 {"id":470193,"date":"2024-03-07T17:02:34","date_gmt":"2024-03-08T00:02:34","guid":{"rendered":"https:\/\/jorgep.com\/blog\/?page_id=470193"},"modified":"2026-02-18T13:02:14","modified_gmt":"2026-02-18T20:02:14","slug":"list-of-cyberattacks","status":"publish","type":"post","link":"https:\/\/jorgep.com\/blog\/list-of-cyberattacks\/","title":{"rendered":"List of Cyberattacks"},"content":{"rendered":"\n<p>See also Blogs:   <a href=\"https:\/\/jorgep.com\/blog\/the-cost-of-a-security-breach-government\/\">The Cost of a Security Breach (Government) <\/a>  and <a href=\"https:\/\/jorgep.com\/blog\/tag\/cybersecurity\/\">Cybersecurity<\/a><\/p>\n\n\n\n<p>( Extract from Original Data Source: <a href=\"https:\/\/konbriefing.com\/en-topics\/cyber-attacks-moveit-victim-list.html\">MOVEit hack victim list | KonBriefing.com<\/a> ) <\/p>\n\n\n\n<p><\/p>\n\n\n\n<p>See also a great database of Security Attacks at:   <a href=\"https:\/\/www.halcyon.ai\/attacks\">https:\/\/www.halcyon.ai\/attacks<\/a><\/p>\n\n\n<p>[table id=10 column_widths=&#8221;40px|150px|130px|40px|40px&#8221;\/ ]<\/p>\n\n\n\n<h2 class=\"wp-block-heading\"><\/h2>\n","protected":false},"excerpt":{"rendered":"<p>See also Blogs: The Cost of a Security Breach (Government) and Cybersecurity ( Extract from Original Data Source: MOVEit hack victim list | KonBriefing.com ) See also a great database of Security Attacks at: https:\/\/www.halcyon.ai\/attacks<\/p>\n","protected":false},"author":2,"featured_media":470205,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_kad_blocks_custom_css":"","_kad_blocks_head_custom_js":"","_kad_blocks_body_custom_js":"","_kad_blocks_footer_custom_js":"","ngg_post_thumbnail":0,"episode_type":"","audio_file":"","podmotor_file_id":"","podmotor_episode_id":"","cover_image":"","cover_image_id":"","duration":"","filesize":"","filesize_raw":"","date_recorded":"","explicit":"","block":"","itunes_episode_number":"","itunes_title":"","itunes_season_number":"","itunes_episode_type":"","_kad_post_transparent":"","_kad_post_title":"","_kad_post_layout":"","_kad_post_sidebar_id":"","_kad_post_content_style":"","_kad_post_vertical_padding":"","_kad_post_feature":"","_kad_post_feature_position":"","_kad_post_header":false,"_kad_post_footer":false,"_kad_post_classname":"","footnotes":""},"categories":[681,441],"tags":[836,700,742,920],"class_list":["post-470193","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-moderneuc2","category-tech-talk","tag-cyberattacks","tag-cybersecurity","tag-moderneuc1","tag-security-breaches"],"taxonomy_info":{"category":[{"value":681,"label":"ModernEUC"},{"value":441,"label":"Tech Talk"}],"post_tag":[{"value":836,"label":"cyberattacks"},{"value":700,"label":"Cybersecurity"},{"value":742,"label":"ModernEUC"},{"value":920,"label":"Security Breaches"}]},"featured_image_src_large":["https:\/\/jorgep.com\/blog\/wp-content\/uploads\/Featured-CyberAttacksList01.jpg",740,321,false],"author_info":{"display_name":"Jorge Pereira","author_link":"https:\/\/jorgep.com\/blog\/author\/jorge\/"},"comment_info":0,"category_info":[{"term_id":681,"name":"ModernEUC","slug":"moderneuc2","term_group":0,"term_taxonomy_id":691,"taxonomy":"category","description":"","parent":0,"count":261,"filter":"raw","cat_ID":681,"category_count":261,"category_description":"","cat_name":"ModernEUC","category_nicename":"moderneuc2","category_parent":0},{"term_id":441,"name":"Tech Talk","slug":"tech-talk","term_group":0,"term_taxonomy_id":451,"taxonomy":"category","description":"","parent":0,"count":671,"filter":"raw","cat_ID":441,"category_count":671,"category_description":"","cat_name":"Tech Talk","category_nicename":"tech-talk","category_parent":0}],"tag_info":[{"term_id":836,"name":"cyberattacks","slug":"cyberattacks","term_group":0,"term_taxonomy_id":846,"taxonomy":"post_tag","description":"","parent":0,"count":4,"filter":"raw"},{"term_id":700,"name":"Cybersecurity","slug":"cybersecurity","term_group":0,"term_taxonomy_id":710,"taxonomy":"post_tag","description":"","parent":0,"count":29,"filter":"raw"},{"term_id":742,"name":"ModernEUC","slug":"moderneuc1","term_group":0,"term_taxonomy_id":752,"taxonomy":"post_tag","description":"","parent":0,"count":284,"filter":"raw"},{"term_id":920,"name":"Security Breaches","slug":"security-breaches","term_group":0,"term_taxonomy_id":930,"taxonomy":"post_tag","description":"","parent":0,"count":4,"filter":"raw"}],"_links":{"self":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/470193","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/comments?post=470193"}],"version-history":[{"count":2,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/470193\/revisions"}],"predecessor-version":[{"id":518967,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/posts\/470193\/revisions\/518967"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/media\/470205"}],"wp:attachment":[{"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/media?parent=470193"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/categories?post=470193"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/jorgep.com\/blog\/wp-json\/wp\/v2\/tags?post=470193"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}