases/2015/05/18/password-reset-for-st-louis-fed-research-website-user-accounts https://www.hackread.com/wayne-county-sheriffs-dept-website-defaced/ http://www.scmagazine.com/three-metrohealth-computers-infected-with-malware-patients-notified/article/415322/ http://www.nzherald.co.nz/nz/news/article.cfm?c_id=1&objectid=11450531 http://www.lastampa.it/2015/05/19/italia/cronache/anonymous-colpisce-il-ministero-della-difesa-qlFNgswyvu20wnQiNYK1kL/pagina.html http://www.philly.com/philly/blogs/heardinthehall/City-Council-website-hacked.html http://www.telstra.com.au/aboutus/media/media-releases/pacnet-it-security-breach.xml http://www.theregister.co.uk/2015/05/22/university_of_london_ddos_attack/ http://www.theguardian.com/lifeandstyle/2015/may/21/adult-friendfinder-dating-site-hackers-expose-users-millions http://news.softpedia.com/news/Safe-and-Vault-Store-Suffers-Cyber-Security-Breach-482622.shtml http://news.softpedia.com/news/Domain-Registrar-eNom-Informs-of-DNS-Hijack-Attack-481867.shtml http://www.forbes.com/sites/katevinton/2015/05/20/data-belonging-to-1-1-million-carefirst-customers-stolen-in-cyber-attack/ https://www.hackread.com/saudi-ministry-of-foreign-affairs-hacked/ https://www.bitfinex.com/pages/announcements/?id=35 http://www.scmagazine.com/beacon-health-system-notifies-patients-of-possible-data-compromise/article/416853/ http://pix11.com/2015/05/22/isis-hackers-take-over-local-healthcare-website-company-tries-to-assure-patients-their-info-is-safe/ http://pastebin.com/0Tmy0hm1 http://siph0n.net/exploits.php?id=3859 http://news.softpedia.com/news/Hacktivists-Deface-Republican-Party-of-Kentucky-s-Website-482491.shtml http://cyberwarzone.com/hackers-steal-80000-euro-from-belgium-metal-company/ https://www.hackread.com/anonymous-breaches-thailand-senate-website/ https://www.hackread.com/nepali-embassy-usa-website-hacked/ https://www.hackread.com/anti-assad-hacker-hacks-uzbek-embassy/ http://www.databreaches.net/minecraft-pocket-edition-forum-hacked-dumped/ http://news.softpedia.com/news/Cyber-Attack-on-IDA-Server-Prompts-License-Key-Replacement-482331.shtml http://www.wrestlinginc.com/wi/news/2015/0525/595627/chris-jericho-twitter-account-hacked/ http://bigstory.ap.org/article/34539a748b3745ffb92451472f814ffa/apnewsbreak-irs-says-thieves-stole-tax-info-100000 http://siph0n.net/exploits.php?id=3863 http://www.tripwire.com/state-of-security/latest-security-news/hackers-steal-over-a-million-japanese-citizens-personal-data-in-targeted-attack/ http://thenextweb.com/insider/2015/05/28/indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed/ http://news.softpedia.com/news/Copart-com-Breached-Driver-s-License-Numbers-Exposed-482625.shtml http://pastebin.com/25F7c8ir http://www.wantchinatimes.com/news-subclass-cnt.aspx?id=20150530000115&cid=1103&MainCatID=0 http://www.databreaches.net/nj-hackers-steal-240k-from-mahwah-businessmans-bank-account/ http://www.scmagazine.com/unauthorized-access-gained-to-heartland-dental-databases/article/421161/ http://www.scmagazine.com/personal-health-information-compromised-in-mie-breach/article/421033/ http://www.scmagazine.com/aerogrow-says-malware-likely-compromised-payment-card-data/article/419227/ http://www.scmagazine.com/payment-card-breach-at-holiday-valley-resort/article/420490/ https://www.hackread.com/anonghost-palestine-hackers-sheriff-website/ http://www.theguardian.com/technology/2015/jun/04/hackers-extorted-multinational-firm-in-australia-and-threatened-employee http://arstechnica.com/tech-policy/2015/06/hack-of-opm-reportedly-exposed-second-set-of-much-more-sensitive-data/ http://arstechnica.com/security/2015/06/epic-fail-how-opm-hackers-tapped-the-mother-lode-of-espionage-data/ http://www.scmp.com/tech/enterprises/article/1816327/chinas-state-media-hacked-possibly-failed-blackmail-attempt http://pastebin.com/03nLK4uE http://www.databreaches.net/bae-systems-first-notifying-employees-of-extranet-site-network-attack-in-2014/ http://www.scmagazine.com/lingerie-sellers-ecommerce-server-compromised-credit-cards-at-risk/article/421523/ http://www.scmagazine.com/mario-batalis-eately-compromised-in-cyber-attack/article/419082/ http://www.theregister.co.uk/2015/06/05/brabantia_breached_bins_hack_address/ http://www.prnewswire.com/news-releases/saint-francis-hospital-gift-shop-acts-to-block-payment-card-security-incident-300095082.html https://www.zoho.com/docs/login.html#serviceurl=%2Ffile%2Fc1hl27f50f8455488443db995b14bedef5184 http://www.zdnet.com/article/iinet-investigates-alleged-westnet-data-breach/ http://arstechnica.com/security/2015/06/us-army-website-defaced-by-syrian-electronic-army/ http://indianexpress.com/article/technology/social/group-claims-to-hack-olacabs-company-says-no-security-lapse/ http://www.theregister.co.uk/2015/06/09/freeparking_hit_by_ddos_attack/ http://www.laweekly.com/news/la-traffic-sign-is-hacked-to-say-read-a-f-ing-book-photos-5331670 https://blog.kaspersky.co.uk/kaspersky-statement--attack/ http://www.scmagazineuk.com/japanese-oil-association-hit-by-cyber-attack/article/419797/ http://www.securityweek.com/massive-malvertising-campaign-hits-users-angler-exploit-kit http://krebsonsecurity.com/2015/06/breach-at-winery-card-processor-missing-link/#more-31218 http://www.scmagazine.com/north-dakota-wsi-experiences-breach-thousands-at-risk/article/421053/ http://www.azcentral.com/story/news/arizona/politics/2015/06/10/arizona-agency-website-hacked/71007982/ https://www.hackread.com/us-air-force-hacked-website-hacked/ https://www.alienvault.com/open-threat-exchange/blog/watering-holes-exploiting-jsonp-hijacking-to-track-users-in-china http://news.softpedia.com/news/Telecoms-Targeted-by-Second-Generation-Duqu-Espionage-Platform-483991.shtml http://motherboard.vice.com/read/hacker-dumps-up-to-23000-government-emails-on-the-dark-web http://krebsonsecurity.com/2015/06/opms-database-for-sale-nope-it-came-from-another-us-gov/ https://ghostbin.com/paste/kytca http://www.onoria.it/archives/2905 http://krebsonsecurity.com/2015/06/discount-chain-freds-inc-probes-card-breach/ http://securityaffairs.co/wordpress/37745/cyber-crime/agora-users-hacked.html http://www.arabianbusiness.com/bahrain-human-rights-watchdog-says-victim-of-hacking-596242.html http://www.timesofisrael.com/iran-spied-on-israel-saudi-arabia-with-major-cyberattack/ http://www.techworm.net/2015/06/taft-hill-electronic-billboard-hacked-to-display-nsfw-messages.html http://www.forbes.com/sites/katevinton/2015/06/15/password-manager-lastpass-hacked-exposing-encrypted-master-passwords/?ss=Security http://www.forbes.com/sites/thomasbrewster/2015/06/15/uber-petition-defaced/?ss=Security https://pastebin.com/LiXfLXki https://securelist.com/blog/research/70641/the-duqu-2-0-persistence-module/ http://krebsonsecurity.com/2015/07/banks-card-breach-at-trump-hotel-properties/ http://www.databreaches.net/charitable-car-donors-learn-their-personal-information-was-hacked/ http://www.courthousenews.com/2015/07/01/major-workers-comp-insurers-hacked-legal-files-class-claims.htm http://lifehacker.com/plex-hacked-change-your-password-now-1715355825 https://www.hackread.com/armenian-azerbaijani-cyberwar/ https://www.hackread.com/anonymous-breaches-canadian-government-servers/ http://betanews.com/2015/07/04/bsnl-india-hacked-anonymous/ http://abcnews.go.com/US/wireStory/hacker-attacks-gambling-websites-demands-bitcoin-ransom-32279133 http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html https://www.hackread.com/gambling-site-hacked-bitcoin-stolen/ http://www.kashmirtimes.com/newsdet.aspx?q=42783 http://www.bbc.co.uk/news/uk-scotland-edinburgh-east-fife-33425853 https://www.hackread.com/pizza-hut-israel-website-hacked/ http://siph0n.in/exploits.php?id=3901 http://www.dn.se/ekonomi/hemmakvall-hackat-50000-kunders-uppgifter-pa-vift/ http://www.zdnet.com/article/the-group-that-attacked-apple-twitter-and-facebook-is-still-going/ http://www.scmagazine.com/evans-hotels-announces-payment-card-incident-involving-malware/article/425744/ http://news.yahoo.com/islamic-state-supporters-hack-website-syria-rights-watchdog-144857500.html https://www.hackread.com/isis-hackers-euro-atlantic-integration-nato-site/ http://fox5sandiego.com/2015/07/08/security-breach-at-local-hotels-led-to-unauthorized-charges-on-guests-cards/ http://www.thelocal.de/20150707/german-missiles-taken-over-by-hackers https://www.hackread.com/pro-isis-hackers-us-dept-of-energy/ http://krebsonsecurity.com/2015/07/credit-card-breach-at-a-zoo-near-you/ http://www.techworm.net/2015/07/top-model-charlotte-mckinney-hacked-nude-photos-leaked-on-instagram-and-imgur.html http://www.theregister.co.uk/2015/07/14/telegram_ddos/ http://www.forbes.com/sites/erikkain/2015/07/10/daybreak-games-hit-by-lizard-squad-after-ceo-threatens-hacker-surprising-absolutely-nobody/?ss=Security http://www.theglobeandmail.com/report-on-business/walmart-looks-into-possible-credit-card-data-breach/article25422632/ https://www.hackread.com/palestinian-hacker-new-york-comptroller-office/ https://www.hackread.com/obama-election-social-network-hacked-yemen-hacker/ http://pastebin.com/1xLCahZH http://www.timesofisrael.com/computer-hack-reveals-identity-of-syrians-in-contact-with-israel/ http://www.cbc.ca/news/canada/british-columbia/anonymous-hackers-release-emails-ordering-bear-cubs-be-killed-1.3147003 http://pastebin.com/90TaSi2W http://timesofindia.indiatimes.com/india/Website-of-Isros-commercial-arm-Antrix-hacked/articleshow/48041483.cms http://wivb.com/2015/07/13/indiana-radio-station-hacked-by-anonymous/ https://www.proofpoint.com/threat-insight/post/Foot-in-the-Door http://www.telegraph.co.uk/sport/othersports/cycling/tour-de-france/11737387/Tour-de-France-2015-Chris-Froomes-ride-for-glory-under-threat-in-data-spying-storm.html https://www.hackread.com/isis-hackers-malaysia-police-facebook-twitter-hack/ https://www.cryptocoinsnews.com/cloudminr-io-hacked-user-database-put-up-for-sale/ http://pastebin.com/3er0NJWH http://inside.envato.com/denial-of-service-attacks-on-envato/ http://www.techworm.net/2015/07/ddos-attack-knocks-reddits-alternative-voat-offline.html http://www.databreaches.net/insurance-services-office-database-breached-insurance-data-accessed/ http://www.hotforsecurity.com/blog/epic-games-forum-hacked-change-your-online-passwords-an-beware-of-phishing-12283.html http://www.cyphort.com/unicredit-compromised/ http://siph0n.in/exploits.php?id=3931 http://www.zdnet.com/article/ucla-health-hit-by-hack-millions-affected/ http://krebsonsecurity.com/2015/07/cvs-probes-card-breach-at-online-photo-unit/ http://www.theregister.co.uk/2015/07/17/hacker_group_claims_theft_of_24000_belgian_loan_applicants_data/ https://www.hackread.com/pakistani-president-website-hacked/ https://www.hackread.com/anonymous-targets-canadian-police-rcmps-website/ http://www.databreaches.net/meetmeinyourcity-user-email-addresses-and-passwords-dumped/ http://arstechnica.com/security/2015/07/ashley-madison-an-dating-website-for-cheaters-gets-hacked/ http://www.databreaches.net/another-escort-service-related-site-hacked-with-data-dumped/ http://www.databreaches.net/more-escort-related-services-hacked/ http://pastebin.com/icXAEUpD http://www.orangeville.com/news-story/5753454-federal-tribunal-targeted-in-cyberattack/ http://www.ibtimes.co.uk/anonymous-hacks-us-census-bureau-over-ttip-agreement-leaking-employee-details-online-1512244 http://www.infosecurity-magazine.com/news/bitcoin-exchange-coincut/ http://www.forbes.com/sites/thomasbrewster/2015/07/31/bitdefender-hacked/?ss=Security http://www.scmagazine.com/data-on-5300-healthfirst-members-caught-up-in-fraud-scheme/article/429020/ http://pastebin.com/3073415ca http://news.nationalpost.com/news/canada/anonymous-says-it-hacked-canadas-security-secrets-in-retaliation-for-police-shooting-of-b-c-activist http://www.databreaches.net/au-university-of-queensland-logins-leaked-by-nightmare-squad/ https://www.hackread.com/google-microsoft-kaspersky-morocco-hacked/ http://qz.com/464609/hackers-say-we-know-one-of-them-females-in-the-cover-after-new-york-magazines-website-goes-down-in-an-attack/ http://www.dailydot.com/politics/planned-parenthood-hacked-anti-abortion-3301/ http://www.bloomberg.com/news/articles/2015-07-29/china-tied-hackers-that-hit-u-s-said-to-breach-united-airlines http://www.journalnow.com/business/business_news/local/hanesbrands-database-hacked/article_543b338e-3664-11e5-b77e-c77df1e08b5c.html http://www.infosecurity-magazine.com/news/potao-trojan-served-up-by-russian/ http://www.scmagazine.com/the-data-breach-blog/section/1263/ http://www.scmagazine.com/planned-parenthood-websites-downed-in-ddos-attack/article/429563/ http://news.softpedia.com/news/hammertoss-malware-uses-twitter-and-github-to-disguise-its-activity-488123.shtml http://today.uconn.edu/2015/07/uconn-responds-to-data-breach-at-school-of-engineering/ http://www.theguardian.com/business/2015/jul/31/rbs-and-natwest-customers-complain-of-online-problems http://www.databreaches.net/orange-county-employees-association-victim-of-hack/ http://www.hollywoodreporter.com/thr-esq/wolf-wall-street-backer-says-812115 http://www.databreaches.net/siouxland-pain-clinic-says-patient-information-likely-exposed-by-hacker/ https://www.hackread.com/anti-isis-kurdish-hacker-sheriff-site/ http://www.databreaches.net/network-solutions-customer-sites-defaced/ http://www.cornishguardian.co.uk/Bodmin-College-website-hacked-obscenities-WARNING/story-27514759- https://www.hackread.com/anonymous-brings-down-taiwan-govt-websites/detail/story.html http://www.emirates247.com/business/technology/dubizzle-strengthens-online-security-following-breach-2015- https://blog.malwarebytes.org/malvertising-2/2015/08/large-malvertising-campaign-takes-on-yahoo/08-06-1.599356 http://www.cbc.ca/news/trending/hacktivists-hijack-donald-trumps-website-with-message-for-jon-stewart- http://www.theverge.com/2015/8/4/9097597/the-international-dota-2-ddos-attack-valve1.3178066 https://grahamcluley.com/2015/08/security-alert-hover-leads-password-reset/ http://arstechnica.com/security/2015/08/the-martian-author-says-comcast-let-hacker-take-over-his-e-mail/ https://threatpost.com/researchers-uncover-terracotta-chinese-vpn-service-used-by-apt-crews-for- http://arstechnica.com/security/2015/08/newly-discovered-chinese-hacking-group-hacked-100-websites-to-use-cover/114110#sthash.vHpLzuCC.dpuf http://www.emirates247.com/business/technology/fraud-alert-uae-banks-replace-credit-cards-after-security-as-watering-holes/ https://www.hackread.com/sri-lankan-prime-ministers-office-website-hacked/scare-2015-08-05-1.599203 http://www.scmagazine.com/aussies-finger-russian-in-stock-hack/article/430752/ http://www.cnbc.com/2015/08/06/russia-hacks-pentagon-computers-nbc-citing-sources.html http://www.tripwire.com/state-of-security/security-data-protection/security-breach-icann/ https://www.yahoo.com/tech/s/apnewsbreak-email-leak-suggests-ecuador-spied-opposition-191403707-- http://www.intouchweekly.com/posts/exclusive-miranda-lambert-s-private-e-mail-account-hacked-hacker-finance.html http://siph0n.net/exploits.php?id=3974confesses-to-breaking-into-35-000-plus-personal-e-mails-66194 http://krebsonsecurity.com/2015/08/tech-firm-ubiquiti-suffers-46m-cyberheist/ http://www.bloomberg.com/news/articles/2015-08-07/american-airlines-sabre-said-to-be-hit-in-hacks-backed-by- http://www.bloomberg.com/news/articles/2015-08-07/american-airlines-sabre-said-to-be-hit-in-hacks-backed-by-china china http://www.rte.ie/news/2015/0808/720023-carphone-warehouse/ http://www.telegraph.co.uk/finance/newsbysector/epic/cpw/11794521/Carphone-Warehouse-hackers-used- http://www.net-security.org/secworld_main.php http://www.dailystar.com.lb/News/World/2015/Aug-08/310320-hackers-broadcast-porn-on-tv-screens-at-brazil- https://www.hackread.com/anonymous-mexico-ruben-espinosa/bus-depot.ashx http://www.lastampa.it/2015/08/09/italia/cronache/hacker-dellisis-allattacco-dellaccademia-delle-crusca-questa- http://www.nbcnews.com/news/us-news/china-read-emails-top-us-officials-n406046guerra-appena-iniziata-sNlipLpz3qtzyh0YfCR7zK/pagina.html http://icv2.com/articles/news/view/32291/credit-card-breach-onebookshelf http://globalnews.ca/news/2156291/toronto-womans-webcam-hacked-while-watching-netflix/ https://ghostbin.com/paste/dy8pm http://www.scmagazine.com/about-2500-customer-credit-cards-affected-in-mohu-website- http://www.net-security.org/secworld.php?id=18753breach/article/437357/ http://arstechnica.com/security/2015/08/attackers-are-hijacking-critical-networking-gear-from-cisco-company- https://www.hackread.com/opmonsanto-anonymous-hacks-south-african-govt/warns/ http://socialmedia.umich.edu/blog/hacked/ https://blog.malwarebytes.org/malvertising-2/2015/08/ssl-malvertising-campaign-continues/ https://www.hackread.com/azerbaijan-embassy-russia-hacked-syria/ http://www.net-security.org/secworld.php?id=18783 http://news.virginia.edu/content/uva-responds-cyber-attack-portions-it-systems-0 http://www.scmagazine.com/breach-affects-payment-cards-used-at-hundreds-of-freds-super-dollar-stores-in-14- http://www.reviewjournal.com/politics/government/hacker-breaks-henderson-computer-serverstates/article/432783/ http://www.scmagazine.com/malware-targets-credit-cards-used-at-pennsylvania-holiday-inn/article/438597/ http://pastebin.com/3T6mwNqc http://siph0n.net/exploits.php?id=4001 http://www.databreaches.net/hacker-hits-24-sites-to-alert-govt/ https://www.hackread.com/unicef-india-website-turkish-hackers/ http://www.scmagazine.com/totally-promotional-attack-compromises-payment-cards-other-data/article/434514/ http://www.asicentral.com/news/newsletters/promogram/august-2015/casad-company-inc-suffers-data-breach/ http://siph0n.in/exploits.php?id=3990 http://cyber-berkut.org/en/ http://www.rfa.org/english/news/china/rights-websites-hit-by-suspected-hacker-attack-great-firewall-blockade- http://www.databreaches.net/ca-anonymous-responsible-for-clayton-valley-charter-high-computer-hack/08182015111603.html http://siph0n.net/exploits.php?id=3995 http://www.independent.co.uk/news/uk/home-news/mumsnet-hack-founder-justine-roberts-targeted-in-swatting- http://siph0n.net/exploits.php?id=4006attack-and-parenting-website-pushed-temporarily-offline-10461558.html http://siph0n.net/exploits.php?id=3999 http://siph0n.net/exploits.php?id=4002 http://web.uri.edu/publicsafety/data-security-issue/ https://blog.malwarebytes.org/malvertising-2/2015/08/malvertising-hits-online-dating-site-plentyoffish/ http://timesofindia.indiatimes.com/city/bengaluru/Website-of-Karnataka-Higher-Education-Council- http://www.zdnet.com/article/cyberattack-campaign-targets-india-sea-nations/hacked/articleshow/48598086.cms? http://www.theregister.co.uk/2015/08/21/forget_euro_bullet_proofing_japan_hacker_flaks_set_up_ccs_home/ https://www.hackread.com/saudi-airforce-hacked-iranian-hackers/ http://www.databreaches.net/me-data-breach-at-brunswick-hotel-possibly-exposes-cards-of-2600/ http://www.databreaches.net/50000-autozone-customers-data-hacked-exposed/ http://www.databreaches.net/more-american-universities-hacked-by-jm511/ http://philippineitnewsandservices.blogspot.co.uk/2015/08/philippines-bureau-of-customs-dozed-by.html https://threatpost.com/github-mitigates-ddos-attack/114403 http://t.co/9Aoro2tQ04 http://www.scmagazine.com/malware-on-maine-hotel-computer-targets-guest-payment-cards/article/435900/ http://www.theregister.co.uk/2015/08/26/nhs_site_defaced_with_screed_protesting_syrian_conflict/ https://www.eff.org/deeplinks/2015/08/new-spear-phishing-campaign-pretends-be-eff http://www.scmagazine.com/citizen-lab-report-describes-phishing-campaign-against-iranian- https://blog.malwarebytes.org/malvertising-2/2015/08/angler-exploit-kit-strikes-on-msn-com-via-malvertising-dissidents/article/435241/ http://www.scmagazineuk.com/mumsnet-hit-again-this-time-by-stronger-series-of-attacks/article/435099/campaign/ http://t.co/otfvqVjTmD http://www.databreaches.net/utah-food-bank-security-breach-exposed-thousands-of-donors-info-since-october- http://www.databreaches.net/michigans-catholic-workers-are-latest-cyber-victims/2013/ http://www.databreaches.net/il-village-pizza-pub-notifies-customers-of-data-security-breach-at-transformpos/ http://arstechnica.com/security/2015/09/lizard-squad-launches-ddos-against-uk-law-enforcement-agency/ http://news.softpedia.com/news/rocket-kitten-hacking-group-linked-to-iranian-government-by-security- http://www.newsweek.com/china-hackers-fbi-marion-bowman-367451researchers-490919.shtml http://www.scmagazine.com/hawaii-credit-union-notifies-customers-of-employee-email-breach/article/436785/ http://www.infosecurity-magazine.com/news/manchester-uks-website-knocked/ http://home.bt.com/news/uk-news/greater-manchester-police-website-targeted-by-hacker-11364001567404 http://www.scmagazine.com/2014-breach-prompts-reverbnation-to-notify-customers/article/436757/ http://news.softpedia.com/news/carbanak-banking-trojan-returns-with-a-new-series-of-attacks-491015.shtml http://www.statejournal.com/story/29943796/hacker-claiming-to-be-part-of-islamic-state-hacks-wayne-county- https://www.hackread.com/hacked-electronic-signpost-france/wv-board-of-education-website-redirects-visitors-to-site-promoting-terrorism https://blog.malwarebytes.org/malvertising-2/2015/09/malvertising-found-on-dating-site-matchdotcom/ http://www.theregister.co.uk/2015/09/04/essex_police_ddos/ http://pastebin.com/eEN0NVuM http://arstechnica.com/security/2015/09/mozilla-data-stolen-from-hacked-bug-database-was-used-to-attack- http://www.scmagazine.com/we-end-violence-announces-breach-california-university-impacted/article/437776/firefox/ http://siph0n.in/exploits.php?id=4033 http://www.balancingact-africa.com/news/en/issue-no-156/web-and-mobile-data/hacker-targets-south/en https://au.news.yahoo.com/nsw/a/29443937/university-facebook-page-flooded-with-soft-porn-in-embarrassing- http://pastebin.com/YPVyHdjBhack/ http://www.washingtonexaminer.com/pentagon-food-court-computers-hacked-exposing-employees-bank- http://arstechnica.com/business/2015/09/uk-banks-corporations-are-being-blackmailed-by-bitcoin-information/article/2571606 http://www.zdnet.com/article/tracking-turla-hackers-abuse-satellite-signals-high-in-the-sky/cyberextortionists/ http://webcache.googleusercontent.com/search?q=cache:OQOtGarRny8J:pastebin.com/4A93qstA+&cd=1&hl= http://www.theregister.co.uk/2015/09/10/excellus_breach/en&ct=clnk&gl=us http://www.theregister.co.uk/2015/09/10/north_korea_exploits_zero_day_in_seouls_favourite_word_doc/ http://www.scmagazine.com/oakland-family-services-notifies-16k-clients-of-information-breach/article/438995/ http://bdnews24.com/bangladesh/2015/09/11/dhaka-university-website-still-down-authorities-claim-hacker- http://www.telegraph.co.uk/news/politics/11859005/Cabinet-ministers-email-hacked-by-Isil-spies.htmlmarked http://www.usatoday.com/story/news/2015/09/09/cyber-attacks-doe-energy/71929786/ http://webcache.googleusercontent.com/search?q=cache:iO4ApriCHQ4J:pastebin.com/Kaw9gV4R+&cd=1&hl= http://www.zdnet.com/article/western-sydney-students-access-department-computer-system/en&ct=clnk&gl=us http://www.databreaches.net/vacationrentpayment-notifies-customers-whose-account-application-information- https://www.rt.com/politics/315338-hacker-attack-kremlin-website/was-hacked/ http://pastebin.com/JSSe18nL http://pastebin.com/6SCzVT98 https://blog.malwarebytes.org/malvertising-2/2015/09/large-malvertising-campaign-goes-almost-undetected/ http://arstechnica.com/security/2015/09/malicious-cisco-router-backdoor-found-on-79-more-devices-25-in-the- http://www.theregister.co.uk/2015/09/16/cryptome_revokes_pgp_keys_after_mysterious_compromise/us/ http://www.forbes.com/sites/lisabrownlee/2015/09/17/chinese-cyber-attacks-on-us-military-interests-confirmed- as-advanced-persistent-and-ongoing/ http://www.scmagazineuk.com/news-alert-apts-target-russian-military-personnel-and-telecoms- http://motherboard.vice.com/read/hackers-hack-other-hackers-offer-their-data-for-500?linkId=17102714employees/article/439244/ http://siph0n.net/exploits.php?id=4054 https://grahamcluley.com/2015/09/russia-using-duke-family-malware-spy-countries-2008-says-secure/ http://arstechnica.com/security/2015/09/apple-scrambles-after-40-malicious-xcodeghost-apps-haunt-app-store/ http://www.theregister.co.uk/2015/09/18/intrusion_at_cephcom_makes_for_red_faces_at_red_hat/ http://poststar.com/news/state-and-regional/li-high-school-computer-system-hacked/article_c042c1fc-99ba- http://www.forbes.com/sites/thomasbrewster/2015/09/22/forbes-website-served-malware/?ss=Security52d8-8cc2-a8189bdc7619.html http://www.welivesecurity.com/2015/09/17/the-trojan-games-odlanor-malware-cheats-at-poker/ http://siph0n.net/exploits.php?id=4057 http://www.theregister.co.uk/2015/09/04/essex_police_ddos/ https://blog.sucuri.net/2015/09/wordpress-malware-active-visitortracker-campaign.html http://www.scmagazineuk.com/exclusive-kettering-general-hospital-investigating-email-data- http://www.compasscayman.com/caycompass/2015/09/18/Fidelity-Bank-hacked-and-blackmailed/breach/article/439350/ http://www.zataz.com/infiltration-dans-le-black-market-francais-suite/ http://siph0n.net/exploits.php?id=4063 https://www.hackread.com/anonymous-hacks-vietnam-government-against/ http://www.forbes.com/sites/thomasbrewster/2015/09/21/chinese-hackers-beat-google-bouncer/?ss=Security http://www.scmagazine.com/padlocks4less-website-possibly-compromised-payment-cards-at- http://news.softpedia.com/news/anonymous-defaces-philippines-telecom-commission-website-protesting-slow-risk/article/441140/ https://blog.malwarebytes.org/malvertising-2/2015/09/malvertising-attack-hits-realtor-com-visitors/internet-speeds-492336.shtml http://www.forbes.com/sites/lisabrownlee/2015/09/25/new-report-of-malicious-chinese-cyber-attack-on-a-u-s- http://siph0n.in/exploits.php?id=4072government-agency/?ss=Security https://blog.malwarebytes.org/malvertising-2/2015/09/ssl-malvertising-campaign-targets-top-adult-sites/ http://www.scmagazine.com/news/archive/10652/ http://siph0n.net/exploits.php?id=4076 http://news.nationalpost.com/news/canada/anonymous-leaks-another-high-level-federal-document-as-part-of- http://krebsonsecurity.com/2015/09/banks-card-breach-at-hilton-hotel-properties/vendetta-against-government http://www.courier-journal.com/story/news/education/2015/09/25/n-oldham-high-data-breach-could-affect- https://www.apega.ca/breach.html2800/72812598/ http://smdp.com/data-breach-involves-big-blue-bus-customers/151000 http://www.inquisitr.com/2451705/indian-hackers-deface-over-40-pakistani-websites-hours-after-two-indian- http://www.inquisitr.com/2451705/indian-hackers-deface-over-40-pakistani-websites-hours-after-two-indian-government-portals-were-hacked/ http://www.repubblica.it/tecnologia/2015/09/28/news/anonymous_opbankdump_unipol_intesa-government-portals-were-hacked/ http://calgary.ctvnews.ca/police-investigate-security-breach-of-university-of-calgary-s-peoplesoft-system-123815381/?ref=HRER2-1 http://webcache.googleusercontent.com/search?q=cache:enNyZpPlZmsJ:pastebin.com/57J2kh8Y+&cd=1&hl=1.2583492 https://securelist.com/blog/research/72283/gaza-cybergang-wheres-your-ir-team/en&ct=clnk&gl=us http://money.cnn.com/2015/09/30/technology/trump-hotels-hack/ http://news.softpedia.com/news/despite-new-equipment-rutgers-university-goes-down-after-ddos-attack- http://arstechnica.com/security/2015/10/patreon-some-user-names-e-mail-and-mailing-addresses-stolen/493155.shtml http://arstechnica.com/security/2015/10/gigabytes-of-user-data-from-hack-of-patreon-donations-site-dumped- http://www.oaic.gov.au/news-and-events/statements/privacy-statements/kmart-australia-data-breach/kmart- http://www.techworm.net/2015/09/anonymous-hacks-saudi-websites-in-response-to-decision-of-crucifying-a-17-australia-data-breach http://www.bbc.com/news/world-asia-34409343years-old-lad.html http://siph0n.net/exploits.php?id=4088 http://pastebin.com/C17sguxM http://news.drweb.com/show/?i=5976&lng=en&c=14 http://www.techworm.net/2014/10/unicef-twitter-account-hacked.html http://www.scmagazine.com/flinn-scientific-notifies-customers-of-payment-card-breach/article/375119/ https://twitter.com/ManiAc_Naiem/status/517833605163130880 http://datalossdb.org/incidents/13640-1-602-user-accounts-and-1-197-administrator-accounts-with-user-names-email-addresses-contact-numbers-home-addresses-and-mixed-clear-text-and-encrypted-passwords-dumped-on-the-internet http://www.scmagazine.com/palo-alto-network-researchers-discover-further-nitro-attacks/article/375679/ http://news.softpedia.com/news/Info-Of-1-000-Provo-City-School-District-Employees-Exposed-460933.shtml http://www.dailymail.co.uk/news/article-2781196/Will-end-iCloud-hacker-releases-fourth-wave-celebrity-nudes-including-male-victim.html http://www.zdnet.com/yahoo-confirms-servers-infected-but-not-by-shellshock-7000034411/ http://hackread.com/google-indonesia-hacked-by-pakistani-hackers/ http://www.techworm.net/2014/10/abc-faces-ransomware-attack.html http://arstechnica.com/security/2014/10/dozens-of-european-atms-rooted-allowing-criminals-to-easily-cash-out/ http://www.techworm.net/2014/10/operation-hong-kong-anonymous-hacks-chinese-government-website.html http://hackread.com/massachusetts-maritime-academy-website-hacked/ http://hackread.com/indian-hacks-pakistan-peoples-party-website/ http://www.databreaches.net/tx-emergence-health-network-notifies-11100-mental-health-patients-of-possible- http://www.bloomberg.com/news/2014-10-09/jpmorgan-hackers-said-to-probe-13-financial-firms.htmlphi-breach/ http://arstechnica.com/security/2014/10/developer-of-hacked--web-app-says-snappening-claims-are-hoax/ http://www.bbc.co.uk/newsbeat/29556349 http://www.scmagazine.com/malware-on-ndscs-computers/article/376446/ http://news.softpedia.com/news/Pro-Democracy-Websites-in-Hong-Kong-Have-Been-Compromised-461892.shtml http://news.softpedia.com/news/Cyber-Espionage-Group-Uses-Bank-Website-to-Redirect-To-Exploit-Kit-461568.shtml http://pastebin.com/TKg0M03P http://www.techworm.net/2014/10/indo-pak-cyber-war-in-offing.html http://www.ibtimes.co.in/mohanlal-fans-hack-pakistan-website-post-actors-picture-dialogue-610930 http://www.ibtimes.co.in/mohanlal-fans-hack-pakistan-website-post-actors-picture-dialogue-610930 http://webcache.googleusercontent.com/search?q=cache:-HTVLnukeGwJ:pastebin.com/4Qya0LaE http://www.standard.co.uk/news/london/ucl-investigates-email-hack-after-mystery-bello-message-from-president-sparks-ridicule-from-students-9784114.html http://arstechnica.com/security/2014/10/hp-accidentally-signed-malware-will-revoke-certificate/ http://www.forbes.com/sites/katevinton/2014/10/10/credit-cards-were-compromised-in-kmart-data-breach/ http://pastebin.com/ncFvBPLx http://pastebin.com/FKUxcPVe http://gadgets.ndtv.com/internet/news/anonymous-leaks-chinese-government-website-data-over-hong-kong-protests-605910 http://www.ibtimes.com/keke-palmer-alleged-nude-photos-leaked-fappening-continues-cinderella-star-victim-apparent-1703591 http://hackread.com/pakistani-news-channel-samaa-tv-website-hacked/ http://www.theguardian.com/technology/2014/oct/13/uk-police-investigate-alleged-bahraini-hacking-exiles-computers http://www.scmagazine.com/eyebuydirect-announces-website-breach-payment-cards-affected/article/448565/ http://www.isightpartners.com/2014/10/cve-2014-4114/ http://arstechnica.com/security/2014/10/7-million-dropbox-usernamepassword-pairs-apparently-leaked/ http://www.oregon.gov/EMPLOY/COMM/Pages/OED-Addresses-Security-Vulnerability.aspx http://blog.crowdstrike.com/crowdstrike-discovers-use-64-bit-zero-day-privilege-escalation-exploit-cve-2014-4113-hurricane-panda/ http://metronews.ca/news/vancouver/1183297/data-breach-puts-15000-b-c-wildfire-fighters-personal-info-at-risk/ http://www.scmagazine.com/cyberswim-notifies-customers-that-payment-card-data-may-be-at-risk/article/377958/ http://news.softpedia.com/news/Cyber-Espionage-Group-Leverages-At-Least-Ten-Custom-Tools-In-Attacks-462197.shtml http://www.scmagazine.com/physicians-email-account-accessed-by-unknown-source-contained-patient-data/article/377499/ http://mashable.com/2014/10/15/redditors-complain-snappening-down/ http://nakedsecurity.sophos.com/2014/10/15/attacker-takes-over-facebook-page-set-up-for-bucket-list-baby-shane-posts-porn/ http://pastebin.com/1Hycjv58 http://www.forbes.com/sites/lisabrownlee/2015/09/17/chinese-cyber-attacks-on-us-military-interests-confirmed- http://qz.com/526287/one-of-americas-premier-research-institutions-was-hacked-and-the-signs-point-to-china/as-advanced-persistent-and-ongoing/ http://nypost.com/2015/10/18/stoner-high-school-student-says-he-hacked-the-cia/ http://www.thestate.com/news/traffic/article39874323.html http://www.databreaches.net/php-freaks-forum-database-hacked/ http://www.theregister.co.uk/2015/10/20/neutrino_exploit_kit_attacks_hit_thousands_of_magento_shops/ http://siph0n.net/exploits.php?id=4122 https://www.incpak.com/world/official-website-of-passport-office-kolkata-hacked-by-pakistani-hackers/ http://www.scmagazine.com/north-korean-hackers-breach-south-koreas-executive-office- https://blog.malwarebytes.org/malvertising-2/2015/10/kampagnen-malvertising-campaign-goes-after-german-servers/article/448582/ http://www.wired.co.uk/news/archive/2015-10/22/anonymous-hacker-takedown-racist-websitesusers/ http://www.cnet.com/news/isp-talktalk-hit-by-significant-and-sustained-cyberattack-in-uk/ http://blog.trendmicro.com/trendlabs-security-intelligence/pawn-storm-targets-mh17-investigation-team/http://www.bbc.co.uk/news/uk-34717572 