SlideShare a Scribd company logo
1 of 1
Download to read offline
DAMAGE CAUSED by Application Layer Breaches
2014:THE YEAR OF THE
LAYER BREACHThe number of high-profile breaches increased in 2014. Many of the largest breaches
had one thing in common: they were attacked through the application layer.
GLOBAL
CYBER
INCIDENTS
Reported
Yearly
© 2015 Tellagraff, LLC
SOURCE:
Global Cyber Incidents Chart: The Global State of Information Security Survey
Target: www.cio.com/article/2600345/security0/11-steps-attackers-took-to-crack-target.html AND
https://corporate.target.com/about/shopping-experience/payment-card-issue-FAQ#q5888
Michaels: wwww.nytimes.com/2014/04/19/business/michaels-stores-confirms-breach-involving-three-million-customers.html?_r=0 AND
www.darkreading.com/attacks-breaches/michaels-data-breach-response-7-facts/d/d-id/1204630
Community Health: www.csoonline.com/article/2466726/data-protection/heartbleed-to-blame-for-community-health-systems-breach.html AND
www.reuters.com/article/2014/08/18/us-community-health-cybersecurity-idUSKBN0GI16N20140818
eBay: http://securityaffairs.co/wordpress/25177/hacking/critical-ebay-vulnerabilities.html, http://thehackernews.com/2014/05/worst-day-for-ebay-multiple-flaws-leave.html AND
http://www.cnet.com/news/ebay-hacked-requests-all-users-change-passwords/
Home Depot: http://krebsonsecurity.com/tag/home-depot-breach/ AND www.wsj.com/articles/home-depot-breach-bigger-than-targets-1411073571
Neiman Marcus: www.nytimes.com/2014/01/24/business/neiman-marcus-breach-affected-1-1-million-cards.html AND
www.bloomberg.com/bw/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-data
JPMorgan Chase: www.businessinsider.com/r-jp-morgan-found-hackers-through-breach-of-corporate-event-website-wsj-2014-10
Sony: www.wired.com/2014/12/sony-hack-what-we-know/
Target
HOW: A sophisticated kill
chain, including exploitation of
a vulnerable web application.
RESULT: Hackers stole
names, mailing addresses,
phone numbers and email
addresses from over 70
million shoppers.
Michaels
HOW: Vulnerabilities
were targeted in
point-of-sale systems.
RESULT: Credit cards of
2.6 million Michaels’
customers were affected.
Community
Health
HOW: A flaw was targeted
in OpenSSL, CVE-2014-0160,
better known as Heartbleed
RESULT: The theft of social
security numbers and other
personal data belonging to
4.5 million patients occurred.
eBay
HOW: Security
researchers found
critical vulnerabilities in the
company’s web applications.
RESULT: Contact and login
information for 233 million
eBay customers was stolen.
Neiman
Marcus
HOW: RAM scraper
malware exploited
vulnerabilities in software,
allowing applications to
read each other’s memories.
RESULT: Credit card
information of 350,000
individuals was stolen.
Sony
HOW: Security experts suspect a
phishing attack or the exploitation of
a web application vulnerability.
RESULT: Hundreds of hard drives were
wiped, millions of emails were stolen and
leaked, and 6 unreleased films in digital
format were leaked.
Home Depot
HOW: A combination of credentials
stolen from a third-party vendor and a
vulnerability in a Microsoft product provided
access to point-of-sale devices.
RESULT: 56 million accounts were put at risk,
and the company expected to pay $62 million
to cover the costs of the attack.
JPMorgan
Chase
HOW: A vulnerability was
found in a website built and
maintained by a third-party
vendor in support of a charity.
RESULT: Usernames and
passwords for 76 million
households and 7 million
business accounts were stolen.
Forrester Research: Planning for Failure
https://info.veracode.com/analyst-report-planning-for-failure-by-forrester.html
© 2015 Veracode. All rights reserved.
WANT TO
DIG DEEPER?
3.4
9.4
22.7 24.9
28.9
42.8
2009 2010 2011 2012 2013 2014
MILLIONS

More Related Content

What's hot

Top 10 cyber crime stories of 2012
Top 10 cyber crime stories of 2012Top 10 cyber crime stories of 2012
Top 10 cyber crime stories of 2012Patricia Makaveli
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceDulanja Liyanage
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summarySymantec Italia
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity FinalCindy Kim
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006Alan Mather
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicPing Identity
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
Lessons Learned from Cyber Incidents in 2016
Lessons Learned from Cyber Incidents in 2016Lessons Learned from Cyber Incidents in 2016
Lessons Learned from Cyber Incidents in 2016CBIZ, Inc.
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websitesBee_Ware
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageCindy Kim
 
Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?IBM Security
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017malvvv
 
