Top 10 Biggest data breach happened in 21st century

Top 10 Biggest data breach happened in the 21st century :


Data breaches are now very common. The 21st century is a data-driven age. Storing and using sensitive user data by companies are also common things. This data storing companies are the most favorite target for hackers. These companies are now facing more cyber attacks.

This major cyber attack also leads to a data breach. Where millions of user data are leaked online. This makes user privacy at risk. Sometimes user data is sold on the dark web or just leaked online.

The main reason for a data breach is companies don’t take cybersecurity seriously. They don’t check and measure their IT security. Hackers always try to find the vulnerabilities and hack into their system.No matter what type of companies they are small or big, the hackers always try to hack into their system to get sensitive data.

Here we will take a look at the Biggest Data Breach in the 21st century.


Top 10 Biggest data breach happened in the 21st century


Adobe – 

Date: October 2013

In this data breach, 153 million user records were leaked. As reported in early October of 2013 by security blogger Brian Krebs, Adobe originally reported that hackers had stolen nearly 3 million encrypted customer login data and credit card data for an undetermined number of user accounts.

The security researcher reported that a file posted includes more than 150 million usernames and hashed password pairs of Adobe users. Weeks of research showed that the hack had also exposed customer names, IDs, passwords, and debit and credit card information.

eBay – 

Date: May 2014


145 million eBay users data were leaked in this data breach.eBay reported that an attack exposed its entire account list of 145 million users in May 2014, including names, addresses, dates of birth and encrypted passwords. 

The online auction giant said hackers used the credentials of three corporate employees to access its network and had complete access for 229 days, that is enough time to compromise the user database.


MySpace –

Date: May 2016

360 million accounts affected in this data breach.MySpace was the leading social media platform before the emergence of Facebook. But it was not concerned about its data security. And the company never really took user data seriously. Myspace pages can be hacked and users can embed whatever content they desire. 

An investigation by independent security researchers suggested that the breach occurred sometime in the mid-2000s.In 2016, a Russian hacker going by the nickname Peace put the MySpace data of more than 360 million accounts on sale. 


Marriott –

Date – November 2018

Marriott is one of the hotel chains whose data were hacked and leaked online.Marriott said in November 2018 that hackers had stolen personal information of more than 500 million guests who had booked rooms or stayed at properties run by its Starwood subsidiary. 

The data breach began in 2014, about two years before Marriott acquired Starwood Hotels, and continued through much of 2018. The stolen details included names, street addresses, emails, passport numbers, genders, and dates of birth of more than 500 million customers.


Yahoo – 

Date: August 2013

This is by far the biggest data breach in the history of the Internet. In August 2013, unidentified hackers broke into Yahoo servers to steal the data of more than 3 billion users. It means every single account on Yahoo, Tumblr, Flickr, and other Yahoo-owned properties was compromised. But Yahoo reported the security breach only in 2016. The company also revealed that another hack conducted by “a state-sponsored actor” in late 2014 compromised the data of 500 million users. The US government indicted Russian hackers for the 2014 data breach.


NetEase –

Date: October 2015

235 million user accounts were leaked in this data breach.NetEase is a provider of mailbox services through the likes of and It was reported that email addresses and plaintext passwords of some 235 million accounts from NetEase customers were being sold by a dark web marketplace vendor known as DoubleFlag. The same vendor was also selling information taken from other Chinese giants such as Tencent’s

This data breach also shows that many companies still don’t use any encryption.

Dubsmash :

Date:  December 2018

162 million user accounts were leaked in this data breach.In December 2018, Dubsmash the New York-based video messaging service had 162 million email addresses, usernames, PBKDF2 password hashes, and other personal data such as dates of birth stolen, all of which was then put up for sale on the Dream Market dark web market the following December. The information was being sold as part of a collected dump also including the likes of MyFitnessPal (more on that below), MyHeritage (92 million), ShareThis, Armor Games, and dating app CoffeeMeetsBagel.