http://arstechnica.com/tech-policy/2015/10/top-german-official-infected-by-highly-advanced-spy-trojan-with-nsa- https://grahamcluley.com/2015/10/online-accounting-software-xero-tells-users-reset-passwords-accounts-ties/ http://www.theguardian.com/uk-news/2015/oct/23/essex-police-apologise-after-hackers-hijack-twitter-accountbreached/ https://www.hackread.com/anonymous-targets-thai-govt-telecom-firm/ https://www.hackread.com/anonymous-hacks-egyptian-presidency-website/ http://www.nyoooz.com/hyderabad/240398/tunisian-muslim-groups-hacks-film-federation-of-india-website-to- https://twitter.com/AnonLeb2015/status/658410544043589632protest-killing-of-muslims-in-myanmar http://siph0n.net/exploits.php?id=4125 http://www.scmagazine.com/wichita-schools-investigates-possible-cyber-attack/article/449481/ http://www.databreaches.net/interstitial-cystitis-network-notifies-customers-of-payment-card-breach/ http://www.forbes.com/sites/thomasbrewster/2015/10/28/000webhost-database-leak/?ss=Security http://www.bbc.com/news/technology-34663210 http://news.softpedia.com/news/despite-new-equipment-rutgers-university-goes-down-after-ddos-attack- http://www.nationmultimedia.com/breakingnews/Thai-banks-receive-Bitcoin-threat-30271821.html493155.shtml https://www.hackread.com/opmonsanto-anonymous-hacks-national-agriculture-library/ http://uk.reuters.com/article/2015/10/29/us-optimal-payments-cybercrime-idUKKCN0SN0OR20151029 http://www.scmagazine.com/yellowfront-grocery-notified-customers-via-facebook-of-pos-breach/article/450345/ http://pastebin.com/xh93uwpN http://pastebin.com/nAzu3Xkr http://www.bbc.com/news/world-asia-34409343 http://siph0n.net/exploits.php?id=4143 http://siph0n.net/exploits.php?id=4150 http://siph0n.net/exploits.php?id=4151 http://siph0n.net/exploits.php?id=4152 http://siph0n.net/exploits.php?id=4154 http://pastebin.com/C17sguxM http://blog.pagefair.com/2015/halloween-security-breach/ http://siph0n.net/exploits.php?id=4156 http://www.dnaindia.com/india/report-websites-of-several-kolkata-colleges-hacked-2140527 https://theadminzone.com/threads/vbulletin-com-forums-hacked.136961/page-5#post-1017399 http://www.databreaches.net/vbulletin-foxit-software-forums-hacked-by-coldzer0-hundreds-of-thousands-of- http://www.scmagazine.com/salt-lake-schools-hit-with-ddos-attack/article/451480/users-info-stolen/ http://pastebin.com/qaqADFTH http://siph0n.in/exploits.php?id=4159 http://arstechnica.com/security/2015/11/crypto-e-mail-service-pays-6000-ransom-gets-taken-out-by-ddos- https://www.hackread.com/pro-palestinian-hackers-hack-haaretz-twitter/anyway/ http://siph0n.in/exploits.php?id=4173 http://www.esecurityplanet.com/network-security/u.s.-government-officials-hacked-by-iranian-revolutionary- http://havokmon.blogspot.co.uk/2015/11/teenage-script-kiddies-armada.htmlguard.html https://www.zoho.com/service-updates/blog/zoho-services-under-criminal-attack.html http://www.scmagazine.com/touchnote-photo-site-breached-names-addresses-taken/article/452401/ http://www.wsaw.com/home/headlines/ShowTix4U-ticket-website-customers-warned-following-data-breach-- https://help.hushmail.com/entries/107539976340023262.html https://blog.runbox.com/2015/11/ddos-attacks-on-runbox/ http://www.theregister.co.uk/2015/11/05/michigan_casino_credit_card_hack/ http://www.scmagazine.com/crackas-with-attitude-say-theyre-at-it-again-claim-hack-of-fbi-deputys- http://www.theregister.co.uk/2015/11/06/swedbank_hit_by_ddos_attack/email/article/452037/ https://twitter.com/CocaineSecurity/status/662973175400148992 http://www.neomailbox.com/about/news/305-ddos-attack http://www.zdnet.com/article/anonymous-exposes-identities-of-1000-kkk-members/ http://www.databreaches.net/uk-social-networking-site-xat-hacked-user-database-acquired-by-hackers/ http://siph0n.in/exploits.php?id=4182 http://siph0n.in/exploits.php?id=4181 http://siph0n.in/exploits.php?id=4180 http://siph0n.in/exploits.php?id=4178 http://blog.fastmail.com/2015/11/11/ddos-attack-may-lead-to-potential-service-disruption-this-week/ http://www.zdnet.com/article/brazilian-army-gets-hacked/ http://www.wired.com/2015/11/cia-email-hackers-return-with-major-law-enforcement-breach/#slide-1 http://pastebin.com/RzuxwLxF http://www.thetimes.co.uk/tto/news/uk/article4608292.ece http://www.bbc.co.uk/news/uk-england-norfolk-34769924 http://www.theregister.co.uk/2015/11/11/comcast_passwords_leak/ http://www.newsweek.com/hundreds-spotify-accounts-leaked-apparent-hack-last-week-392696 http://www.zdnet.com/article/queensland-tafe-student-data-exposed-in-hack/ https://blog.malwarebytes.org/malvertising-2/2015/11/official-premier-league-fantasy-website-site-pushes- https://www.koreatimes.co.kr/www/news/nation/2015/11/116_190866.htmlmalvertising/ http://pastebin.com/ctusqA92 http://siph0n.in/exploits.php?id=4195 http://siph0n.in/exploits.php?id=4194 http://siph0n.in/exploits.php?id=4193 http://siph0n.in/exploits.php?id=4192 https://theintercept.com/2015/11/11/securus-hack-prison-phone-company-exposes-thousands-of-calls-lawyers- http://www.welivesecurity.com/2015/11/11/operation-buhtrap-malware-distributed-via-ammyy-com/and-clients/ https://www.rt.com/uk/321597-islamist-hackers-jewish-school/ http://siph0n.in/exploits.php?id=4197 http://pastebin.com/sWa06kV0 https://www.hackread.com/armenian-group-hacks-azerbaijan-central-bank/ https://www.hackread.com/anonymous-exposes-identity-of-alleged-halifax-rapist/ https://grahamcluley.com/2015/11/cluley-ddos-attack/ https://www.deepdotweb.com/2015/11/14/possible-large-scale-ddos-attacks-on-tor-exit-nodes http://www.databreaches.net/fashion-to-figure-notifying-customers-of-payment-card-compromise/ http://www.databreaches.net/noble-house-hotels-and-resorts-notifies-customers-at-six-luxury-hotels-of- payment-card-breach/ http://news.softpedia.com/news/tracking-scripts-used-by-state-sponsored-group-to-spy-on-government-officials- http://www.scmagazine.com/anonymous-shutters-55k-pro-isis-twitter-accounts/article/454869/496245.shtml http://www.vocativ.com/news/251771/anonymous-hits-main-isis-forum/ http://www.ibtimes.co.uk/hackers-replace-dark-web-isis-propaganda-site-advert-prozac-1530385 https://blog.malwarebytes.org/malvertising-2/2015/11/the-casino-malvertising-campaign/ https://www.hackread.com/world-bank-ssl-certificate-host-paypal-phishing-scam/ https://siph0n.in/exploits.php?id=4209 https://siph0n.in/exploits.php?id=4208 http://krebsonsecurity.com/2015/11/breach-at-it-automation-firm-landesk/ http://gulfnews.com/xpress/dubai/courts-crime/hacker-holds-uae-bank-to-ransom-demands-3m-1.1626394 http://researchcenter.paloaltonetworks.com/2015/11/tdrop2-attacks-suggest-dark-seoul-attackers-return/ http://www.tripwire.com/state-of-security/security-data-protection/strontium-microsoft-warns-of-hacking-gang- http://www.reuters.com/article/2015/11/20/us-starwood-hotels-hacking-targeting-government-and-nato-workers/ http://www.globalpost.com/article/6691762/2015/11/21/japan-probes-possible-cyber-attack-anonymous-health-idUSKCN0T91XO20151120#sRYDJwSG4gBkmgci.97 https://siph0n.in/exploits.php?id=4235ministry-website http://www.itwire.com/business-it-news/open-source/70431-linux-australia-suffers-another-data-leak https://www.hackread.com/isis-hacks-richland-county-veterans-services-site/ http://www.forbes.com/sites/thomasbrewster/2015/11/23/visa-mastercard-atm-fraud-hackers-steal-millions- http://www.theregister.co.uk/2015/11/23/pearson_vue_data_breach_pcm/dollars/ https://blog.malwarebytes.org/hacking-2/2015/11/catching-up-with-the-eitest-compromise-a-year-later/ http://www.infosecurity-magazine.com/news/glassrat-zerodetection-trojan/ http://www.tmz.com/2015/11/23/gigi-hadid-iphone-hackers/ https://siph0n.in/exploits.php?id=4234 http://www.reuters.com/article/2015/11/25/usa-airforce-bomber- https://www.hackread.com/turkish-hackers-target-russian-central-bank-site/idUSL1N13G01220151125#2jOmxoHjGQ3smBxZ.97 https://blog.malwarebytes.org/online-security/2015/11/readers-digest-and-other-wordpress-sites-compromised- http://news.softpedia.com/news/indian-hackers-deface-125-pakistani-websites-as-payback-for-mumbai-2008-push-angler-ek/ http://www.techworm.net/2015/11/indian-cyber-warriors-pay-homage-to-2611-martyrs-by-hacking-200.htmlattacks-496903.shtml http://www.troyhunt.com/2015/11/when-children-are-breached-inside.html http://www.theregister.co.uk/2015/11/27/hungryhouse_password_change/ http://www.scmagazineuk.com/news-websites-offer-bitcoin-bounty-over-ddos-attacker/article/456389/ https://www.hackread.com/anonymous-crushes-iceland-govt-for-whale-slaughter/ http://www.techworm.net/2015/11/indian-cyber-warriors-pay-homage-to-2611-martyrs-by-hacking-200.html http://www.databreaches.net/madhya-pradesh-police-falls-to-pakistani-cyber-attackers/ http://www.reuters.com/article/2015/11/30/greece-banks-idUSL8N13P5B420151130#8J9mWZxowdvvfWli.97 https://www.hackread.com/anonymous-hacks-un-climate-change-website/ https://hacked.com/opsinglegateway-anonymous-hacks-thai-police-servers-proves-its-point/ http://arstechnica.com/security/2015/12/attack-flooded-internet-root-servers-with-5-million-queries-a-second/ http://www.zdnet.com/article/singapore-consumers-warned-of-malware-targeting-mobile-banking-services/ http://www.scmagazine.com/second-wisconsin-dells-based-resort-hit-by-breach/article/458238/ http://www.theguardian.com/technology/2015/dec/01/hacker-sent-death-to-the-jews-text-messages-after- http://www.nationnews.com/nationnews/news/75091/advocates-site-hackedbreach-in-phone-network http://www.abc.net.au/news/2015-12-02/china-blamed-for-cyber-attack-on-bureau-of-meteorology/6993278 http://www.theregister.co.uk/2015/12/02/hong_kong_hacks_hacked_in_democracy_protest_yap_flap/ https://www.hackread.com/anonymous-hacks-un-climate-changes-webcast-service-provider/ http://siph0n.in/exploits.php?id=4266 http://www.zdnet.com/article/jd-wetherspoon-loses-data-of-over-650000-customers-in-cyberattack/ http://www.scmagazine.com/elephant-bar-announced-a-point-of-sale-breach-that-affected-29-locations-in- http://pastebin.com/UAQakZ2N http://pastebin.com/6YXaFr97 http://help.tunecore.com/app/answers/detail/a_id/669 http://pastebin.com/ftXELSC5 http://thehackednews.com/2015/12/200-indian-websites-hacked-by-anoncoders/ http://www.slashgear.com/nexus-mods-reports-database-breach-08417627/ http://www.welivesecurity.com/2015/12/07/hackers-announce-wwes-jim-ross-dead-wrestling-control-twitter- https://blog.malwarebytes.org/malvertising-2/2015/12/malvertising-hits-dailymotion-serves-up-angler-ek/account/ http://www.theregister.co.uk/2015/12/07/janet_under_persistent_ddos_attack/ http://www.theregister.co.uk/2015/12/08/uk_research_network_janet_ddos/ http://siph0n.in/exploits.php?id=4275 http://www.databreaches.net/uk-social-networking-site-xat-hacked-user-database-acquired-by-hackers/ http://grenxparta.blogspot.co.id/2015/12/hacked-leak-and-dump-site.html https://grahamcluley.com/2015/12/packrat-gang-targeted-south-america-malware-seven-years/ http://www.darkreading.com/attacks-breaches/-iranian-groups-conducting-sophisticated-surveillance-on-middle- http://www.scmagazine.com/phishing-scam-hits-middlesex-hospital-in-conn/article/458813/eastern-targets/d/d-id/1323468? http://www.scmagazine.com/elephant-bar-announced-a-point-of-sale-breach-that-affected-29-locations-in- https://www.hackread.com/cricket-south-africa-facebook-page-hacked/seven-states/article/458707/ https://www.hackread.com/pakistani-journalist-hamid-mir-twitter-account-hacked/ http://www.net-security.org/secworld.php?id=19221 http://edition.cnn.com/2015/12/11/politics/donald-trump-tower-anonymous-hackers/ http://www.japantimes.co.jp/news/2015/12/10/national/anonymous-hacker-takes-credit-for-shutting-down-prime- http://www.zdnet.com/article/guardian-article-on-cybercrime-serves-up-malvertising/#!ministers-website/#.VnV2KvG1_id http://www.theguardian.com/media/2015/dec/09/independent-blog-site--hackers-viruses https://thump.vice.com/en_us/article/swedish-house-mafias-facebook-got-hacked http://www.infosecurity-magazine.com/news/uk-web-hoster-easily-hit-by/ http://www.bbc.co.uk/news/technology-35091534 http://www.scmagazine.com/ddos-attack-knocks-danish-parliament-website-offline/article/459253/ https://blog.comodo.com/comodo-news/alibaba-phishing-attack/ http://wpri.com/2015/12/13/providence-city-website-was-hacked/ http://www.dailydot.com/politics/turkey-ddos-attack-tk-universities/ http://arstechnica.com/security/2015/12/hackers-actively-exploit-critical-vulnerability-in-sites-running-joomla/ http://arstechnica.com/tech-policy/2015/12/beware-of-state-sponsored-hackers-twitter-warns-dozens-of-users/ https://blog.malwarebytes.org/malvertising-2/2015/12/comcast-customers-targeted-in-elaborate-malvertising- https://www.hackread.com/anonymous-hacks-european-space-agency-domains/attack/ https://www.hackread.com/isis-military-data-against-anonymous-isis-trolling-day/ http://pastebin.com/Dmjb4SeJ http://www.bostonherald.com/news/local_coverage/2015/12/officials_call_city_hall_cyberattack_minor http://www.scmagazine.com/pos-attack-hits-swiss-cleaners-for-10-months/article/459952/ http://arstechnica.com/gaming/2015/12/hacker-group-phantom-squad-takes-down-xbox-live-in-ddos-attack/ http://news.softpedia.com/news/chinese-hackers-target-taiwanese-politicians-just-before-elections- http://pastebin.com/Rg2YsrLQ497978.shtml http://arstechnica.com/security/2015/12/unauthorized-code-in-juniper-firewalls-decrypts-encrypted-vpn-traffic/ http://arstechnica.com/security/2015/12/researchers-confirm-backdoor-password-in-juniper-firewall-code/ http://www.krebsonsecurity.com/2015/12/banks-card-breach-at-landrys-restaurants/ http://news.softpedia.com/news/drug-cartels-are-hacking-us-border-patrol-drones-498312.shtml http://krebsonsecurity.com/2015/12/password-thieves-target-e-giftcard-firm-gyft/ https://torrentfreak.com/hackers-grab-deluge-and-qbittorrent-user-databases-151221/ https://www.hackread.com/armenians-hackers-hack-azerbaijani-ministry-servers/ http://siph0n.net/exploits.php?id=4303 http://www.ibtimes.co.in/delhi-cyber-heist-suspected-isis-hackers-route-delhi-firms-rs-6-crore-turkey-660252 http://www.theregister.co.uk/2015/12/21/iranian_hackers_target_new_york_dam/ http://www.reuters.com/article/us-shkreli-twitter-idUSKBN0U310520151220 http://www.wired.com/2015/12/hello-kitty-hack/ http://news.softpedia.com/news/russian-organizations-targeted-in-recent-cyber-espionage-campaigns- http://newsroom.hyatt.com/news-releases?item=123450498017.shtml http://www.latimes.com/business/technology/la-fi-tn-livestream-data-breach-20151224-story.html http://news.softpedia.com/news/phantom-squad-starts-christmas-ddos-attacks-by-taking-down-ea-servers- http://www.theregister.co.uk/2015/12/29/kiev_power_outages_blamed_on_russian_hackers/498078.shtml http://news.softpedia.com/news/anonymous-hacks-costa-rican-website-associated-with-jurrasic-park-island- http://www.ibtimes.co.uk/anonymous-turkey-reeling-under-cyber-attack-government-banks-sites-paralysed-498087.shtml http://krebsonsecurity.com/2015/12/2016-reality-lazy-authentication-still-the-norm/1534984 http://pastebin.com/127KvyeQ http://store.steampowered.com/news/19852/ http://news.softpedia.com/news/anonymous-hacks-asia-pacific-telecommunity-portal-to-protest-against- http://news.softpedia.com/news/donald-trump-receives-support-from-an-unknown-hacker-via-defaced-road-censorship-in-asia-498094.shtml http://news.softpedia.com/news/uconn-website-hijacked-and-used-to-spread-a-fake-flash-player-containing-sign-498223.shtml http://news.softpedia.com/news/religiously-motivated-hacker-defaces-79-escort-sites-498311.shtmlmalware-498186.shtml http://boston.cbslocal.com/2015/12/27/quincy-credit-union-restricts-atm-transactions-after-customers-report- http://www.forbes.com/sites/thomasbrewster/2015/12/28/us-voter-database-leak/fraudulent-charges/ http://news.softpedia.com/news/rutgers-university-suffers-sixth-ddos-attack-this-year-498229.shtml https://www.tmz.com/2015/12/29/dance-moms-hackers-investigation/ http://pastebin.com/AkTHb46u http://www.theregister.co.uk/2015/12/29/day_four_of_linode_data_center_attacks/ http://webcache.googleusercontent.com/search?q=cache:kXHwtt9EIJ8J:pastebin.com/66DJhGFh+&cd=1&hl=it http://timesofindia.indiatimes.com/city/agra/Pakistani-hackers-news-web-portal-of-&ct=clnk&gl=it http://pastebin.com/FK8JzNfEKasganj/articleshow/50385444.cms http://www.bbc.com/news/technology-35204915 http://www.reuters.com/article/us-microsoft-china-insight-idUSKBN0UE01Z20160101 http://www.thehindubusinessline.com/info-tech/security-firm-cyberoam-turns-victim-in-cyber- http://siph0n.net/exploits.php?id=4338attack/article8054964.ece http://www.independent.co.uk/life-style/gadgets-and-tech/gaming/xbox-one-leak-could-allow-people-to-make-their-own-games-for-the-console-9951531.html

