{"id":51303,"date":"2022-06-14T09:10:48","date_gmt":"2022-06-14T01:10:48","guid":{"rendered":"https:\/\/version-2.com\/?p=51303"},"modified":"2022-06-16T15:42:25","modified_gmt":"2022-06-16T07:42:25","slug":"greatest-cyberattacks-on-u-s-companies-in-the-last-10-years","status":"publish","type":"post","link":"https:\/\/version-2.com\/zh\/2022\/06\/greatest-cyberattacks-on-u-s-companies-in-the-last-10-years\/","title":{"rendered":"Greatest Cyberattacks On U.S. Companies In The Last 10 Years"},"content":{"rendered":"\t\t<div data-elementor-type=\"wp-post\" data-elementor-id=\"51303\" class=\"elementor elementor-51303\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a9966c4 post-content elementor-section-boxed elementor-section-height-default elementor-section-height-default\" data-id=\"a9966c4\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;437ef7f&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-2884b38\" data-id=\"2884b38\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-980bf1e elementor-widget elementor-widget-text-editor\" data-id=\"980bf1e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p align=\"center\"><img decoding=\"async\" src=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/06\/Greatest-Cyberattacks-On-U.S.-Companies-In-The-Last-10-Years-2.png\" alt=\"\" width=\"958\" height=\"auto\"><\/p> \n\n<p>Virtually every day we see news of data breaches, which affect organizations of all types and sizes. From startups to global companies, they are subject to cyber attacks aimed at stealing (or even destroying) data. After all, the question is not \u201cif\u201d, but \u201cwhen\u201d an organization will fall victim to malicious attackers. And as much as vendors evolve their solutions and teams improve their cybersecurity posture, malicious actors have also been improving their attack techniques to circumvent the controls put in place. An analysis by the Identity Theft Resource Center indicated that there were 1862 data breaches in the year 2021 alone, a number 68% higher than in 2020. The segments most affected by these attacks include healthcare, finance and retail. And that number is expected to be even higher in 2022. The consequences of these attacks are not just financial: organizations are also subject to loss of reputation and trust from customers, partners, suppliers and even employees. After all, in times where data is considered the new oil, more and more people are considering the cybersecurity aspect when doing business with organizations. In recent years, millions of US user records have been publicly exposed, in many cases posted on the dark web or sold to third parties for malicious actions. For organizations, financial losses are increasing: according to IBM and the Ponemon Institute in their Cost of a Data Breach 2021 report, the average cost of a data breach was USD 4.24 million, an increase of 9 .8% compared to 2020. Continue reading this article to learn about the 8 biggest data breaches that have occurred in the United States of all time, and the consequences for users and organizations.\n<\/p>\n<ol> <li><b> Yahoo<\/b> \u2013 the data leak that occurred at the tech giant is one of the best known in the cybersecurity market. Between 2013 and 2016 a series of cyberattacks allowed Russian cybercriminals to gain access to the personal data of more than 3 billion users. These attacks earned the company a fine of USD 35 million, in addition to a few dozen lawsuits.<br><br> <\/li> <li><a href=\"https:\/\/senhasegura.com\/microsoft-attack-how-pam-can-reduce-cyber-attack-risks\/\"><b> Microsoft<\/b><\/a> \u2013 nearly 30,000 US companies (60,000 globally) were affected by one of the largest cyber attacks in US history. In early 2021, criminals exploited four zero-day flaws in Microsoft Exchange email servers to gain unauthorized access to users\u2019 electronic messages. The US government has accused a cyber gang sponsored by the Chinese government of being behind the attack.<br><br> <\/li> <li><b> First American Financial Corp<\/b>. \u2013 a series of flaws in the digital protection mechanisms of this large financial institution allowed approximately 885 million sensitive records to be exposed on the internet. These records included bank account numbers and their statements, as well as money transfer receipts with social security numbers and driver\u2019s licenses. While not considered a leak, as no data was compromised, the SEC fined First American nearly $500,000.