LinkedIn :

Date – 2016 

As the major social network for business professionals, LinkedIn has become an attractive place for attackers looking to conduct social engineering attacks. However, it has also fallen victim to leaking user data in the past.

In 2012 the company announced that 6.5 million unassociated passwords (unsalted SHA-1 hashes) were stolen by attackers and posted onto a Russian hacker forum. However, it wasn’t until 2016 that the full extent of the incident was revealed. The same hacker selling MySpace’s data was found to be offering the email addresses and passwords of around 165 million Linkedin users.LinkedIn acknowledged that it had been made aware of the breach, and said it had reset the passwords of affected accounts.


Equifax :

Date: July 2017

147.9 million users were affected in this data breach.Between May and July 2017, hackers broke into credit reporting agency Equifax’s systems to access the data of more than 143 million users. Though Equifax later said that it’s 145 million, security experts put the number of affected users at around 147.9 million. 

It is one of the most damaging data breaches in history. However, Equifax didn’t report the breach until September 2017. Hackers managed to get  millions of user data , including names, street addresses, driver’s license numbers, birth dates, and even social security numbers. Hackers exploited a vulnerability in the open-source software Apache Struts to access its servers.


Facebook :

Date : September 2018

87 million leaked in this data breach.This happened for the Cambridge Analytica scandal where the data-collecting firm illegally harvested users’ info without their permission.Some security researchers told that this  secret operation was politically motivated. And though the breach occurred a couple years ago, it’s only this year that investigatory conclusions have come out and it shows that 87 million user data were exposed by hackers.

Data breach is now very common. Even small companies are getting hacked. So companies should secure their It infrastructure. They can regularly check their It security and do a security audit. Sometimes it’s not possible to set up a cyber security team. Because of costing and not finding skilled cyber security professionals.So they can use VAPT service for IT security audits. The VAPT service or Vulnerability Assessment and Penetration Testing service help to find the vulnerability in the system and the company can fix the problem to protect from any type of cyber attack.

Network Penetration Testing tools

Network Penetration Testing tools

Penetration testing tools, commonly known as pen-testing is on a roll in the testing circle nowadays. The reason is not too hard to guess – with the change in the way computer systems are used and built, security takes the center stage. Even though companies realize that they can’t make every system 100% secure, they are extremely interested to know exactly what kind of security issues they are dealing with so for that reasons company need to secure. So the best services provided by ICSS it is now rated as top ranked in google search engine.



What is penetration testing?

Penetration testing is a simulated cyber attack where professional ethical hackers break into corporate networks to find weaknesses before attackers do.  A penetration test, also known as a pen test, is a simulated cyber-attack against your computer system to check for exploitable vulnerabilities It’s like in the movie Sneakers, where hacker-consultants break into your corporate networks to find weaknesses before attackers do. It’s a simulated cyber-attack where the pen tester or ethical hacker uses the tools and techniques available to malicious hackers. In the context of web application security, penetration testing is commonly used to augment a web application firewall. Back in ye older days of yore, hacking was hard and required a lot of manual bit fiddling. Today, though, a full suite of automated testing tools turns hackers into cyborgs, computer-enhanced humans who can test far more than ever before. Pen testing can involve the attempted breaching of any number of application systems.

There is a considerable amount of confusion in the industry regarding the differences between vulnerability scanning and penetration testing, as the two phrases are commonly interchanged. However, their meaning and implications are very different. A vulnerability assessment simply identifies and reports noted vulnerabilities, whereas a penetration test(Pen test) attempts to exploit the vulnerabilities to determine whether unauthorized access or other malicious activity is possible. Penetration testing typically includes network penetration testing and application security testing as well as controls and processes around the networks and applications, and should occur from both outside the network trying to come in (external testing) and from inside the network. So this was about the penetration testing system in brief so to know more we need to know about network penetration testing tools.


What Is a Penetration Testing Tools?