http://www.connexionfrance.com/shoppers-data-hacked-tf1-magazine-subscription-website-16506-view-article.html http://www.telegraph.co.uk/news/uknews/terrorism-in-the-uk/11321499/Bristol-bus-timetable-hacked-by-terrorists.html http://www.scmagazine.com/attempted-access-to-fast-forward-academy-systems-puts-data-at-risk/article/390923/ https://www.cyberguerrilla.org/blog/croatia-government-corruption-and-ukraine-prosecutor-general-office-massive-hack-leak-symantec-hackers/ https://nakedsecurity.sophos.com/2015/01/06/mit-sites-defaced-in-lead-up-to-anniversary-of-aaron-swartzs-death/ http://www.straitstimes.com/news/singapore/more-singapore-stories/story/hospital-says-facebook-account-staff-anti-singaporean-co http://arstechnica.com/security/2015/01/bitcoin-exchange-bitstamp-claims-hack-siphoned-up-to-5-2-million/ http://www.eastbourneherald.co.uk/news/local/security-breaches-over-christmas-on-police-s-website-1-6500878

http://www.bloomberg.com/news/2015-01-09/hackers-demand-12-000-for-client-data-stolen-from-geneva-bank.html http://www.ibtimes.com/pro-russian-hacker-group-cyberberkut-claims-attack-german-government-websites-1775874 http://webcache.googleusercontent.com/search?q=cache:-pps3WwGyGIJ:pastebin.com/igrhVWss+&cd=1&hl=en&ct=clnk&gl=uk http://www.databreaches.net/hirsche-private-asset-emergency-announcement-regarding-breach-of-it-security-by-hacker-group/