<br><br> <\/li> <li><b> Facebook<\/b> \u2013 this is not the first time that Mark Zuckerberg\u2019s social network has been involved in scandals of leaks and exposure of its users\u2019 data. After the Cambridge Analytica episode, the names, phone numbers, usernames and passwords of 530 million users were exposed through third parties. After this episode, Facebook tightened the criteria for accessing third-party applications to its databases;<br><br> <\/li> <li><b> LinkedIn<\/b> \u2013 in April 2021 malicious actors managed to exploit vulnerabilities in APIs to improperly obtain the personal data of more than 93% of the user database of the largest professional social network, which had approximately 750 million users at the time of the attack. Data such as names, phone numbers, location data and associated account details have been stolen, allowing malicious actors to misuse them to carry out phishing or ransomware attacks;<br><br> <\/li> <li><b> JP Morgan Chase<\/b> \u2013 In a highly regulated industry, not even one of the largest US banks has been safe from cyber attacks. In September 2014, JP Morgan reported that cyber criminals compromised the accounts of over 76 million individuals and 7 million businesses. Fortunately, only names, emails and phone numbers were leaked, which didn\u2019t save the giant from having to commit to spend USD 250 million annually to properly protect its customer data;<br><br> <\/li> <li><b> Home Depot<\/b> \u2013 Using malware, criminals stole more than 56 million payment card records from Home Depot customers during April 2014. By 2020, the retailer had already spent over USD 180 million in damages, including damages to banks and credit card companies, in addition to paying compensation to those affected.<br><br> <\/li> <li><b> MySpace \u2013<\/b> although it no longer exists as a social network, MySpace attracts thousands of people to its site. In 2016 it was revealed that logins, names and birthdates of over 360 million users were leaked. MySpace was able to invalidate all login data and notify users, as well as having implemented stricter cybersecurity measures.<\/li> <\/ol>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t<div class=\"elementor-element elementor-element-a7b53ad elementor-widget elementor-widget-shortcode\" data-id=\"a7b53ad\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"shortcode.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t<div class=\"elementor-shortcode\">\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18103\" class=\"elementor elementor-18103\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-748947f elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"748947f\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-7995c19\" data-id=\"7995c19\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-a437045 elementor-widget elementor-widget-image-box\" data-id=\"a437045\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"image-box.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t<div class=\"elementor-image-box-wrapper\"><div class=\"elementor-image-box-content\"><h3 class=\"elementor-image-box-title\">About Version 2 Digital<\/h3><p class=\"elementor-image-box-description\">Version 2 Digital is one of the most dynamic IT companies in Asia. The company distributes a wide range of IT products across various areas including cyber security, cloud, data protection, end points, infrastructures, system monitoring, storage, networking, business productivity and communication products.\n<br><br>\nThrough an extensive network of channels, point of sales, resellers, and partnership companies, Version 2 offers quality products and services which are highly acclaimed in the market. Its customers cover a wide spectrum which include Global 1000 enterprises, regional listed companies, different vertical industries, public utilities, Government, a vast number of successful SMEs, and consumers in various Asian cities.<\/p><\/div><\/div>\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t\n\t\t<div data-elementor-type=\"page\" data-elementor-id=\"18134\" class=\"elementor elementor-18134\">\n\t\t\t\t\t\t<section class=\"elementor-section elementor-top-section elementor-element elementor-element-a909055 elementor-section-full_width elementor-section-height-default elementor-section-height-default\" data-id=\"a909055\" data-element_type=\"section\" data-e-type=\"section\" data-settings=\"{&quot;jet_parallax_layout_list&quot;:[{&quot;_id&quot;:&quot;c4f773e&quot;,&quot;jet_parallax_layout_image&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_tablet&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_image_mobile&quot;:{&quot;url&quot;:&quot;&quot;,&quot;id&quot;:&quot;&quot;,&quot;size&quot;:&quot;&quot;},&quot;jet_parallax_layout_speed&quot;:{&quot;unit&quot;:&quot;%&quot;,&quot;size&quot;:50,&quot;sizes&quot;:[]},&quot;jet_parallax_layout_type&quot;:&quot;scroll&quot;,&quot;jet_parallax_layout_direction&quot;:&quot;1&quot;,&quot;jet_parallax_layout_fx_direction&quot;:null,&quot;jet_parallax_layout_z_index&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x&quot;:50,&quot;jet_parallax_layout_bg_x_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_x_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y&quot;:50,&quot;jet_parallax_layout_bg_y_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_y_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size&quot;:&quot;auto&quot;,&quot;jet_parallax_layout_bg_size_tablet&quot;:&quot;&quot;,&quot;jet_parallax_layout_bg_size_mobile&quot;:&quot;&quot;,&quot;jet_parallax_layout_animation_prop&quot;:&quot;transform&quot;,&quot;jet_parallax_layout_on&quot;:[&quot;desktop&quot;,&quot;tablet&quot;]}]}\">\n\t\t\t\t\t\t<div