Infographic: Mobile Identity Management Trends in the Enterprise
Infographic: Mobile Identity Management Trends in the EnterpriseInfographic: Mobile Identity Management Trends in the Enterprise
Infographic: Mobile Identity Management Trends in the EnterpriseSymplified
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019- Mark - Fullbright
 
Cyber security
Cyber securityCyber security
Cyber securityJoseMerda1
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyFirst Atlantic Commerce
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsOilPriceInformationService
 

What's hot (20)

Compilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacksCompilation of phishing and keylogger attacks
Compilation of phishing and keylogger attacks
 
Top 10 cyber crime stories of 2012
Top 10 cyber crime stories of 2012Top 10 cyber crime stories of 2012
Top 10 cyber crime stories of 2012
 
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in CyberspaceColombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
Colombo White Hat Security 3rd Meetup - Recent Trends & Attacks in Cyberspace
 
Report on Rogue Security Software: a summary
Report on Rogue Security Software: a summaryReport on Rogue Security Software: a summary
Report on Rogue Security Software: a summary
 
Balancing Security & Authencity Final
Balancing Security & Authencity FinalBalancing Security & Authencity Final
Balancing Security & Authencity Final
 
eCrime Conference March 2006
eCrime Conference March 2006eCrime Conference March 2006
eCrime Conference March 2006
 
Security Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | InfographicSecurity Practices: The Generational Gap | Infographic
Security Practices: The Generational Gap | Infographic
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Lessons Learned from Cyber Incidents in 2016
Lessons Learned from Cyber Incidents in 2016Lessons Learned from Cyber Incidents in 2016
Lessons Learned from Cyber Incidents in 2016
 
The growing hacking threat to websites
The growing hacking threat to websitesThe growing hacking threat to websites
The growing hacking threat to websites
 
Social Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the MessageSocial Media Balancing Security & Authenticity without Controlling the Message
Social Media Balancing Security & Authenticity without Controlling the Message
 
Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?Is Your Dating App Breaking Your Heart?
Is Your Dating App Breaking Your Heart?
 
Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017Kaspersky lab financial_cyberthreats_in_2017
Kaspersky lab financial_cyberthreats_in_2017
 
Infographic: Mobile Identity Management Trends in the Enterprise
Infographic: Mobile Identity Management Trends in the EnterpriseInfographic: Mobile Identity Management Trends in the Enterprise
Infographic: Mobile Identity Management Trends in the Enterprise
 
ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019ISTR Internet Security Threat Report 2019
ISTR Internet Security Threat Report 2019
 
B istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-usB istr main-report_v18_2012_21291018.en-us
B istr main-report_v18_2012_21291018.en-us
 
Cyber security
Cyber securityCyber security
Cyber security
 
Driving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your EnemyDriving Payment Innovation - Know Your Enemy
Driving Payment Innovation - Know Your Enemy
 
Ey giss-under-cyber-attack
Ey giss-under-cyber-attackEy giss-under-cyber-attack
Ey giss-under-cyber-attack
 
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your AssetsWeak Links: Cyber Attacks in the News & How to Protect Your Assets
Weak Links: Cyber Attacks in the News & How to Protect Your Assets
 

Viewers also liked

What are the requirements for effective segmentation
What are the requirements for effective segmentationWhat are the requirements for effective segmentation
What are the requirements for effective segmentationSameer Mathur
 
La Comunicación Humana.ppt
La Comunicación Humana.pptLa Comunicación Humana.ppt
La Comunicación Humana.pptkattyrivero7
 
What major psychological processes influence consumer responses to the market...
What major psychological processes influence consumer responses to the market...What major psychological processes influence consumer responses to the market...
What major psychological processes influence consumer responses to the market...Sameer Mathur
 
ORACLE CERTIFICATES
ORACLE CERTIFICATES ORACLE CERTIFICATES
ORACLE CERTIFICATES Ayman Yahia
 
Using Video in Small Business - NAPO June 16, 2015
Using Video in Small Business - NAPO June 16, 2015Using Video in Small Business - NAPO June 16, 2015
Using Video in Small Business - NAPO June 16, 2015Matt White
 
Planificacion clase 4 prezi
Planificacion clase 4 preziPlanificacion clase 4 prezi
Planificacion clase 4 prezimarcelaribba
 
How should business market be segmented
How should business market be segmentedHow should business market be segmented
How should business market be segmentedSameer Mathur
 
What are different levels of marketing segmentation
What are different levels of marketing segmentationWhat are different levels of marketing segmentation
What are different levels of marketing segmentationSameer Mathur
 
Buying decisions process -Q3,4
Buying decisions process -Q3,4Buying decisions process -Q3,4
Buying decisions process -Q3,4Sameer Mathur
 

Viewers also liked (12)

What are the requirements for effective segmentation
What are the requirements for effective segmentationWhat are the requirements for effective segmentation
What are the requirements for effective segmentation
 
La Comunicación Humana.ppt
La Comunicación Humana.pptLa Comunicación Humana.ppt
La Comunicación Humana.ppt
 
What major psychological processes influence consumer responses to the market...
What major psychological processes influence consumer responses to the market...What major psychological processes influence consumer responses to the market...
What major psychological processes influence consumer responses to the market...
 