http://www.couriermail.com.au/news/queensland/bundaberg-library-website-hacked-by-people-claiming-to-be-from-free-syrian-people/story-fnn8dlfs-1227181518953?nk=6e492609ecada6b9cfe30ae627da5a85 http://www.nydailynews.com/news/national/thousands-american-united-airlines-accounts-hacked-article-1.2075162 http://news.softpedia.com/news/Notepad-plus-plus-Releases-Je-suis-Charlie-Edition-Website-Gets-Defaced-469956.shtml http://arstechnica.com/security/2015/01/hack-on-ps-and-xbox-attackers-leaks-ddos-customers-plaintext-passwords/ http://www.scmagazine.com/grill-parts-website-experiences-system-intrusion-payment-card-breach/article/394116/

http://www.bloomberg.com/news/articles/2015-01-25/hacker-steals-20-million-passwords-from-unidentified-dating-site

http://www.zataz.com/modification-despaces-du-ministere-de-linterieur-et-de-la-defense/#axzz3QWpGPw00

http://www.databreaches.net/ca-victor-valley-college-hit-by-computer-security-breach-entire-it-dept-put-on-leave/ http://www.databreaches.net/rex-mundi-dumps-more-data-after-another-entity-doesnt-pay-extortion-demands

https://blog.malwarebytes.org/exploits-2/2015/01/top-adult-site-xhamster-involved-in-large-malvertising-campaign/

http://q13fox.com/2015/01/29/some-university-of-washington-websites-hacked-extremist-group-claims-responsibility/ http://www.zataz.com/plusieurs-centaines-de-sites-du-cnrs-et-des-restaurants-du-coeur-pirates/#axzz3QWpGPw00 http://www.thirdsector.co.uk/womens-resource-centre-website-hacked-people-claiming-support-isis/communications/article/1331684

http://webcache.googleusercontent.com/search?q=cache:Ob_i3m8d2fIJ:pastebin.com/ccvEBFzY+&cd=1&hl=en&ct=clnk&gl=uk http://www.gmanetwork.com/news/story/422037/scitech/technology/hackers-deface-gov-t-websites-to-demand-justice-for-slain-saf-officers http://www.gmanetwork.com/news/story/421932/scitech/technology/hackers-demand-respect-justice-for-fallen-44-from-pnoy-via-journo-s-website http://arstechnica.com/information-technology/2015/02/syrian-rebels-lured-into-malware-honeypot-sites-through-sexy-online-chats/

http://arstechnica.com/security/2015/02/spyware-aimed-at-western-governments-journalists-hits-ios-devices/ http://arstechnica.com/security/2015/02/string-of-big-data-breaches-continues-with-hack-on-health-insurer-anthem/ http://webcache.googleusercontent.com/search?q=cache:qnKLMfxtrlYJ:pastebin.com/TbKj9jHu+&cd=1&hl=en&ct=clnk&gl=uk http://www.therepublic.com/view/story/f947e092b9bc4cbe92cfacbe6aa8de61/MO–Gateway-Arch-Data-Breach http://www.databreaches.net/hirsche-private-asset-emergency-announcement-regarding-breach-of-it-security-by-hacker-group/ https://nakedsecurity.sophos.com/2015/02/09/chipotle-apologises-for-offensive-tweets-says-account-was-hacked/

http://news.softpedia.com/news/Chinese-Cybercriminals-Hit-South-Korean-Mobile-Users-Hard-473007.shtml http://www.dailystar.com.lb/News/Middle-East/2015/Feb-12/287210-observatory-hacked-by-syrian-electronic-army.ashx http://www.databreaches.net/au-5000-university-of-sydney-students-notified-that-hack-exposed-their-details/

http://thenextweb.com/insider/2015/02/16/chinese-bitcoin-exchange-bter-hacked-1-75-million-worth-cryptocurrency-stolen/ http://www.techworm.net/2015/02/everything-fair-love-hacking-twitter-account-nissan-say-love-just-much.html http://www.tripwire.com/state-of-security/latest-security-news/haskell-confirms-security-breach-in-debian-builds/

https://nakedsecurity.sophos.com/2015/02/17/lizard-squad-returns-claims-attack-on-xbox-live-and-daybreak-games/ http://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/operation-arid-viper-bypassing-the-iron-dome https://blog.malwarebytes.org/exploits-2/2015/02/celebrity-chef-jamie-olivers-website-hacked-redirects-to-exploit-kit/

http://www.dnainfo.com/new-york/20150226/civic-center/hack-attack-that-hit-city-emails-may-have-come-from-russia-sources

http://arstechnica.com/security/2015/02/attackers-take-control-of-lenovo-com-hijacking-e-mail-and-web-servers/ http://webcache.googleusercontent.com/search?q=cache:OUWrRVCdO40J:pastebin.com/bypLKQRi+&cd=1&hl=en&ct=clnk&gl=uk

http://cyberwarzone.com/asml-hack-global-chip-machine-producer-in-the-netherlands-and-france-has-been-hacked/

http://networksecurityreport.siteblogs.net/2015/02/28/play-com-compromised-and-security-breach-admitted/

http://news.softpedia.com/news/Rogers-Communications-Hacked-Using-Simple-Social-Engineering-474675.shtml

http://www.techworm.net/2015/03/vigilante-justice-wrong-hacker-mistakenly-hacks-city-police-websites-two-years-after-cop-jailed.html http://news.softpedia.com/news/Russian-Orthodox-Search-Engine-Knocked-Offline-Hours-after-Launch-474945.shtml http://news.softpedia.com/news/San-Francisco-Bistro-Burger-Compromised-Financial-Info-Exposed-for-Two-Months-475430.shtml http://www.techworm.net/2015/03/anonymous-take-down-madison-police-department-website-over-tony-robinson-jr-shooting.html http://www.databreaches.net/university-of-racism-hacked-will-others-go-after-u-of-oklahoma-student-records/ http://www.databreaches.net/university-of-racism-hacked-will-others-go-after-u-of-oklahoma-student-records/ http://arstechnica.com/security/2015/03/mysterious-snafu-hijacks-uk-nukes-makers-traffic-through-ukraine/ http://www.zataz.com/les-pirates-de-rex-mundi-sattaquent-a-un-laboratoire-danalyse-de-sang-francais/#axzz3UX2dr6Zt http://www.insidehalton.com/news-story/5476951-thousands-of-email-addresses-leaked-from-government-website/ http://tuoitrenews.vn/business/26762/vietnamese-hackers-allegedly-steal-50000-accounts-from-local-telecom-giant http://www.pnj.com/story/news/2015/03/16/sacred-heart-health-system-billing-information-hacked/24859975/ http://www.databreaches.net/bitcoin-baron-tells-moore-oklahoma-thanks-for-letting-me-into-your-system-now-pay-me/

http://www.scmagazine.com/more-than-150k-patients-impacted-in-advantage-dental-breach/article/403888/ http://blog.trendmicro.com/trendlabs-security-intelligence/operation-woolen-goldfish-when-kittens-go-phishing/

http://arstechnica.com/gaming/2015/03/malicious-user-hides-trojan-links-in-cloned-steam-greenlight-pages/

http://www.gmanetwork.com/news/story/457189/scitech/technology/pnp-website-defaced-by-pro-palestine-hackers http://news.softpedia.com/news/Cyber-Caliphate-Hackers-Deface-600-Russian-Internet-Resources-476718.shtml http://arstechnica.com/security/2015/03/github-battles-largest-ddos-in-sites-history-targeted-at-anti-censorship-tools/ http://arstechnica.com/security/2015/04/ddos-attacks-that-crippled-github-linked-to-great-firewall-of-china/

http://www.scmagazine.com/nite-ize-website-attack-impacts-credit-cards-possibly-customer-database/article/406835/ http://news.softpedia.com/news/Multiplay-Servers-Breached-Users-Asked-to-Change-Password-477078.shtml https://www.hackread.com/hackers-knockdown-indiana-state-website-against-anti-lgbt-religious-freedom-law/

http://www.ibtimes.co.uk/syrian-electronic-army-hacks-hosting-services-supporting-terrorist-websites-1494393

http://www.business-standard.com/article/pti-stories/pcda-o-website-hacked-personal-details-feared-compromised-115040801249_1.html

http://www.scmagazine.com/biggby-coffee-announces-website-intrusion-access-gained-to-database/article/408510/

http://missoulian.com/news/local/hackers-accessed-patients-credit-card-information-western-montana-clinic-says/article_a2410583-b3bd-5cf8-afcb-8d65828fc2c0.html https://www.hackread.com/anonymous-exposes-list-of-sites-supporting-isis-and-hosting-companies-protecting-them/ http://news.softpedia.com/news/Anonymous-Dumps-Email-Facebook-Accounts-and-Card-Data-of-Israelis-477710.shtml http://news.softpedia.com/news/Anonymous-Dumps-Email-Facebook-Accounts-and-Card-Data-of-Israelis-477710.shtml http://news.softpedia.com/news/AnonGhost-Hackers-Donate-Israeli-Money-to-Palestinian-Charities-478250.shtml

http://arstechnica.com/security/2015/04/french-tv-network-blames-an-islamist-group-for-11-station-blackout/ http://difusionlibre.com/anonymous-cuba/anonymous-cuba-hacks-over-a-dozen-travel-agencies-in-oppigsinblankets#axzz3XkItIBlZ http://www.scmagazine.com/california-based-home-care-services-co-notifies-employees-of-data-breach-tax-fraud/article/409006/

http://arstechnica.com/security/2015/04/elite-cyber-crime-group-strikes-back-after-attack-by-rival-apt-gang/

http://www.csoonline.com/article/2912891/data-breach/hyatt-resets-gold-passport-account-passwords-after-security-incident.html http://www.ibtimes.co.uk/gta-5-accounts-not-hacked-says-rockstar-despite-reports-thousands-players-1497912 http://www.bloomberg.com/news/articles/2015-04-25/tesla-hacked-on-twitter-media-relations-e-mail-accounts http://news.softpedia.com/news/Privacy-Centric-Email-Service-SIGAINT-in-Tor-Targeted-by-70-Bad-Exit-Relays-479227.shtml http://patch.com/massachusetts/wilmington/developing-wilmington-schools-website-possibly-hacked-terrorist-group-0

http://www.cambridge-news.co.uk/Hacked-Tesco-Costa-Coffee-cards-breached/story-26392209-detail/story.html http://www.independent.ie/business/irish/ryanair-hit-for-millions-of-euro-in-international-chinese-banking-scam-31180849.html http://www.scmagazine.com/texas-based-seton-family-of-hospitals-notifies-39k-patients-of-breach/article/412138/ http://abcnews.go.com/Technology/wireStory/partners-healthcare-notifies-3300-patients-email-breach-30716877

http://www.adn.com/article/20150506/38m-alaska-native-corp-money-sent-offshore-account-cyberfraud-attack http://news.softpedia.com/news/Hacker-Hits-World-Trade-Organization-Leaks-Personal-Details-480166.shtml http://news.softpedia.com/news/Compromised-PoS-Systems-at-Compass-Group-Expose-Payment-Info-479842.shtml http://www.lastampa.it/2015/05/01/societa/expo2015/speciale/attacco-hacker-di-anonymous-al-sito-di-expo-qvoywnauKjRqpBwrO0um9J/pagina.html

http://www.businesswire.com/news/home/20150504005672/en/Sally-Beauty-Holdings-Statement#.VVbdnxeaTLA

http://www.ibtimes.com/anonymous-opgreenrights-hack-team-knocked-nuclear-corporation-areva-offline-leaked-1909527

http://blog.trendmicro.com/trendlabs-security-intelligence/ad-network-compromised-users-victimized-by-nuclear-exploit-kit/

http://www.hotnewhiphop.com/ilovemakonnens-twitter-hacked-drake-and-rihanna-dissed-news.15287.html?image=1&gallery=0 http://www.harrogateadvertiser.co.uk/news/crime/thousands-of-customers-details-accessed-following-bettys-data-breach-1-7266657 https://bobsullivan.net/cybercrime/identity-theft/exclusive-hackers-target-starbucks-mobile-users-steal-from-linked-credit-cards-without-knowing-account-number/# http://news.softpedia.com/news/Hacktivists-Bring-Down-Brazilian-Government-Sites-in-OpGreenRights-480821.shtml http://democratherald.com/news/local/hacker-steals-from-company/article_1766668e-59dc-5169-a1cf-62384d720d3b.html https://blog.malwarebytes.org/exploits-2/2015/05/jamie-olivers-website-hacked-again-drops-password-stealer/ http://www.scmagazine.com/cycyberespionage-group-apt28-expands-sights-beyond-govt-military-orgs/article/414586/ http://www.washingtonpost.com/blogs/the-switch/wp/2015/05/14/the-syrian-electronic-army-just-hacked-the-washington-post-again/ http://www.v3.co.uk/v3-uk/news/2408533/apt17-deputydog-hackers-are-pushing-blackcoffee-malware-using-technet http://www.trendmicro.com/vinfo/us/security/news/cyber-attacks/operation-tropic-trooper-infiltrates-secret-keepers http://arstechnica.com/security/2015/05/penn-state-severs-engineering-network-after-incredibly-serious-intrusion/

https://www.stlouisfed.org/news-releases/2015/05/18/password-reset-for-st-louis-fed-research-website-user-accounts http://www.scmagazine.com/three-metrohealth-computers-infected-with-malware-patients-notified/article/415322/ http://www.lastampa.it/2015/05/19/italia/cronache/anonymous-colpisce-il-ministero-della-difesa-qlFNgswyvu20wnQiNYK1kL/pagina.html