class=\"elementor-container elementor-column-gap-default\">\n\t\t\t\t\t<div class=\"elementor-column elementor-col-100 elementor-top-column elementor-element elementor-element-4e3c0d4\" data-id=\"4e3c0d4\" data-element_type=\"column\" data-e-type=\"column\">\n\t\t\t<div class=\"elementor-widget-wrap elementor-element-populated\">\n\t\t\t\t\t\t<div class=\"elementor-element elementor-element-10af45e elementor-widget elementor-widget-text-editor\" data-id=\"10af45e\" data-element_type=\"widget\" data-e-type=\"widget\" data-widget_type=\"text-editor.default\">\n\t\t\t\t<div class=\"elementor-widget-container\">\n\t\t\t\t\t\t\t\t\t<p><strong>About Segura\u00ae <\/strong><br \/>Segura\u00ae strive to ensure the sovereignty of companies over actions and privileged information. To this end, we work against data theft through traceability of administrator actions on networks, servers, databases and a multitude of devices. In addition, we pursue compliance with auditing requirements and the most demanding standards, including PCI DSS, Sarbanes-Oxley, ISO 27001 and HIPAA.<\/p>\t\t\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t\t<\/div>\n\t\t\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/div>\n\t\t\t\t\t<\/div>\n\t\t<\/section>\n\t\t\t\t<\/div>\n\t\t","protected":false},"excerpt":{"rendered":"<p>Virtually every day we see news of data breaches, which [&hellip;]<\/p>\n","protected":false},"author":143524195,"featured_media":0,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"_acf_changed":false,"_jetpack_feature_clip_id":0,"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[419,488,61],"tags":[420,489],"class_list":["post-51303","post","type-post","status-publish","format-standard","hentry","category-segura","category-488","category-press-release","tag-segura","tag-489"],"acf":[],"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.6 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Greatest Cyberattacks On U.S. Companies In The Last 10 Years - Version 2<\/title>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/senhasegura.com\/greatest-cyberattaks-in-the-us-history\/\" \/>\n<meta property=\"og:locale\" content=\"zh_HK\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Greatest Cyberattacks On U.S. Companies In The Last 10 Years - Version 2\" \/>\n<meta property=\"og:description\" content=\"Virtually every day we see news of data breaches, which [&hellip;]\" \/>\n<meta property=\"og:url\" content=\"https:\/\/senhasegura.com\/greatest-cyberattaks-in-the-us-history\/\" \/>\n<meta property=\"og:site_name\" content=\"Version 2\" \/>\n<meta property=\"article:published_time\" content=\"2022-06-14T01:10:48+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2022-06-16T07:42:25+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/06\/Greatest-Cyberattacks-On-U.S.-Companies-In-The-Last-10-Years-2.png\" \/>\n<meta name=\"author\" content=\"version2hk\" \/>\n<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n<meta name=\"twitter:label1\" content=\"\u4f5c\u8005\" \/>\n\t<meta name=\"twitter:data1\" content=\"version2hk\" \/>\n\t<meta name=\"twitter:label2\" content=\"\u9810\u8a08\u95b1\u8b80\u6642\u9593\" \/>\n\t<meta name=\"twitter:data2\" content=\"6 \u5206\u9418\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/greatest-cyberattaks-in-the-us-history\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/06\\\/greatest-cyberattacks-on-u-s-companies-in-the-last-10-years\\\/\"},\"author\":{\"name\":\"version2hk\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\"},\"headline\":\"Greatest Cyberattacks On U.S. Companies In The Last 10 Years\",\"datePublished\":\"2022-06-14T01:10:48+00:00\",\"dateModified\":\"2022-06-16T07:42:25+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/06\\\/greatest-cyberattacks-on-u-s-companies-in-the-last-10-years\\\/\"},\"wordCount\":761,\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/greatest-cyberattaks-in-the-us-history\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-11e2ab0\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Greatest-Cyberattacks-On-U.S.