<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hacking Archives - Vertex Cyber Security</title>
	<atom:link href="https://www.vertexcybersecurity.com.au/tag/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.vertexcybersecurity.com.au/tag/hacking/</link>
	<description>Your Partner in Cyber Security</description>
	<lastBuildDate>Wed, 06 May 2026 04:56:17 +0000</lastBuildDate>
	<language>en-AU</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.vertexcybersecurity.com.au/wp-content/uploads/2024/08/cropped-ColoredLogo-32x32.png</url>
	<title>hacking Archives - Vertex Cyber Security</title>
	<link>https://www.vertexcybersecurity.com.au/tag/hacking/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>The Teenage Hacker and the Secure Document Breach: Lessons for Business Resilience</title>
		<link>https://www.vertexcybersecurity.com.au/the-teenage-hacker-and-the-secure-document-breach-lessons-for-business-resilience/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-teenage-hacker-and-the-secure-document-breach-lessons-for-business-resilience</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 06 May 2026 03:25:33 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[France Titres]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Secure Documents]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=10674</guid>

					<description><![CDATA[A 15-year-old hacker is linked to a massive data breach of millions of secure documents in France. Discover what this means for your business cybersecurity.]]></description>
		
		
		
			</item>
		<item>
		<title>Qantas App Data Breach: A Lesson in Human Error and System Resilience</title>
		<link>https://www.vertexcybersecurity.com.au/the-qantas-app-data-breach-a-lesson-in-human-error-and-system-resilience/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-qantas-app-data-breach-a-lesson-in-human-error-and-system-resilience</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 09 Oct 2024 04:48:29 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[Incident response]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[human error]]></category>
		<category><![CDATA[system resilience]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=8834</guid>

					<description><![CDATA[Remember the Qantas app data breach incident in May 2024? Users suddenly seeing other passengers&#8217; booking details, able to change seats, even cancel flights – a digital nightmare. While Qantas swiftly addressed the issue and assured no critical data was compromised, the incident serves as a potent reminder: even seemingly minor code errors can have [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Why Penetration Testing? How Hacking (Penetration Testing) Can Protect You!</title>
		<link>https://www.vertexcybersecurity.com.au/why-penetration-testinghow-could-hacking-penetration-testing-protect-you/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=why-penetration-testinghow-could-hacking-penetration-testing-protect-you</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 14 Mar 2023 00:42:28 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Defence]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=5343</guid>

					<description><![CDATA[Penetration Testing (Ethical Hacking) is where we are given permission to hack a business to identify weaknesses. Some of the different types of penetration testing can include: We work on finding as many vulnerabilities (weaknesses) as we can then report them to you or your IT/dev team so that they can be fixed. Then, when [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Hack Rundown: REvil, Robinhood &#038; GoDaddy</title>
		<link>https://www.vertexcybersecurity.com.au/recent-hack-rundown-revil-robinhood-godaddy/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=recent-hack-rundown-revil-robinhood-godaddy</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Tue, 14 Dec 2021 11:40:20 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Hacker]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=3994</guid>

					<description><![CDATA[Back in 2021, there were some big updates in the news about cyber security, including some high profile attacks and the U.S. government working to arrest those involved in hacking activities.  REvil member arrested It was announced that a member of the REvil ransomware gang, the group responsible for the Kaseya attack, was accused and [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>What to do if your business is hacked</title>
		<link>https://www.vertexcybersecurity.com.au/what-to-do-if-your-business-is-hacked/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=what-to-do-if-your-business-is-hacked</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 13:03:28 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[cyber security monitoring]]></category>
		<category><![CDATA[email hack check]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[mobile plan hacking]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishingattack]]></category>
		<category><![CDATA[security training]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=3073</guid>

					<description><![CDATA[Do you know what to do if your business is hacked? Suddenly, systems stop working, or you have that sinking feeling in the pit of your stomach&#160;when you realise money has been stolen through a cyber security attack. Here&#8217;s what to do if your business is attacked.&#160; Getting a review of what happened and how [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>US GOVERNMENT HACKED</title>
		<link>https://www.vertexcybersecurity.com.au/us-government-hacked/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=us-government-hacked</link>
		
		<dc:creator><![CDATA[VertexNews]]></dc:creator>
		<pubDate>Fri, 18 Dec 2020 12:50:51 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[cyber threats]]></category>
		<category><![CDATA[cyberattack]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<guid isPermaLink="false">https://www.vertexcybersecurity.com.au/?p=3066</guid>