ORACLE CERTIFICATES
ORACLE CERTIFICATES ORACLE CERTIFICATES
ORACLE CERTIFICATES
 
Using Video in Small Business - NAPO June 16, 2015
Using Video in Small Business - NAPO June 16, 2015Using Video in Small Business - NAPO June 16, 2015
Using Video in Small Business - NAPO June 16, 2015
 
Planificacion clase 4 prezi
Planificacion clase 4 preziPlanificacion clase 4 prezi
Planificacion clase 4 prezi
 
HEZKIDETZAN ESKU HARTZEN AURKEZPENA #mooteu15
HEZKIDETZAN ESKU HARTZEN AURKEZPENA #mooteu15HEZKIDETZAN ESKU HARTZEN AURKEZPENA #mooteu15
HEZKIDETZAN ESKU HARTZEN AURKEZPENA #mooteu15
 
How should business market be segmented
How should business market be segmentedHow should business market be segmented
How should business market be segmented
 
Colegial News - Edição 14
Colegial News - Edição 14Colegial News - Edição 14
Colegial News - Edição 14
 
What are different levels of marketing segmentation
What are different levels of marketing segmentationWhat are different levels of marketing segmentation
What are different levels of marketing segmentation
 
Buying decisions process -Q3,4
Buying decisions process -Q3,4Buying decisions process -Q3,4
Buying decisions process -Q3,4
 
Seizure disorder
Seizure disorderSeizure disorder
Seizure disorder
 

Similar to Year of the AppSec Breach_Forrester

Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyougUlf Mattsson
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6seadeloitte
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineRapidSSLOnline.com
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattssonUlf Mattsson
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsBen Graybar
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game Rahul Neel Mani
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application TriState Technology
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce websiteDr. Raghavendra GS
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSantiago Cavanna
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019ImekDesign
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodesciccone
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachUlf Mattsson
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsPriyanka Aash
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trumpMAXfocus
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data securityUlf Mattsson
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessYork Risk
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016thinkASG
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsGDSCCVR
 

Similar to Year of the AppSec Breach_Forrester (20)

Key note in nyc the next breach target and how oracle can help - nyoug
Key note in nyc   the next breach target and how oracle can help - nyougKey note in nyc   the next breach target and how oracle can help - nyoug
Key note in nyc the next breach target and how oracle can help - nyoug
 
November 2017: Part 6
November 2017: Part 6November 2017: Part 6
November 2017: Part 6
 
Symantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnlineSymantec Website Security Threat Report 2014 - RapidSSLOnline
Symantec Website Security Threat Report 2014 - RapidSSLOnline
 
Who is the next target and how is big data related ulf mattsson
Who is the next target and how is big data related   ulf mattssonWho is the next target and how is big data related   ulf mattsson
Who is the next target and how is big data related ulf mattsson
 
Updated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools TacticsUpdated Cyber Security and Fraud Prevention Tools Tactics
Updated Cyber Security and Fraud Prevention Tools Tactics
 
Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game   Cybersecurity: Mock Cyberwar Game
Cybersecurity: Mock Cyberwar Game
 
Best Security Practices for a Web Application
Best Security Practices for a Web Application Best Security Practices for a Web Application
Best Security Practices for a Web Application
 
Critical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the BoardroomCritical Update Needed: Cybersecurity Expertise in the Boardroom
Critical Update Needed: Cybersecurity Expertise in the Boardroom
 
Security troubles in e commerce website
Security troubles in e commerce websiteSecurity troubles in e commerce website
Security troubles in e commerce website
 
Segurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago CavannaSegurinfo2014 Santiago Cavanna
Segurinfo2014 Santiago Cavanna
 
Adam Bulava GCC 2019
Adam Bulava GCC 2019Adam Bulava GCC 2019
Adam Bulava GCC 2019
 
application-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracodeapplication-security-fallacies-and-realities-veracode
application-security-fallacies-and-realities-veracode
 
Verizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breachVerizon 2014 data breach investigation report and the target breach
Verizon 2014 data breach investigation report and the target breach
 
Evidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five ControlsEvidence-Based Security: The New Top Five Controls
Evidence-Based Security: The New Top Five Controls
 
