In the beginning of July it was reported that a tremendous data leak occured. It contained approximately 1 billion strings with personal data of Chinese residents. According to hackers’ statement, they managed to steal more than 23 terabyte of data, including names, addresses, place of birth, ID numbers, phone numbers and detailed criminal case information. The data was uploaded on darknet. This data leak turned out to be both the biggest data leak in the history of the country and one of the biggest globally. Currently, it’s believed, that the data breach originated from the misconfigured Alibaba cloud server.
The problem of database misconfiguration remains one of the most dangerous. News on data leak incidents, caused by this particular issue are published regularly. What's more, there is a step change taking place in the amount of cloud databases. Both large and small enterprises and organizations continue to implement cloud storages in their corporate infrastructure. It seems, that in the nearest future the database misconfiguration problem won't become less actual. Thus, it’s crucial to understand the existing and ongoing risks and to be able to respond adequately. In order to learn more about the risks, posed by cloud services and to obtain useful advice you may refer to a white paper, published on our web-site.
SearchInform uses four types of cookies as described below. You can decide which categories of cookies you wish to accept to improve your experience on our website. To learn more about the cookies we use on our site, please read our Cookie Policy.
Always active. These cookies are essential to our website working effectively.
Cookies does not collect personal information. You can disable the cookie files
record
on the Internet Settings tab in your browser.
These cookies allow SearchInform to provide enhanced functionality and personalization, such as remembering the language you choose to interact with the website.
These cookies enable SearchInform to understand what information is the most valuable to you, so we can improve our services and website.
These cookies are created by other resources to allow our website to embed content from other websites, for example, images, ads, and text.
Please enable Functional Cookies
You have disabled the Functional Cookies.
To complete the form and get in touch with us, you need to enable Functional Cookies.
Otherwise the form cannot be sent to us.
Subscribe to our newsletter and receive a bright and useful tutorial Explaining Information Security in 4 steps!
Subscribe to our newsletter and receive case studies in comics!