-Companies-In-The-Last-10-Years-2.png\",\"keywords\":[\"Segura\",\"2022\"],\"articleSection\":[\"Segura\",\"2022\",\"Press Release\"],\"inLanguage\":\"zh-HK\"},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/version-2.com\\\/2022\\\/06\\\/greatest-cyberattacks-on-u-s-companies-in-the-last-10-years\\\/\",\"url\":\"https:\\\/\\\/senhasegura.com\\\/greatest-cyberattaks-in-the-us-history\\\/\",\"name\":\"Greatest Cyberattacks On U.S. Companies In The Last 10 Years - Version 2\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/greatest-cyberattaks-in-the-us-history\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/greatest-cyberattaks-in-the-us-history\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-11e2ab0\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Greatest-Cyberattacks-On-U.S.-Companies-In-The-Last-10-Years-2.png\",\"datePublished\":\"2022-06-14T01:10:48+00:00\",\"dateModified\":\"2022-06-16T07:42:25+00:00\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/senhasegura.com\\\/greatest-cyberattaks-in-the-us-history\\\/#breadcrumb\"},\"inLanguage\":\"zh-HK\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/senhasegura.com\\\/greatest-cyberattaks-in-the-us-history\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/greatest-cyberattaks-in-the-us-history\\\/#primaryimage\",\"url\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-11e2ab0\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Greatest-Cyberattacks-On-U.S.-Companies-In-The-Last-10-Years-2.png\",\"contentUrl\":\"https:\\\/\\\/cdn-anldd.nitrocdn.com\\\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\\\/assets\\\/static\\\/optimized\\\/rev-11e2ab0\\\/wp-content\\\/uploads\\\/2022\\\/06\\\/Greatest-Cyberattacks-On-U.S.-Companies-In-The-Last-10-Years-2.png\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/senhasegura.com\\\/greatest-cyberattaks-in-the-us-history\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"\u9996\u9801\",\"item\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Greatest Cyberattacks On U.S. Companies In The Last 10 Years\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#website\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"name\":\"Version 2\",\"description\":\"\",\"publisher\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\"},\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/version-2.com\\\/zh\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"zh-HK\"},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#organization\",\"name\":\"Version 2\",\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\",\"url\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"contentUrl\":\"https:\\\/\\\/i0.wp.com\\\/version-2.com\\\/wp-content\\\/uploads\\\/2020\\\/08\\\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1\",\"width\":1795,\"height\":335,\"caption\":\"Version 2\"},\"image\":{\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/logo\\\/image\\\/\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/version-2.com\\\/zh\\\/#\\\/schema\\\/person\\\/d14d2d3cd77ffdb618b9f1330fe084db\",\"name\":\"version2hk\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"zh-HK\",\"@id\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"contentUrl\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g\",\"caption\":\"version2hk\"},\"sameAs\":[\"http:\\\/\\\/version2xfortcom.wordpress.com\"],\"url\":\"https:\\\/\\\/version-2.com\\\/zh\\\/author\\\/version2hk\\\/\"}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Greatest Cyberattacks On U.S. Companies In The Last 10 Years - Version 2","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/senhasegura.com\/greatest-cyberattaks-in-the-us-history\/","og_locale":"zh_HK","og_type":"article","og_title":"Greatest Cyberattacks On U.S. Companies In The Last 10 Years - Version 2","og_description":"Virtually every day we see news of data breaches, which [&hellip;]","og_url":"https:\/\/senhasegura.com\/greatest-cyberattaks-in-the-us-history\/","og_site_name":"Version 2","article_published_time":"2022-06-14T01:10:48+00:00","article_modified_time":"2022-06-16T07:42:25+00:00","og_image":[{"url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/06\/Greatest-Cyberattacks-On-U.S.-Companies-In-The-Last-10-Years-2.png","type":"","width":"","height":""}],"author":"version2hk","twitter_card":"summary_large_image","twitter_misc":{"\u4f5c\u8005":"version2hk","\u9810\u8a08\u95b1\u8b80\u6642\u9593":"6 \u5206\u9418"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/senhasegura.com\/greatest-cyberattaks-in-the-us-history\/#article","isPartOf":{"@id":"https:\/\/version-2.com\/2022\/06\/greatest-cyberattacks-on-u-s-companies-in-the-last-10-years\/"},"author":{"name":"version2hk","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db"},"headline":"Greatest Cyberattacks On U.S. Companies In The Last 10 Years","datePublished":"2022-06-14T01:10:48+00:00","dateModified":"2022-06-16T07:42:25+00:00","mainEntityOfPage":{"@id":"https:\/\/version-2.com\/2022\/06\/greatest-cyberattacks-on-u-s-companies-in-the-last-10-years\/"},"wordCount":761,"publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"image":{"@id":"https:\/\/senhasegura.com\/greatest-cyberattaks-in-the-us-history\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/06\/Greatest-Cyberattacks-On-U.S.