http://www.theguardian.com/lifeandstyle/2015/may/21/adult-friendfinder-dating-site-hackers-expose-users-millions http://www.forbes.com/sites/katevinton/2015/05/20/data-belonging-to-1-1-million-carefirst-customers-stolen-in-cyber-attack/ http://www.scmagazine.com/beacon-health-system-notifies-patients-of-possible-data-compromise/article/416853/ http://pix11.com/2015/05/22/isis-hackers-take-over-local-healthcare-website-company-tries-to-assure-patients-their-info-is-safe/

http://news.softpedia.com/news/Cyber-Attack-on-IDA-Server-Prompts-License-Key-Replacement-482331.shtml http://bigstory.ap.org/article/34539a748b3745ffb92451472f814ffa/apnewsbreak-irs-says-thieves-stole-tax-info-100000 http://www.tripwire.com/state-of-security/latest-security-news/hackers-steal-over-a-million-japanese-citizens-personal-data-in-targeted-attack/ http://thenextweb.com/insider/2015/05/28/indian-music-streaming-service-gaana-hacked-millions-of-users-details-exposed/ http://www.scmagazine.com/aerogrow-says-malware-likely-compromised-payment-card-data/article/419227/ http://www.theguardian.com/technology/2015/jun/04/hackers-extorted-multinational-firm-in-australia-and-threatened-employee http://arstechnica.com/tech-policy/2015/06/hack-of-opm-reportedly-exposed-second-set-of-much-more-sensitive-data/ http://arstechnica.com/security/2015/06/epic-fail-how-opm-hackers-tapped-the-mother-lode-of-espionage-data/ http://www.scmp.com/tech/enterprises/article/1816327/chinas-state-media-hacked-possibly-failed-blackmail-attempt http://www.databreaches.net/bae-systems-first-notifying-employees-of-extranet-site-network-attack-in-2014/ http://www.scmagazine.com/lingerie-sellers-ecommerce-server-compromised-credit-cards-at-risk/article/421523/ http://www.prnewswire.com/news-releases/saint-francis-hospital-gift-shop-acts-to-block-payment-card-security-incident-300095082.html

http://indianexpress.com/article/technology/social/group-claims-to-hack-olacabs-company-says-no-security-lapse/

http://www.azcentral.com/story/news/arizona/politics/2015/06/10/arizona-agency-website-hacked/71007982/ https://www.alienvault.com/open-threat-exchange/blog/watering-holes-exploiting-jsonp-hijacking-to-track-users-in-china http://news.softpedia.com/news/Telecoms-Targeted-by-Second-Generation-Duqu-Espionage-Platform-483991.shtml

http://www.forbes.com/sites/katevinton/2015/06/15/password-manager-lastpass-hacked-exposing-encrypted-master-passwords/?ss=Security

http://www.courthousenews.com/2015/07/01/major-workers-comp-insurers-hacked-legal-files-class-claims.htm http://www.csoonline.com/article/2943968/data-breach/hacking-team-hacked-attackers-claim-400gb-in-dumped-data.html

http://www.scmagazine.com/evans-hotels-announces-payment-card-incident-involving-malware/article/425744/ http://fox5sandiego.com/2015/07/08/security-breach-at-local-hotels-led-to-unauthorized-charges-on-guests-cards/

http://www.techworm.net/2015/07/top-model-charlotte-mckinney-hacked-nude-photos-leaked-on-instagram-and-imgur.html http://www.forbes.com/sites/erikkain/2015/07/10/daybreak-games-hit-by-lizard-squad-after-ceo-threatens-hacker-surprising-absolutely-nobody/?ss=Security http://www.theglobeandmail.com/report-on-business/walmart-looks-into-possible-credit-card-data-breach/article25422632/

http://www.cbc.ca/news/canada/british-columbia/anonymous-hackers-release-emails-ordering-bear-cubs-be-killed-1.3147003 http://timesofindia.indiatimes.com/india/Website-of-Isros-commercial-arm-Antrix-hacked/articleshow/48041483.cms http://www.telegraph.co.uk/sport/othersports/cycling/tour-de-france/11737387/Tour-de-France-2015-Chris-Froomes-ride-for-glory-under-threat-in-data-spying-storm.html

http://www.hotforsecurity.com/blog/epic-games-forum-hacked-change-your-online-passwords-an-beware-of-phishing-12283.html

http://www.theregister.co.uk/2015/07/17/hacker_group_claims_theft_of_24000_belgian_loan_applicants_data/ http://www.ibtimes.co.uk/anonymous-hacks-us-census-bureau-over-ttip-agreement-leaking-employee-details-online-1512244 http://www.scmagazine.com/data-on-5300-healthfirst-members-caught-up-in-fraud-scheme/article/429020/ http://news.nationalpost.com/news/canada/anonymous-says-it-hacked-canadas-security-secrets-in-retaliation-for-police-shooting-of-b-c-activist http://qz.com/464609/hackers-say-we-know-one-of-them-females-in-the-cover-after-new-york-magazines-website-goes-down-in-an-attack/ http://www.bloomberg.com/news/articles/2015-07-29/china-tied-hackers-that-hit-u-s-said-to-breach-united-airlines http://www.journalnow.com/business/business_news/local/hanesbrands-database-hacked/article_543b338e-3664-11e5-b77e-c77df1e08b5c.html

http://news.softpedia.com/news/hammertoss-malware-uses-twitter-and-github-to-disguise-its-activity-488123.shtml

http://datalossdb.org/incidents/13640-1-602-user-accounts-and-1-197-administrator-accounts-with-user-names-email-addresses-contact-numbers-home-addresses-and-mixed-clear-text-and-encrypted-passwords-dumped-on-the-internet http://www.dailymail.co.uk/news/article-2781196/Will-end-iCloud-hacker-releases-fourth-wave-celebrity-nudes-including-male-victim.html

http://arstechnica.com/security/2014/10/dozens-of-european-atms-rooted-allowing-criminals-to-easily-cash-out/ http://www.techworm.net/2014/10/operation-hong-kong-anonymous-hacks-chinese-government-website.html

http://arstechnica.com/security/2014/10/developer-of-hacked-snapchat-web-app-says-snappening-claims-are-hoax/ http://news.softpedia.com/news/Pro-Democracy-Websites-in-Hong-Kong-Have-Been-Compromised-461892.shtml http://news.softpedia.com/news/Cyber-Espionage-Group-Uses-Bank-Website-to-Redirect-To-Exploit-Kit-461568.shtml

http://www.standard.co.uk/news/london/ucl-investigates-email-hack-after-mystery-bello-message-from-president-sparks-ridicule-from-students-9784114.html http://www.forbes.com/sites/katevinton/2014/10/10/credit-cards-were-compromised-in-kmart-data-breach/ http://gadgets.ndtv.com/internet/news/anonymous-leaks-chinese-government-website-data-over-hong-kong-protests-605910 http://www.ibtimes.com/keke-palmer-alleged-nude-photos-leaked-fappening-continues-cinderella-star-victim-apparent-1703591 http://www.theguardian.com/technology/2014/oct/13/uk-police-investigate-alleged-bahraini-hacking-exiles-computers

http://blog.crowdstrike.com/crowdstrike-discovers-use-64-bit-zero-day-privilege-escalation-exploit-cve-2014-4113-hurricane-panda/ http://metronews.ca/news/vancouver/1183297/data-breach-puts-15000-b-c-wildfire-fighters-personal-info-at-risk/ http://www.scmagazine.com/cyberswim-notifies-customers-that-payment-card-data-may-be-at-risk/article/377958/ http://news.softpedia.com/news/Cyber-Espionage-Group-Leverages-At-Least-Ten-Custom-Tools-In-Attacks-462197.shtml http://www.scmagazine.com/physicians-email-account-accessed-by-unknown-source-contained-patient-data/article/377499/ http://nakedsecurity.sophos.com/2014/10/15/attacker-takes-over-facebook-page-set-up-for-bucket-list-baby-shane-posts-porn/

http://pastebin.com/aCvD9cVn

http://datalossdb.org/incidents/13640-1-602-user-accounts-and-1-197-administrator-accounts-with-user-names-email-addresses-contact-numbers-home-addresses-and-mixed-clear-text-and-encrypted-passwords-dumped-on-the-internet Name

1 Page Removed 2 UN SQL injection 3 Sowerby school website hacked 4 , related sites go down in Lizard Squad-powered DDoS 5 Anonymous Attacks Jihadist Websites After Parisian Killings 6 Grill parts website experiences system intrusion, payment card breach 7 Nigeria: DHQ Blogsite Hacked 8 Lizard Squad hackers get HACKED - website offline and Twitter account suspended after series of cyberattacks 9 Target Hackers Hit Third Parking Service 10 Chinese Espionage Campaign Compromises Forbes.com to Target US Defense, Financial Services Companies in Watering Hole Style Attack 11 Bank Hackers Steal Millions via Malware 12 Nissan’s Twitter account gets hacked by lovestruck Mexican trying to find his Valentine 13 Equation = NSA? Researchers Uncloak Huge 'American Cyber Arsenal'

14 U.S. Government Officials Targeted by Iranian Hackers

15 Anonymous Hacked Lisbon University Published the “passwords” 16 Credit Card Breach at Mandarin Oriental 17 An uknown Hacker hacks DhakaFM radio and dumps passwords and email 18 Sacred Heart Health System billing information hacked 19 WebSitePipeline notifying clients of breach 20 Credit card data breach at LAX 21 Twitch resets user passwords following breach 22 GitHub battles “largest DDoS” in site’s history, targeted at anti-censorship tools 23 Direct Marketing Association data breach 24 Biggby Coffee announces website intrusion, access gained to database 25 Wellesley College data dumped; server vulnerable to SQLi 26 Google Images, YouTube, Yahoo Malaysia Domains Hacked by Bangladeshi Hackers 27 Hyatt resets Gold Passport passwords after security incident 28 Amigosmadrid page hacked, password and username leaks 29 Red Bull Malaysia Website Hacked by Pro-Palestinian Hackers 30 Hackers Leak Passwords for Baltimore Police Emails 31 Hacktivists Bring Down Brazilian Government Sites in #OpGreenRights 32 Wayne County (Indiana) Sheriff’s Dept Website Defaced, Login Data Leaked 33 Bitfinex hack 34 Payment card breach at Holiday Valley Resort 35 Subdomain of Ministry of Education hacked 36 Ministry of Economic Affairs Hacked 37 Colombian football star Jame Rodriguez hacked 38 Subdomain of U.S. Dept. of Energy’s Argonne National Lab Hacked by ISIS Hackers 39 Recent downtime issues on Envato 40 Anti-virus firm BitDefender admits breach, Hacker claims stolen passwords are unencrypted 41 PagerDuty hacked 42 Security alert at Hover leads to password reset 43 Tech Firm Ubiquiti Suffers $46M Cyberheist 44 Insider trading ring hacked into newswire services, raked in $100M based on stolen info 45 Chinese Rights Websites Hit by Suspected Hacker Attack, Great Firewall Blockade 46 New Spear Phishing Campaign Pretends to be EFF 47 Bored Brazilian skiddie claims DDoS against Essex Police 48 Imgur Ddosed 49 Anonymous Hacks Saudi Websites in Response to Decision of Crucifying A 17 Years Old Lad 50 Developer of hacked Snapchat web app says “Snappening” claims are hoax

Detection methods - One for actual type of attack if no information about the attack was present, or was unknown then at least the Flow detection methods or Packet inspection methods were used to discover the consequence of attack and finf out whether the attack is not ongoing anymore. Source http://pastebin.com/CbJuyzua https://twitter.com/ulzr1z/status/551210327459631104 http://www.itv.com/news/tyne-tees/2015-01-06/sowerby-school-website-hacked/ http://arstechnica.com/security/2015/01/8chan-related-sites-go-down-in-lizard-squad-powered-ddos/ http://www.tripwire.com/state-of-security/off-topic/anonymous-attacks-jihadist-websites/ http://www.scmagazine.com/grill-parts-website-experiences-system-intrusion-payment-card-breach/article/394116/ http://allafrica.com/stories/201501250109.html http://www.mirror.co.uk/news/technology-science/technology/lizard-squad-hackers-hacked---5067436 http://krebsonsecurity.com/2015/02/target-hackers-hit-third-parking-service/ http://www.invincea.com/2015/02/chinese-espionage-campaign-compromises-forbes/ http://www.nytimes.com/2015/02/15/world/bank-hackers-steal-millions-via-malware.html?_r=1 http://www.techworm.net/2015/02/everything-fair-love-hacking-twitter-account-nissan-say-love-just-much.html http://www.forbes.com/sites/thomasbrewster/2015/02/16/nsa-equation-cyber-tool-treasure-chest/ http://www.esecurityplanet.com/network-security/u.s.-government-officials-hacked-by-iranian-revolutionary-guard.html http://cyberwarzone.com/anonymous-hacked-lisbon-university-published-the-passwords/ http://krebsonsecurity.com/2015/03/credit-card-breach-at-mandarian-oriental/ http://pastebin.com/NP3JZNAi http://www.pnj.com/story/news/2015/03/16/sacred-heart-health-system-billing-information-hacked/24859975/ http://www.databreaches.net/websitepipeline-notifying-clients-of-breach/ http://www.databreaches.net/credit-card-data-breach-at-lax/ http://arstechnica.com/security/2015/03/twitch-resets-user-passwords-following-breach/ http://arstechnica.com/security/2015/03/github-battles-largest-ddos-in-sites-history-targeted-at-anti-censorship-tools/ http://www.databreaches.net/direct-marketing-association-data-breach/ http://www.scmagazine.com/biggby-coffee-announces-website-intrusion-access-gained-to-database/article/408510/ http://www.databreaches.net/wellesley-college-data-dumped-server-vulnerable-to-sqli/ https://www.hackread.com/bangladesh-hacked-google-images-yahoo-malaysia/ http://www.csoonline.com/article/2912891/data-breach/hyatt-resets-gold-passport-account-passwords-after-security-incident.html http://pastebin.com/aT2QEieR (page removed) https://www.hackread.com/pro-palestinian-hackers-red-bull-malaysia-website/ http://news.softpedia.com/news/Hackers-Leak-Passwords-for-Baltimore-Police-Emails-480182.shtml http://news.softpedia.com/news/Hacktivists-Bring-Down-Brazilian-Government-Sites-in-OpGreenRights-480821.shtml https://www.hackread.com/wayne-county-sheriffs-dept-website-defaced/ https://www.bitfinex.com/pages/announcements/?id=35 http://www.scmagazine.com/payment-card-breach-at-holiday-valley-resort/article/420490/ https://www.zoho.com/docs/login.html#serviceurl=%2Ffile%2Fc1hl27f50f8455488443db995b14bedef5184 https://ghostbin.com/paste/kytca https://pastebin.com/LiXfLXki https://www.hackread.com/pro-isis-hackers-us-dept-of-energy/ http://inside.envato.com/denial-of-service-attacks-on-envato/ http://www.forbes.com/sites/thomasbrewster/2015/07/31/bitdefender-hacked/?ss=Security http://www.scmagazine.com/the-data-breach-blog/section/1263/ https://grahamcluley.com/2015/08/security-alert-hover-leads-password-reset/ http://krebsonsecurity.com/2015/08/tech-firm-ubiquiti-suffers-46m-cyberheist/ http://www.net-security.org/secworld.php?id=18753 http://www.rfa.org/english/news/china/rights-websites-hit-by-suspected-hacker-attack-great-firewall-blockade-08182015111603.html https://www.eff.org/deeplinks/2015/08/new-spear-phishing-campaign-pretends-be-eff http://www.theregister.co.uk/2015/09/04/essex_police_ddos/ http://www.scmagazine.com/news/archive/10652/ http://www.techworm.net/2015/09/anonymous-hacks-saudi-websites-in-response-to-decision-of-crucifying-a-17-years-old-lad.html http://arstechnica.com/security/2014/10/developer-of-hacked-snapchat-web-app-says-snappening-claims-are-hoax/