Penetration testing tools are used as part of a penetration test (Pen Test) to automate certain tasks, improve testing efficiency and discover issues that might be difficult to find using manual analysis techniques alone. Two common penetration testing tools are static analysis tools and dynamic analysis tools. Vera code performs both dynamic and static code analysis and finds security vulnerabilities that include malicious code as well as the absence of functionality that may lead to security breaches. For example, Vera code can determine whether sufficient encryption is employed and whether a piece of software contains any application backdoors through hard-coded user names or passwords. Vera code’s binary scanning approach produces more accurate testing results, using methodologies developed and continually refined by a team of world-class experts. And because Vera code returns fewer false positives, penetration testers and developers can spend more time remediating problems and less time sifting through non-threats.



Different Tools:

The different types of tools present in network penetration testing are:


Nessus is a popular paid-for tool for scanning vulnerabilities in a computing system or network. It is amazingly easy to use, offers fast and accurate scanning, and can provide you with a comprehensive outlook of your network’s weaknesses at the click of a button.




Metasploit is a very popular collection of various penetration tools. Cyber security professionals and other IT experts have used it for years to accomplish various objectives, including discovering vulnerabilities, managing security evaluations, and formulating defense methodologies.




Nmap,also known as network mapper, is a free and open source tool for scanning your systems or networks for vulnerabilities. The tool is also helpful in carrying out other activities, including monitoring host or service uptime and performing mapping of network attack surfaces.


Wireshark is a handy tool that can assist you to see the minutest details of the activities taking place in your network. It is an actual network analyzer, network sniffer, or network protocol analyzer for assessing the vulnerabilities of your network traffic in real time.




Aircrack-ng,is a comprehensive collection of utilities for analyzing the weaknesses in a WiFi network. The tool allows you to monitor the security of your WiFi network by capturing data packets and exporting them to text files for further analysis. You can also verify the performance of WiFi cards through capture and injection.


John the Ripper:

One of the most prominent cyber security risks is the use of the traditional passwords. Attackers usually compromise users’ passwords and use them to steal important credentials, enter sensitive systems, or cause other forms of damage.



Network Penetration Testing Services


In security as in life, the hardest weaknesses to pinpoint are your own. Fortunately, we have no problem thoroughly documenting all of your flaws. In fact, it’s kind of our job. And that’s a good thing: Knowing your vulnerabilities—and the ways in which attackers could exploit them—is one of the greatest insights you can get in improving your security program. With that in mind, Rapid7’s Penetration Testing Services team will simulate a real-world attack on your networks, applications, devices, and/or people to demonstrate the security level of your key systems and infrastructure and show you what it will take to strengthen it. Much like your mom, we don’t highlight your failings because it bothers you—we do it because we care.

We provide services to many different companies still now we have many more clients I would like to explain one client service experience with our company. NALCO (National Aluminum Company Limited) is a Navratna CPSE under Ministry of Mines. The scope of work was defined by the client (NALCO). The layout of the web application was share with Indian Cyber Security Solutions. NDA documents (Non-Disclosure-Agreement) signed between both the parties.Next step for the parties risk management and mitigation has started, evaluating the key assets involve in the web application. Few critical level of vulnerabilities were found by Indian Cyber Security Solutions such as ‘SQL Injection’, ‘Blind SQL Injection’ and ‘Stored Cross-Site Scripting’.







Network Penetration Testing Tools is a title best suited for ICSS. This is because we offer the most viable and assured cyber security solutions to every IT firm and online ventures. The reason ICSS have appeared in the cyber security genre because the virtual world is the future. We believe that securing the future for the betterment of the society is our responsibility and duty.

The grave crisis that is inflicting fatal wounds on the digital security framework is the hacking intentions on IT networks. These are the most susceptible aspects of every online system because the data in transit are very vulnerable. So it’s very essential that you verify and assess IT network every now and then to make the system impregnable. Hence professional network auditing is a task that you must opt frequently ICSS, the leading network penetration testing.