<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Hacker Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/category/all/cybersecurity/hacker/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/hacker/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Thu, 23 Apr 2026 06:12:53 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>Hacker Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/category/all/cybersecurity/hacker/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Digital High: Why Cyber Hacking is So Addictive for Beginners</title>
		<link>https://www.vertexcybersecurity.com.au/the-digital-high-why-cyber-hacking-is-so-addictive-for-beginners/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-digital-high-why-cyber-hacking-is-so-addictive-for-beginners</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 20 Apr 2026 23:12:17 +0000</pubDate>
				<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Addiction]]></category>
		<category><![CDATA[Cyber Hacking]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Law Enforcement]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10560</guid>

					<description><![CDATA[Explore the psychological reasons why cyber hacking is so addictive for beginners, the dangerous cycle of criminal escalation, and why cybercrime never pays in the long run.]]></description>
		
		
		
			</item>
		<item>
		<title>US Treasury data breach via CyberSecurity Provider BeyondTrust</title>
		<link>https://www.vertexcybersecurity.com.au/us-treasury-data-breach-via-cybersecurity-provider-beyondtrust/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=us-treasury-data-breach-via-cybersecurity-provider-beyondtrust</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 31 Dec 2024 00:42:03 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[BeyondTrust]]></category>
		<category><![CDATA[US Treasury Data Breach]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=9123</guid>

					<description><![CDATA[The recent breach at the US Treasury Department serves as a stark reminder that even organisations with robust cybersecurity measures can be vulnerable to sophisticated attacks. In this case, Chinese state-sponsored hackers exploited a vulnerability not within the Treasury itself, but within a third-party cybersecurity provider, BeyondTrust. This incident highlights a critical issue in today&#8217;s [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Qantas App Data Breach: A Lesson in Human Error and System Resilience</title>
		<link>https://www.vertexcybersecurity.com.au/the-qantas-app-data-breach-a-lesson-in-human-error-and-system-resilience/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-qantas-app-data-breach-a-lesson-in-human-error-and-system-resilience</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 09 Oct 2024 04:48:29 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[human error]]></category>
		<category><![CDATA[system resilience]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8834</guid>

					<description><![CDATA[Remember the Qantas app data breach incident in May 2024? Users suddenly seeing other passengers&#8217; booking details, able to change seats, even cancel flights – a digital nightmare. While Qantas swiftly addressed the issue and assured no critical data was compromised, the incident serves as a potent reminder: even seemingly minor code errors can have [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>My facebook was hacked and they changed the email and password</title>
		<link>https://www.vertexcybersecurity.com.au/my-facebook-was-hacked-and-they-changed-the-email-and-password/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=my-facebook-was-hacked-and-they-changed-the-email-and-password</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 05 Sep 2024 01:57:17 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[facebook]]></category>
		<category><![CDATA[hack]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8623</guid>

					<description><![CDATA[It&#8217;s a nightmare scenario – you try to log into your Facebook account (could be any other social media account), and it&#8217;s not working. You go through the password reset process, only to realise the email associated with your account has also been changed. Your Facebook has been hacked. What now? Let&#8217;s break down what [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Ticketmaster Data Breach</title>
		<link>https://www.vertexcybersecurity.com.au/ticketmaster-data-breach/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ticketmaster-data-breach</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 29 May 2024 21:51:29 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Ticketmaster]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8199</guid>

					<description><![CDATA[Ticketmaster has had a data breach and is being extorted for $US500,000, the details of how this happened is still unknown. Over 500million customer globally and 1.3 terabytes of customer data possessed by Ticketmaster including names, addresses, credit card numbers, phone numbers and payment details is up for sale.&#160; Considering the sheer scale of the [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>SSH Backdoor through XZ Utils and Open Source Security</title>
		<link>https://www.vertexcybersecurity.com.au/ssh-backdoor-through-xz-utils-and-open-source-security/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ssh-backdoor-through-xz-utils-and-open-source-security</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 09 Apr 2024 00:44:27 +0000</pubDate>
				<category><![CDATA[Code]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Process]]></category>
		<category><![CDATA[Social Engineering]]></category>
		<category><![CDATA[Software Development]]></category>
		<category><![CDATA[Vulnerability]]></category>
		<category><![CDATA[open source]]></category>
		<category><![CDATA[oss]]></category>
		<category><![CDATA[proprietary software]]></category>
		<category><![CDATA[vs]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7817</guid>