-Companies-In-The-Last-10-Years-2.png","keywords":["Segura","2022"],"articleSection":["Segura","2022","Press Release"],"inLanguage":"zh-HK"},{"@type":"WebPage","@id":"https:\/\/version-2.com\/2022\/06\/greatest-cyberattacks-on-u-s-companies-in-the-last-10-years\/","url":"https:\/\/senhasegura.com\/greatest-cyberattaks-in-the-us-history\/","name":"Greatest Cyberattacks On U.S. Companies In The Last 10 Years - Version 2","isPartOf":{"@id":"https:\/\/version-2.com\/zh\/#website"},"primaryImageOfPage":{"@id":"https:\/\/senhasegura.com\/greatest-cyberattaks-in-the-us-history\/#primaryimage"},"image":{"@id":"https:\/\/senhasegura.com\/greatest-cyberattaks-in-the-us-history\/#primaryimage"},"thumbnailUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/06\/Greatest-Cyberattacks-On-U.S.-Companies-In-The-Last-10-Years-2.png","datePublished":"2022-06-14T01:10:48+00:00","dateModified":"2022-06-16T07:42:25+00:00","breadcrumb":{"@id":"https:\/\/senhasegura.com\/greatest-cyberattaks-in-the-us-history\/#breadcrumb"},"inLanguage":"zh-HK","potentialAction":[{"@type":"ReadAction","target":["https:\/\/senhasegura.com\/greatest-cyberattaks-in-the-us-history\/"]}]},{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/senhasegura.com\/greatest-cyberattaks-in-the-us-history\/#primaryimage","url":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/06\/Greatest-Cyberattacks-On-U.S.-Companies-In-The-Last-10-Years-2.png","contentUrl":"https:\/\/cdn-anldd.nitrocdn.com\/eZKRlLtQrJvdkweiXfJjEQKYLRsJSgIV\/assets\/static\/optimized\/rev-11e2ab0\/wp-content\/uploads\/2022\/06\/Greatest-Cyberattacks-On-U.S.-Companies-In-The-Last-10-Years-2.png"},{"@type":"BreadcrumbList","@id":"https:\/\/senhasegura.com\/greatest-cyberattaks-in-the-us-history\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"\u9996\u9801","item":"https:\/\/version-2.com\/zh\/"},{"@type":"ListItem","position":2,"name":"Greatest Cyberattacks On U.S. Companies In The Last 10 Years"}]},{"@type":"WebSite","@id":"https:\/\/version-2.com\/zh\/#website","url":"https:\/\/version-2.com\/zh\/","name":"Version 2","description":"","publisher":{"@id":"https:\/\/version-2.com\/zh\/#organization"},"potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/version-2.com\/zh\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"zh-HK"},{"@type":"Organization","@id":"https:\/\/version-2.com\/zh\/#organization","name":"Version 2","url":"https:\/\/version-2.com\/zh\/","logo":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/","url":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","contentUrl":"https:\/\/i0.wp.com\/version-2.com\/wp-content\/uploads\/2020\/08\/v2-hk-hor-4.png?fit=1795%2C335&ssl=1","width":1795,"height":335,"caption":"Version 2"},"image":{"@id":"https:\/\/version-2.com\/zh\/#\/schema\/logo\/image\/"}},{"@type":"Person","@id":"https:\/\/version-2.com\/zh\/#\/schema\/person\/d14d2d3cd77ffdb618b9f1330fe084db","name":"version2hk","image":{"@type":"ImageObject","inLanguage":"zh-HK","@id":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","url":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","contentUrl":"https:\/\/secure.gravatar.com\/avatar\/d280627252b42d7489de74dd88aa04043a495f25e258575000dc767e287bf94c?s=96&d=identicon&r=g","caption":"version2hk"},"sameAs":["http:\/\/version2xfortcom.wordpress.com"],"url":"https:\/\/version-2.com\/zh\/author\/version2hk\/"}]}},"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack_shortlink":"https:\/\/wp.me\/pbQRKm-dlt","post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/51303","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/users\/143524195"}],"replies":[{"embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/comments?post=51303"}],"version-history":[{"count":4,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/51303\/revisions"}],"predecessor-version":[{"id":51307,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/posts\/51303\/revisions\/51307"}],"wp:attachment":[{"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/media?parent=51303"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/categories?post=51303"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/version-2.com\/zh\/wp-json\/wp\/v2\/tags?post=51303"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}