Year of pawnage - Ian trump
Year of pawnage  - Ian trumpYear of pawnage  - Ian trump
Year of pawnage - Ian trump
 
Who is the next target proactive approaches to data security
Who is the next target   proactive approaches to data securityWho is the next target   proactive approaches to data security
Who is the next target proactive approaches to data security
 
Vodqa why cybersecurity
Vodqa   why cybersecurityVodqa   why cybersecurity
Vodqa why cybersecurity
 
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your BusinessThe Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
The Devastating Consequences Of Cyber Crime: Six Tips To Protect Your Business
 
IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016IBM X-Force Threat Intelligence Report 2016
IBM X-Force Threat Intelligence Report 2016
 
Info Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study JamsInfo Session on Cybersecurity & Cybersecurity Study Jams
Info Session on Cybersecurity & Cybersecurity Study Jams
 

Year of the AppSec Breach_Forrester

  • 1. DAMAGE CAUSED by Application Layer Breaches 2014:THE YEAR OF THE LAYER BREACHThe number of high-profile breaches increased in 2014. Many of the largest breaches had one thing in common: they were attacked through the application layer. GLOBAL CYBER INCIDENTS Reported Yearly © 2015 Tellagraff, LLC SOURCE: Global Cyber Incidents Chart: The Global State of Information Security Survey Target: www.cio.com/article/2600345/security0/11-steps-attackers-took-to-crack-target.html AND https://corporate.target.com/about/shopping-experience/payment-card-issue-FAQ#q5888 Michaels: wwww.nytimes.com/2014/04/19/business/michaels-stores-confirms-breach-involving-three-million-customers.html?_r=0 AND www.darkreading.com/attacks-breaches/michaels-data-breach-response-7-facts/d/d-id/1204630 Community Health: www.csoonline.com/article/2466726/data-protection/heartbleed-to-blame-for-community-health-systems-breach.html AND www.reuters.com/article/2014/08/18/us-community-health-cybersecurity-idUSKBN0GI16N20140818 eBay: http://securityaffairs.co/wordpress/25177/hacking/critical-ebay-vulnerabilities.html, http://thehackernews.com/2014/05/worst-day-for-ebay-multiple-flaws-leave.html AND http://www.cnet.com/news/ebay-hacked-requests-all-users-change-passwords/ Home Depot: http://krebsonsecurity.com/tag/home-depot-breach/ AND www.wsj.com/articles/home-depot-breach-bigger-than-targets-1411073571 Neiman Marcus: www.nytimes.com/2014/01/24/business/neiman-marcus-breach-affected-1-1-million-cards.html AND www.bloomberg.com/bw/articles/2014-02-21/neiman-marcus-hackers-set-off-60-000-alerts-while-bagging-credit-card-data JPMorgan Chase: www.businessinsider.com/r-jp-morgan-found-hackers-through-breach-of-corporate-event-website-wsj-2014-10 Sony: www.wired.com/2014/12/sony-hack-what-we-know/ Target HOW: A sophisticated kill chain, including exploitation of a vulnerable web application. RESULT: Hackers stole names, mailing addresses, phone numbers and email addresses from over 70 million shoppers. Michaels HOW: Vulnerabilities were targeted in point-of-sale systems. RESULT: Credit cards of 2.6 million Michaels’ customers were affected. Community Health HOW: A flaw was targeted in OpenSSL, CVE-2014-0160, better known as Heartbleed RESULT: The theft of social security numbers and other personal data belonging to 4.5 million patients occurred. eBay HOW: Security researchers found critical vulnerabilities in the company’s web applications. RESULT: Contact and login information for 233 million eBay customers was stolen. Neiman Marcus HOW: RAM scraper malware exploited vulnerabilities in software, allowing applications to read each other’s memories. RESULT: Credit card information of 350,000 individuals was stolen. Sony HOW: Security experts suspect a phishing attack or the exploitation of a web application vulnerability. RESULT: Hundreds of hard drives were wiped, millions of emails were stolen and leaked, and 6 unreleased films in digital format were leaked. Home Depot HOW: A combination of credentials stolen from a third-party vendor and a vulnerability in a Microsoft product provided access to point-of-sale devices. RESULT: 56 million accounts were put at risk, and the company expected to pay $62 million to cover the costs of the attack. JPMorgan Chase HOW: A vulnerability was found in a website built and maintained by a third-party vendor in support of a charity. RESULT: Usernames and passwords for 76 million households and 7 million business accounts were stolen. Forrester Research: Planning for Failure https://info.veracode.com/analyst-report-planning-for-failure-by-forrester.html © 2015 Veracode. All rights reserved. WANT TO DIG DEEPER? 3.4 9.4 22.7 24.9 28.9 42.8 2009 2010 2011 2012 2013 2014 MILLIONS