					<description><![CDATA[In the ever-evolving landscape of cybersecurity, the recent discovery of the XZ Utils Backdoor, a critical SSH vulnerability identified as CVE-2024-3094, has once again spotlighted the importance of vigilance, thorough code review, and the inherent strengths of the open-source model. This incident involved a malicious actor who, under the guise of contributing to the project, [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Incident Response in Penetration Testing: It&#8217;s Crucial!</title>
		<link>https://www.vertexcybersecurity.com.au/incident-response-in-penetration-testing-its-crucial/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=incident-response-in-penetration-testing-its-crucial</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Sun, 24 Mar 2024 23:24:44 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[Investigations]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[Cyber Resilience]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Incident Response]]></category>
		<category><![CDATA[IT Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7788</guid>

					<description><![CDATA[In today&#8217;s online world, cyber threats are bigger and more complicated than ever. This makes a strong cybersecurity plan very important. A key part of this plan is penetration testing. This means testing your computer system with a fake cyber attack to find any weak spots. But what if these tests find a weak spot, [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Cyber Threat Intelligence in Penetration Testing: Do you need this?</title>
		<link>https://www.vertexcybersecurity.com.au/cyber-threat-intelligence-in-penetration-testing-do-you-need-this/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=cyber-threat-intelligence-in-penetration-testing-do-you-need-this</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Fri, 15 Mar 2024 01:44:02 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Protection]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Threat Intelligence]]></category>
		<category><![CDATA[Digital Security]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7732</guid>

					<description><![CDATA[Introduction In today&#8217;s rapidly changing digital world, cyber security remains a top priority for organisations of all sizes. Penetration testing, a critical component of a comprehensive security strategy, simulates cyber attacks to identify vulnerabilities within systems. Integrating Cyber Threat Intelligence (CTI) into penetration testing practices elevates this process, providing a more targeted and effective approach [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Password Cracking in Penetration Testing.  Do you know about it?</title>
		<link>https://www.vertexcybersecurity.com.au/password-cracking-in-penetration-testing-do-you-know-about-it/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=password-cracking-in-penetration-testing-do-you-know-about-it</link>
		
		<dc:creator><![CDATA[Kate]]></dc:creator>
		<pubDate>Tue, 06 Feb 2024 23:46:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Cybersecurity Penetration Testing Password Cracking Ethical Hacking]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=7590</guid>

					<description><![CDATA[Introduction In the realm of cybersecurity, penetration testing stands as a critical method for strengthening system defences. Among its techniques, password cracking plays a pivotal role. This blog delves into how password cracking fits into penetration testing, shedding light on its practices, tools, and the ethical framework guiding its application. Understanding Password Cracking in Penetration [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Latitude Data Breach &#8211; What Should You Do?</title>
		<link>https://www.vertexcybersecurity.com.au/latitude-data-breach-what-should-you-do/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=latitude-data-breach-what-should-you-do</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 03 Apr 2023 23:44:17 +0000</pubDate>
				<category><![CDATA[Audit]]></category>
		<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[MFA (multi-factor authentication)]]></category>
		<category><![CDATA[Passwords]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Scam]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyberprotection]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[Latitude data breach]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5658</guid>

					<description><![CDATA[In March 2023, hackers managed to steal the data of around 14 million Latitude customers/ex-customers. Latitude is one of many large companies to experience a data breach recently, along with companies such as Optus, Medibank, Uber, DoorDash, and Dialog (owned by SingTel &#8211; the Singaporean telecommunications conglomerate which owns Optus). The Cyber Breach is still [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