Detection methods - One for actual type of attack if no information about the attack was present, or was unknown then at least the Flow detection methods or Packet inspection methods were used to discover the consequence of attack and finf out whether the attack is not ongoing anymore. Hansman Taxonomy Categories

First Dimension categories

Page Removed Network - Web application attacks - Database attacks - SQL injection Network - Web application attacks - Information Unavailable Denial of Service - Network Based - ICMP flooding Denial of Service - Network Based - Information Unavailable Information Unavailable Information Unavailable Denial of Service - Network Based - Information Unavailable Virus/Worm - Malware Network - Web application attacks - Information Unavailable Virus/Worm - Malware Information Unavailable Virus/Worm - Malware (UNITEDRAKE) Virus/Worm - Malware (GRAYFISH) Worm - Network Aware Information Unavailable

Information Unavailable Virus/Worm - Malware Information Unavailable Information Unavailable Information Unavailable Information Unavailable Information Unavailable Network - Web application attacks - Database attacks - SQL injection Virus/Worm - Malware Information Unavailable Network - Web application attacks - Database attacks - SQL injection Information Unavailable Information Unavailable Network - Web application attacks - Database attacks - SQL injection Information Unavailable Network - phishing Denial of service - Distributed Information Unavailable Information Unavailable Virus/Worm - Malware Network - Web application attacks - Database attacks - SQL injection Information Unavailable Information Unavailable Information Unavailable Denial of service - Information Unavailable Information Unavailable Information Unavailable Information Unavailable Network - Spoofing/Phishing Information Unavailable Information Unavailable Network - Spoofing/Phishing Denial of service - Information Unavailable Denial of service - Information Unavailable Information Unavailable Information Unavailable

Detection methods - One for actual type of attack if no information about the attack was present, or was unknown then at least the Flow detection methods or Packet inspection methods were used to discover the consequence of attack and finf out whether the attack is not ongoing anymore. Second Dimension Categories

Page Removed Software - Application - Server - Database - Information unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Information unavailable Software - Application - User - account - Twitter - Nissan Hardware - Computer - Hard-disks - Toshiba, IBM, Western Digital, Seagate, Maxtor Software - Operating System - Windows Family - all version before Win8 Software - Information unavailable Software - Application - User - Social media account - Information Unavailable Software - Application - User - Email Account - Information Unavailable Software - Application - Information Unavailable Software - Application - Information Unavailable Software - Application - Information Unavailable Software - Application - User - Email Account - Information Unavailable Information Unavailable Information Unavailable Software - Application - User - Webservice account - Twitch, Youtube Software - Application - Server - Web - Baidu Software - Application - Server - Web - Information Unavailable Software - Application - Server - Database - Information unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web - Google, Yahoo, Youtube domains Software - Application - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Information Unavailable Software - Application - User - Email Client - Information unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web/Database - Information Unavailable Software - Application - Information Unavailable Software - Application - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Information Unavailable Software - Application - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Information Unavailable Software - Application - Server - Database - Information unavailable Software - Application - Information Unavailable Software - Application - Information Unavailable Software - Application - Information Unavailable (prob. Email scam) Software - Application - Service - Business Wire, PR Newswire, Marketwired Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web - Information Unavailable Software - Application - Server - Web - Apache - Information Unavailable

Detection methods - One for actual type of attack if no information about the attack was present, or was unknown then at least the Flow detection methods or Packet inspection methods were used to discover the consequence of attack and finf out whether the attack is not ongoing anymore. Third Dimension categories

Page Removed Page Removed Information unavailable No vulnerability - network behaviour No vulnerability - network behaviour Vulnerability in implementation Information unavailable Information unavailable Information unavailable CVE-2015-0071, CVE-2014-9163, Information unavailable (Human error) Information unavailable Information unavailable Information unavailable Information unavailable (0 day vulnerabilities) Information unavailable Information unavailable Information unavailable Information unavailable Information unavailable Information unavailable Information Unavailable Information Unavailable Information Unavailable Information unavailable Information unavailable Information unavailable Information unavailable Information unavailable Information unavailable Information unavailable Information unavailable Information unavailable No vulnerability - network behaviour Information unavailable Information unavailable Information unavailable Information unavailable Information unavailable Information unavailable Information unavailable No vulnerability - network behaviour Information unavailable Information unavailable Information unavailable Information unavailable Information unavailable Information unavailable CVE-2015-2590 No vulnerability - network behaviour No vulnerability - network behaviour Information unavailable Vulnerability in configuration

Detection methods - One for actual type of attack if no information about the attack was present, or was unknown then at least the Flow detection methods or Packet inspection methods were used to discover the consequence of attack and finf out whether the attack is not ongoing anymore. Fourth Dimension Categories

Page Removed Page Removed Subversion No additional effect No additional effect Disclosure of information Corruption of information No additional effect Disclosure of information First Dimension - Trojan, Disclosure of information Disclosure of information Corruption of information Disclosure of information Disclosure of information Disclosure of information Disclosure of information Disclosure of information Disclosure of information Disclosure of information Disclosure of information Disclosure of information First dimension - Malware insert Disclosure of information Disclosure of information First dimension - Denial of service - Distributed Disclosure of information Disclosure of information Disclosure of information Subversion Disclosure of information Disclosure of information Subversion Disclosure of information No additional effect Disclosure of information, Subversion Information unavailable Disclosure of information Disclosure of information Disclosure of information Disclosure of information Subversion No additional effect Disclosure of information Disclosure of information Information unavailable Corruption of information Disclosure of information Subversion, First Dimension - Denial of service - Crasher First Dimension - Virus/Worm - Malware No additional effect No additional effect Subversion Disclosure of information

Detection methods - One for actual type of attack if no information about the attack was present, or was unknown then at least the Flow detection methods or Packet inspection methods were used to discover the consequence of attack and finf out whether the attack is not ongoing anymore. Attack description for detection classification

Page Removed Page Removed, Leak of information form database School page hacked DDoS attack Web service denial, prob. Using some type of DoS No attack information, Data stolen from customer database No attack information DDoS attack Page Removed (22.11.2016) Web page redirects (not specified how) user to malicious page which then thorugh 0day Adobe vulnerability installs the Trojan Malware send to hundreds of bank employees, RAT - send video screenshots Twitter account hacked No malware attack specification Malware stole files and kept it in its own Virtual encrypted system No malware attack specification Social and email accounts attacked Social and email accounts attacked Passwords leaked Malware resulting into credential (credit card number, username) breach Leak of email accounts Leak of medical documents Credentials and passwords leaked. Credit card data compromised and leaked Twitch account information leaked DDoS attack Malware placing credit card at risk Leakage of personal information Data leak in university accounts Domains hacked Passwords and username leaked by unknown attack method SQL injection, page unavailable No information about how the attack was conducted No information about phishing procedure DoS, no more informatiuon available No information about the hack, only for leak of information Page removed Malware leaking credit cards details Leakage of passwords and usernames Leakage of passwords and usernames Leakage of emails, passwords and usernames Web page hacked and defaced through unknown flaw DDoS attack Vulnerable app allowed extraction of usernames with unencrypted passwords Page removed Leakage of passwords and usernames Unauthorized transaction due to fraud, no other attack specification Attackers stole data pretending to be employes by using proxy Unknown attack vector Web page downloading malicious code into victims machine DDoS attack DDoS attack using imgur links Information unavailable Leak of photos from snapchat Apache server

Detection methods - One for actual type of attack if no information about the attack was present, or was unknown then at least the Flow detection methods or Packet inspection methods were used to discover the consequence of attack and finf out whether the attack is not ongoing anymore. Detection methods

Flowmon

Page Removed Information unavailable, For Leak* - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, Depends on attack** - L3ANOMALY, BPATTERNS DOS, ICMPANOM, DOSATTACK DOS, DOSATTACK, SRVNA Information unavailable, For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, Depends on attack - BPATTERNS, L3ANOMALY, SCANS, HTTPDICT DOS, DOSATTACK Information unavailable, For Malware - DNSQUERY, ALLIENDEVICE (if it is contacting the attackers), For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, Depends on attack - L3ANOMALY, Detection after compromise - SCANS, BPATTERNS, BLACKLIST, DIVCOM Information unavailable, Detection after compromise - L3ANOMALY, SCANS, BPATTERNS, COUNTRY, PEERS Information unavailable, Depends on attack - HTTPDICT Information unavailable, Detection after compromise - L3ANOMALY, BPATTERNS, COUNTRY, PEERS, UPLOAD Information unavailable, Detection after compromise - DNSQUERY, BPATTERNS, COUNTRY, PEERS, UPLOAD Information unavailable, Detection after compromise - DNSQUERY, BPATTERNS, COUNTRY, PEERS, UPLOAD Information unavailable, Depends on attack - HTTPDICT Information unavailable, Depends on attack - HTTPDICT Information unavailable, For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, Depends on attack - DNSQUERY, SCANS, BPATTERNS, For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, Depends on attack - L3ANOMALY, SCANS, HTTPDICT, For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, Depends on attack - L3ANOMALY, SCANS, BPATTERNS, For Leak - prob too small to be detected Information unavailable, Depends on attack - L3ANOMALY, SCANS, BPATTERNS, For Leak - prob too small to be detected Information unavailable, Depends on attack - L3ANOMALY, SCANS, HTTPDICT, For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY DOS, DOSATTACK Information unavailable, Depends on attack - L3ANOMALY, BPATTERNS, For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, Depends on attack - L3ANOMALY, BPATTERNS, HTTPDICT For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, Depends on attack - L3ANOMALY, BPATTERNS, HTTPDICT For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, Depends on attack - L3ANOMALY, BPATTERNS, HTTPDICT, DOS Information unavailable, Detection after compromise - L3ANOMALY Information unavailable, For Leak (number of victims unavailable)- BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY, SRVNA Information unavailable, Depends on attack - L3ANOMALY, BPATTERNS, COUNTRY, PEERS Information unavailable COUNTRY, L3ANOMALY DOS, DOSATTACK Information unavailable, Depends on attack - L3ANOMALY, BPATTERNS, HTTPDICT For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Page removed Information unavailable, Depends on attack - DNSQUERY, L3ANOMALY, BPATTERNS, HTTPDICT For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, For Leak (number of victims unavailable)- BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, Depends on attack - L3ANOMALY, BPATTERNS , HTTPDICT For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, Depends on attack - L3ANOMALY, BPATTERNS , HTTPDICT For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable, Depends on attack - L3ANOMALY, BPATTERNS, COUNTRY DOS, DOSATTACK Information unavailable, Depends on attack - L3ANOMALY, SCANS, BPATTERNS, For Leak - prob too small to be detected Page removed Information unavailable, Depends on attack - L3ANOMALY, BPATTERNS, COUNTRY No method available Information unavailable, Depends on attack - L3ANOMALY, BPATTERNS, For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY Information unavailable BLACKLIST, Detection after compromise - BPATTERNS, HIGHTRANSF, DNSQUERY DOS, DOSATTACK DOS, DOSATTACK Information unavailable, Depends on attack - L3ANOMALY, BPATTERNS , COUNTRY, DOS, DOSATTACK Information unavailable, Depends on attack - L3ANOMALY, BPATTERNS,For Leak - BPATTERNS, HIGHTRANSF, UPLOAD, L3ANOMALY

* For Leak -

**Depends on Attack

Detection methods - One for actual type of attack if no information about the attack was present, or was unknown then at least the Flow detection methods or Packet inspection methods were used to discover the consequence of attack and finf out whether the attack is not ongoing anymore. Suricata

Page Removed Information unavailable, For Leak FlowPatterns (FP) Information unavailable, FP FP FP Information unavailable, Leak - FP Information unavailable, FP FP Information unavailable, Packet inspection of signature file of , Post - FP Information unavailable, FP, Post - FP, URL inspection Information unavailable, Packet inspection for signatures of Malware traits, Post - FP Information unavailable, Packet inspection - searching for specific words in packets, FP Information unavailable, (maybe packet inspection of signature file of malwares), Post - FP Information unavailable, (maybe packet inspection of signature file of malwares), Post - FP Information unavailable, (maybe packet inspection of signature file of malwares), Post - FP Information unavailable, FP, Packet inspection (if dictionary attack was made on user name/pass) Information unavailable, FP, Packet inspection (if dictionary attack was made on user name/pass) Information unavailable, Post - FP, (After succesful attack) - Keywords, Exact size of payload Information unavailable, FP, Post - FP, (After succesful attack) Keywords - credit card number, etc. Information unavailable, Post - FP, (After succesful attack) Keywords - email, username..., exact size of payload Information unavailable, FP, Post - FP (After succesful attack) Keywords - name, record, social security number, etc. Information unavailable, FP, Post - FP, (After succesful attack) - Keywords - username, password Information unavailable, FP, Post - FP, (After succesful attack) - Keywords - username, password Information unavailable, FP, Post - FP, (After succesful attack) - Keywords - username, password, last IP FP Information unavailable, FP, Malware signatures in packet inspection, Post - FP, (After succesful attack) - Keywords - Credit card number, username, etc. Information unavailable, FP, Post - FP (After succesful attack) - Keywords - name, address, phone, email Information unavailable, FP, Post - FP, (After succesful attack) - Keywords - username, password, email Information unavailable, FP Information unavailable, Post - FP, (After succesful attack) - Keywords - username, password Information unavailable, Post - FP, (After succesful attack) - Keywords - username, password Information unavailable, FP (if it is known that hackings come from Palestine) Information unavailable, FP FP Information unavailable, FP, Post - FP, (After succesful attack) - Keywords - username, password, email Page removed Information unavailable, FP, Post - FP, (After succesful attack) - Keywords - credit card details, number, CVV, name Information unavailable, Post - FP, (After succesful attack) - Keywords - username, password, email, Size of Payload Information unavailable, FP, Post - FP, (After succesful attack) - Keywords - username, password, type, Size of Payload Information unavailable, FP, Post - FP, (After succesful attack) - Keywords - email, password, Size of Payload Information unavailable, FP FP Information unavailable, FP, Packet inspection can be used to intercept the traffic for vulnerable part of app Page removed Information unavailable, FP, (After succesful attack) - Keywords - email, password No method available Information unavailable, FP, Post - FP, Packet inspection - latest data stolen, proxy settings Information unavailable FP, Post - FP, Packet inspection - emails contained URL of malicious webpage FP FP, Packet inspection - discard traffic containing reference on imgur page for mitigation until the attack is solved Information unavailable, FP Information unavailable, FP, Post - FP, Packet inspection - contain the image formats, Size of payload

