17,491,690+ records were exposed.
91,978,932+ records wre exposed.
18,953,433+ records exposed as of 09/22/2014.
Adanced Shodan searches, archives.org, Google Dorking, Manual Browsing, URL manipulation
Shodan recon searches, intense searches to identify targets, gain credentials
From low hanging fruit to in-depth network infiltration using open source tools
By CNN chief Washington correspondent Jake Tapper (CNN) – You might think that your government is vigilant when it comes to securing your personal information, or that of your children. You would be wrong. Hackers have discovered one of the biggest potential security holes of the modern era, one that can leave data exposed to any hacker willing to find it. And in at least one instance, that vulnerability has resulted in a data breach impacting almost three dozen children and their families.Read More
There are times when working in cyber-security feels like any other job. You show up every morning, have a cup of coffee and scan your emails. You review code and run tests, you write reports, you attend meetings, and then you go home. But other times, you stumble across something that scares the crap out of you. With a sinking feeling in the pit of your stomach, you pick up the phone and you call the FBI and the Secret Service. One of our cyber-security experts, Dana Taylor, had a morning like that, not very long ago. She discovered a vulnerability in versions of Oracle software being used by hundreds of high-profile organizations, both in the United States and around the world.. Read More
Copyright © 2014 NI@root - Network Infiltration Group.