Cyber breaches abound in 2019

Cyber breaches abound in 2019

News of high-profile cyber breaches has been uncharacteristically subdued in recent quarters.

Is this a harbinger of a worse hacking landscape in 2019?

The answer is unequivocally yes. No question, cyber breaches have been a gigantic thorn in the global economy for years. But expect them to be even more rampant in this new year 2019 as chronically improving malware will be deployed more aggressively on more fronts. Also  data-driven businesses simultaneously move into the “target zone” of cyber attacks.

On the cybersecurity side, a growing number of experts believe that multi-factor authentication will become the standard for all online businesses.

Here are links to some articles that can hopefully help you to handle your cyber security better:

Cybersecurity 101: Why you need to use a password manager

Cybersecurity 101: Five simple security guides for protecting your privacy


  1. Tomi Engdahl says:

    FBI Seizes Website Suspected Of Selling Access To Billions Of Pieces Of Stolen Data

    U.S. authorities have seized the domain name of a website that allegedly sold access to billions of usernames, email addresses, passwords and other sensitive information stolen in data breaches.

    Now, visitors to the not-so-subtle website – — are greeted with a homepage that reads, “This Domain Has Been Seized.”

    The Justice Department and the FBI took control of the site as part of a “comprehensive law enforcement action” involving authorities in Germany, Northern Ireland, the U.K. and the Netherlands. Two men in Europe have been arrested so far in connection with the site.

    WeLeakInfo billed itself as a “search engine” that subscribers could use to pore over data illegally obtained from more than 10,000 data breaches, U.S. authorities said in a statement. Domain Name Seized

    Site Had Sold Access to Hacked Personal Information and Account Logins

    The website had claimed to provide its users a search engine to review and obtain the personal information illegally obtained in over 10,000 data breaches containing over 12 billion indexed records – including, for example, names, email addresses, usernames, phone numbers, and passwords for online accounts. The website sold subscriptions so that any user could access the results of these data breaches, with subscriptions providing unlimited searches and access during the subscription period (one day, one week, one month, or three months).

  2. Tomi Engdahl says:


    Things are getting spicy in the internet world and we are filling you in on it!

    Storm clouds are gathering in the world of cybersecurity.

    We’ve written lots about the site Have I Been Pwned, which maintains a massive database of leaked credentials so that victims can see if they’re affected. The bizarro world version of that is sites like WeLeakInfo, which takes that same data breach data and sells it for rock bottom prices to hackers who want to exploit it. This week, the FBI announced that it had seized WeLinkInfo

  3. Tomi Engdahl says:

    Hacker leaks passwords for more than 500,000 servers, routers, and IoT devices
    The list was shared by the operator of a DDoS booter service.

    A hacker has published this week a massive list of Telnet credentials for more than 515,000 servers, home routers, and IoT (Internet of Things) “smart” devices.

    The list, which was published on a popular hacking forum, includes each device’s IP address, along with a username and password for the Telnet service, a remote access protocol that can be used to control devices over the internet.

  4. Tomi Engdahl says:

    Adult Site Leaks 20GB of Porn Cam Models Data, Including Names, Passport Scans

    More than 875,000 files that included data belonging to over 4,000 models working on adult websites have been exposed in a nearly 20GB data publicly available on an Amazon server located in Virginia.

    Security researchers at vpnMentor reveal in an analysis of the leak that the server belongs to adult affiliate network PussyCash, owner of ImLive and having more than 66 million members.

    The exposed data includes extremely sensitive information belonging to the cam models, including full names, birth date and birth place, nationality, passport ID numbers and details, ID photo, signature, fingerprints, and emergency contacts. Furthermore, the researchers discovered photographs and scans of full passports and national identification cards with visible data such as full home addresses and ID photos.

    Unsecured and unencrypted database
    Some of the folders are likely to be up to 20 years old, but at the same time, the most recent folders are believed to have been created approximately a few weeks ago.

    The database was completely unsecured and unencrypted, vpnMentor says, and a browser was the only tool required to access all files hosted on the server.

  5. Tomi Engdahl says:

    Liza Lin / Wall Street Journal:
    An unsecured facial-recognition database with info on thousands of children from 20 schools in China, half in areas with large Tibetan populations, found online

    Thousands of Chinese Students’ Data Exposed on Internet
    Information leak from facial-recognition database raises questions about school surveillance and cybersecurity in China

    A Chinese facial-recognition database with information on thousands of children was stored without protection on the internet, a researcher discovered, raising questions about school surveillance and cybersecurity in China.

  6. Tomi Engdahl says:

    Mitsubishi Electric discloses security breach, China is main suspect
    In a short statement published today on its website, Mitsubishi
    Electric, one of the world’s largest electronics and electrical
    equipment manufacturing firms, disclosed a major security breach..
    Although the breach occurred last year, on June 28, and an official
    internal investigation began in September, the Tokyo-based corporation
    disclosed the security incident today, only after two local
    newspapers, the Asahi Shimbun and Nikkei, published stories about the
    hack.. Both publications blamed the intrusion on a Chinese-linked
    cyber-espionage group named Tick (or Bronze Butler), known to the
    cyber-security industry for targeting Japan over the past few years

  7. Tomi Engdahl says:

    Hanna Andersson Data Breach: Hackers Compromise Website of Children’s Clothier

    Portland, Oregon-based children’s clothing maker Hanna Andersson has quietly disclosed a breach to affected customers. Very few details of the breach have been made public.


Leave a Comment

Your email address will not be published. Required fields are marked *