Given detection method depends on the:

Given detection method depends on the:

In most of the cases the information on how the "attack" was conducted is missing (due to investigation, secrecy of this information, or by lack of professional skill required to analyze the breach) Therefore detection methods picked are the most common possibilities on how such breach can be detected. There might be some zero day exploits, which can be difficult to detect. Such detection requires precise monitoring of flow patterns (which must perfectly fit on given network, however this might cause unwanted warnings or breaches which could be caused by entropy of human work within a network)

Detection methods - One for actual type of attack if no information about the attack was present, or was unknown then at least the Flow detection methods or Packet inspection methods were used to discover the consequence of attack and finf out whether the attack is not ongoing anymore. Exploit

Nemea

Page Removed Not found Information unavailable, For leak - HOSTSTATSNEMEA Not found Information unavailable, HOSTATSNEMEA, BLACKLIST Not found HOSTSTATSNEMEA Not found HOSTSTATSNEMEA Not found Information unavailable, For Leak - HOSTSTATSNEMEA Not found Information unavailable, HOSTSTATSNEMEA, VPORTSCAN_DETECTOR, HORIZONTALNot SCAN found DETECTOR HOSTSTATSNEMEA Not found Information unavailable, For Leak and attack - BLACKLIST, HOSTSTATSNEMEA Not found Information unavailable, For Leak and attack - BLACKLIST, HOSTSTATSNEMEA Not found Information unavailable,Detection after compromise - BLACKLIST, HOSTSTATSNEMEANot found Information unavailable, SIP_BF_DETECTOR, HOSTSTATSNEMEA Not found Information unavailable, Detection after compromise - HOSTSTATSNEMEA Not found Information unavailable, Detection after compromise - BLACKLIST, HOSTSTATSNEMEANot found Information unavailable, Detection after compromise - HOSTSTATSNEMEA Not found Information unavailable, SIP_BF_DETECTOR, HOSTSTATSNEMEA Not found Information unavailable, SIP_BF_DETECTOR, HOSTSTATSNEMEA Not found Information unavailable, For Leak - BLACKLIST, HOSTSTATSNEMEA Not found Information unavailable, For Leak and attack - HOSTSTATSNEMEA Not found Information unavailable, For Leak - HOSTSTATSNEMEA Not found Information unavailable, SIP_BF_DETECTOR, For Leak and attack - BLACKLIST, HOSTSTATSNEMEANot found Information unavailable, SIP_BF_DETECTOR, HOSTSTATSNEMEA Not found Information unavailable, SIP_BF_DETECTOR, HOSTSTATSNEMEA Not found Information unavailable, SIP_BF_DETECTOR, For Leak and attack - HOSTSTATSNEMEANot found HOSTSTATSNEMEA Not found Information unavailable, For Leak and attack - HOSTSTATSNEMEA Not found Information unavailable, For Leak and attack - HOSTSTATSNEMEA Not found Information unavailable, For Leak and attack - HOSTSTATSNEMEA Not found Information unavailable, HOSTSTATSNEMEA Not found Information unavailable, Detection after compromise - HOSTSTATSNEMEA Not found Information unavailable, For Leak - HOSTSTATSNEMEA Not found Information unavailable, HOSTSTATSNEMEA, BLACKLIST Not found Information unavailable, HOSTSTATSNEMEA Not found HOSTSTATSNEMEA Not found Information unavailable, For Leak and attack - HOSTSTATSNEMEA Not found Page removed Not found Information unavailable, For Leak and attack - HOSTSTATSNEMEA Not found Information unavailable, For Leak - HOSTSTATSNEMEA Not found Information unavailable, For Leak and attack - HOSTSTATSNEMEA Not found Information unavailable, SIP_BF_DETECTOR, For Leak and attack - BLACKLIST, HOSTSTATSNEMEANot found Information unavailable, SIP_BF_DETECTOR, BLACKLIST, HOSTSTATSNEMEA Not found HOSTSTATSNEMEA Not found Information unavailable, HOSTSTATSNEMEA Not found Page removed Not found Information unavailable, HOSTSTATSNEMEA Not found No method available Not found Information unavailable, For Leak and attack - HOSTSTATSNEMEA Not found Information unavailable Not found HOSTSTATSNEMEA Not found HOSTSTATSNEMEA Not found HOSTSTATSNEMEA Not found Information unavailable, HOSTSTATSNEMEA Not found Information unavailable, For Leak and attack - HOSTSTATSNEMEA http://hackolo.com/method-how-to-hack-snapchat-accounts-and-download-chatlogs-and-imagesvideos/

In most of the cases the information on how the "attack" was conducted is missing (due to investigation, secrecy of this information, or by lack of professional skill required to analyze the breach) Therefore detection methods picked are the most common possibilities on how such breach can be detected.

Such detection requires precise monitoring of flow patterns (which must perfectly fit on given network, however this might cause unwanted warnings or breaches which could be caused by entropy of human work within a network)

Detection methods - One for actual type of attack if no information about the attack was present, or was unknown then at least the Flow detection methods or Packet inspection methods were used to discover the consequence of attack and finf out whether the attack is not ongoing anymore. http://hackolo.com/method-how-to-hack-snapchat-accounts-and-download-chatlogs-and-imagesvideos/

size of the leak (format of the datat leaked, encoding, source), If it is only txt form then the detection might not be correct patterns in the network, they may have be created in a way that attack is already part of the pattern (for long lasting attacks with small amount of data sent/received) country from which the attacker commits an attack/or into which data is being uploaded, can be deceived by proxy settings, or using local intermediary receiver unusual behaviour of network, this technique depends solely on thresholds set upon the network (eg. Some hosts might start to communicate together for the first time, unusual usage of uplink for DB server...)

unusual behaviour of network, this technique depends solely on thresholds set upon the network (eg. Some hosts might start to communicate together for the first time, unusual usage of uplink for DB server...) port scanning, if malware tries to find any additional targets, tries to find other infected devices... patterns in the network, they may have be created in a way that attack is already part of the pattern (for long lasting attacks with small amount of data sent/received) dictionary attack, can be present mostly when discussing social media accounts (no social media company has declared a vulnerability within their application, thus social engineering into dictionary attack are most likely possbile attacks) country from which the attacker commits an attack/or into which data is being uploaded, can be deceived by proxy settings, or using local intermediary receiver

Such detection requires precise monitoring of flow patterns (which must perfectly fit on given network, however this might cause unwanted warnings or breaches which could be caused by entropy of human work within a network) size of the leak (format of the datat leaked, encoding, source), If it is only txt form then the detection might not be correct patterns in the network, they may have be created in a way that attack is already part of the pattern (for long lasting attacks with small amount of data sent/received) country from which the attacker commits an attack/or into which data is being uploaded, can be deceived by proxy settings, or using local intermediary receiver unusual behaviour of network, this technique depends solely on thresholds set upon the network (eg. Some hosts might start to communicate together for the first time, unusual usage of uplink for DB server...) unusual behaviour of network, this technique depends solely on thresholds set upon the network (eg. Some hosts might start to communicate together for the first time, unusual usage of uplink for DB server...) port scanning, if malware tries to find any additional targets, tries to find other infected devices... patterns in the network, they may have be created in a way that attack is already part of the pattern (for long lasting attacks with small amount of data sent/received) dictionary attack, can be present mostly when discussing social media accounts (no social media company has declared a vulnerability within their application, thus social engineering into dictionary attack are most likely possbile attacks) country from which the attacker commits an attack/or into which data is being uploaded, can be deceived by proxy settings, or using local intermediary receiver unusual behaviour of network, this technique depends solely on thresholds set upon the network (eg. Some hosts might start to communicate together for the first time, unusual usage of uplink for DB server...) unusual behaviour of network, this technique depends solely on thresholds set upon the network (eg. Some hosts might start to communicate together for the first time, unusual usage of uplink for DB server...) dictionary attack, can be present mostly when discussing social media accounts (no social media company has declared a vulnerability within their application, thus social engineering into dictionary attack are most likely possbile attacks) First dimension

Page Removed 1 Network - Web application attacks - Database attacks - SQL injection 5 Network - Web application attacks - Information Unavailable 2 Information Unavailable 26 Virus/Worm - Malware 8 Denial of service 7 Network - Spoofing/Phishing 3

Second Dimension Categories

Page Removed 1 Information Unavailable 2

Software - Application 14 Software - Application - User 2 Software - Application - User - Social media account 2 Software - Application - User - Email Account 2

Software - Application - Server 1 Software - Application - Server - Web 22 Software - Application - Server - Database 4

Software - Operating System - Windows Family 1 Software - Information unavailable 1 Hardware - Computer - Hard-disks 1

Third Dimension categories

Page Removed 2 Information unavailable 41 No vulnerability - network behaviour 6 Vulnerability in implementation 1 Vulnerability in configuration 1 CVE 2

Fourth Dimension

Page Removed 2 Information unavailable 2 No additional effect 7 Disclosure of information 30 Subversion 7 Corruption of information 3

First Dimension - Denial of service 2 First Dimension - Virus/Worm - Malware 2 First Dimension - Trojan 1 Detection methods

Flowmon

Page Removed 3 No method available 1 Information unavailable 12 Information partially available 28 Information unavailable - Leak 20 Information unavailable - Detection after compromise 6 Detectable attacks 9 ICMPANOM 1 BLACKLIST 1 DOS, DOSATTACK 8 SRVNA 1

Information unavailable but following methods can be theoretically used if more detailed information about the attack was provided SCANS 7 BPATTERNS 20 L3ANOMALY 23 HTTPDICT 13 COUNTRY 5 PEERS 1 DOS 2 ALLIENDEVICE 1 DNSQUERY 2

Methods which should be able to detect the leakage of information after compromise or effects of compromise after succesfully conducted attack BPATTERNS 25 HIGHTRANSF 20 UPLOAD 22 L3ANOMALY 22 BLACKLIST 1 DIVCOM 1 COUNTRY 4 PEERS 4 SCANS 2 DNSQUERY 3 SRVNA 1

28 attacks that could be detected if more information was given 21 attacks can be detected using the information about the leak 9 Detectable attacks Suricata

Page Removed 3 No method available 1 Information unavailable 8 Information partially available 32 Detectable attacks 9 Flow detection methods 9 Packet inspection - check for malicious URL 2

All attacks that can be detected by Flowmon can be also detected by Suricata using their Flow pattern therefore aim was to find more reliable detection methods when information was not available The following list contains other possibilities by which the attacks can be detected using the packet inspection techniques.

Flow detection methods 27 Packet inspection - check for Malware code, signature parts 6 Packet inspection - check for special set of characters in packet 2 Packet inspection - keywords like username, record, credit card number, email,2 password

Methods which should be able to detect the leakage of information after compromise28 or effects of compromise after succesfully conducted attack

Flow detection methods 27 Packet inspection - check for malicious URL 1 Packet inspection - keywords like username, record, credit card number, email,19 password Packet inspection - check for special set of characters in packet 1

Methods which should be able to detect the leakage of information after compromise or effects of compromise after succesfully conducted attack 9 Detectable attacks 32 attacks that could be detected by packet inspection and flows if more information was given 28 attacks can be detected by packet inspection and flows using the information about the leak

Packet inspection - check for malicious URL: Analyses the packet whether it contains malicious URL within the header or hardcoded in the payload Packet inspection - check for specially crafted packet: Analyses the packet whether it is in some kind of special crafted form, meaning that it has deviations from standard packets Packet inspection - check for special set of characters in packet: Analyses the payload whether there are any special sets of characters which are defined as a signature for attack Packet inspection - check for the name or extension of file: Analyses the packet and for vulnerable extensions of files which for example should not be uploaded in the system Nemea

Page Removed 3 No method Available 1 Information unavailable 12 Information partially available 28 Detectable attacks 9 HOSTSTATSNEMEA 9

Information unavailable but following methods can be theoretically used if more detailed information about the attack was provided All attacks that can be detected by Flowmon can be also detected by Suricata using their Flow pattern therefore aim was to find more reliable detection methods when information was not available HOSTSTATSNEMEA 29 BLACKLIST 7 SIP_BF_DETECTOR 9 VPORTSCAN_DETECTOR 1 HORIZONTAL SCAN DETECTOR 1

Methods which should be able to detect the leakage of information after compromise or effects of compromise after succesfully conducted attack

HOSTSTATSNEMEA 25 BLACKLIST 7

28 attacks that could be detected if more information was given 21 attacks can be detected using the information about the leak 9 Detectable attacks

32 attacks that could be detected by packet inspection and flows if more information was given 28 attacks can be detected by packet inspection and flows using the information about the leak

Packet inspection - check for malicious URL: Analyses the packet whether it contains malicious URL within the header or hardcoded in the payload Packet inspection - check for specially crafted packet: Analyses the packet whether it is in some kind of special crafted form, meaning that it has deviations from standard packets Packet inspection - check for special set of characters in packet: Analyses the payload whether there are any special sets of characters which are defined as a signature for attack Packet inspection - check for the name or extension of file: Analyses the packet and for vulnerable extensions of files which for example should not be uploaded in the system Information unavailable but following methods can be theoretically used if more detailed information about the attack was provided All attacks that can be detected by Flowmon can be also detected by Suricata using their Flow pattern therefore aim was to find more reliable detection methods when information was not available

Methods which should be able to detect the leakage of information after compromise or effects of compromise after succesfully conducted attack

Packet inspection - check for specially crafted packet: Analyses the packet whether it is in some kind of special crafted form, meaning that it has deviations from standard packets Packet inspection - check for special set of characters in packet: Analyses the payload whether there are any special sets of characters which are defined as a signature for attack Packet inspection - check for the name or extension of file: Analyses the packet and for vulnerable extensions of files which for example should not be uploaded in the system