					<description><![CDATA[The US government was hacked. On December 13, the world learned of hackers believed to be working for Russia who has been monitoring internal email traffic at the US Treasury Department and an agency that decides internet and telecommunications policy. Referred to as “a sophisticated hacking group” backed by “a foreign government” the hackers were [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>How Do You Know If You&#8217;ve Been Hacked?</title>
		<link>https://www.vertexcybersecurity.com.au/have-you-been-hacked/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=have-you-been-hacked</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Mon, 03 Aug 2020 10:32:13 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Data Breach]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security vulnerability]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[hacker]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[phishing]]></category>
		<category><![CDATA[phishing attack]]></category>
		<category><![CDATA[phishingattack]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=949</guid>

					<description><![CDATA[If you&#8217;re a small to medium-sized business owner with multiple employees who are all working remotely how do you know if you&#8217;ve been hacked? You&#8217;re hearing more stories about businesses being hacked but that would never happen to your business, right? Or, are you just waiting for the impact of being hacked to find out? One of [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Jeff Bezos &#8220;Hacked&#8221;</title>
		<link>https://www.vertexcybersecurity.com.au/jeff-bezos-hacked/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=jeff-bezos-hacked</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Thu, 06 Feb 2020 21:11:33 +0000</pubDate>
				<category><![CDATA[Cyber Attack]]></category>
		<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[amazon]]></category>
		<category><![CDATA[hacked]]></category>
		<category><![CDATA[hackers]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[Jeff Bezos]]></category>
		<category><![CDATA[mobile plan hacking]]></category>
		<category><![CDATA[video hacking]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=807</guid>

					<description><![CDATA[According to the Guardian, Amazon CEO Jeff Bezos&#8217; phone was &#8220;hacked&#8221; in 2018. He received a WhatsApp message from the personal account of the croawn prince of Saudi Arabia. The message contained a video and quickly after Bezos received the message large amounts of data were extracted from his phone. So, it&#8217;s found highly likely [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>Hackers For The Greater Good</title>
		<link>https://www.vertexcybersecurity.com.au/hackers-for-the-greater-good/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=hackers-for-the-greater-good</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Tue, 17 Sep 2019 22:43:57 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[Regulated Cyber Security]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=784</guid>

					<description><![CDATA[We need more hackers for the greater good of company&#8217;s cyber safety. White hat hackers (ethical hackers) help organisations avoid a catastrophic data breach and they know how to think like a black hat hacker. Penetration testing&#160;is a form of ethical hacking. It is the most secure way to test and protect your company from [&#8230;]]]></description>
		
		
		
			</item>
		<item>
		<title>The Vertex Penetration Testing Difference</title>
		<link>https://www.vertexcybersecurity.com.au/the-vertex-penetration-testing-difference/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=the-vertex-penetration-testing-difference</link>
		
		<dc:creator><![CDATA[VertexAdmin]]></dc:creator>
		<pubDate>Wed, 11 Sep 2019 19:28:46 +0000</pubDate>
				<category><![CDATA[Cyber Security]]></category>
		<category><![CDATA[Ethical Hacking]]></category>
		<category><![CDATA[Penetration Testing]]></category>
		<category><![CDATA[Business cybersecurity]]></category>
		<category><![CDATA[cyber attack]]></category>
		<category><![CDATA[cyber insurance]]></category>
		<category><![CDATA[cyber risk]]></category>
		<category><![CDATA[cyber security]]></category>
		<category><![CDATA[Cyber Strategy]]></category>
		<category><![CDATA[Cybersecurity]]></category>
		<category><![CDATA[data breach]]></category>
		<category><![CDATA[data breach check]]></category>
		<category><![CDATA[ethical hacking]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<category><![CDATA[prevention]]></category>
		<category><![CDATA[protection]]></category>
		<category><![CDATA[risk]]></category>
		<category><![CDATA[security]]></category>
		<category><![CDATA[vulnerabilities]]></category>
		<guid isPermaLink="false">http://new.vtxsecurity.com.au/?p=780</guid>

					<description><![CDATA[The Vertex Penetration Testing difference lies in our proven expertise and the human experience we provide. We see ourselves as a partner to our clients not just a report generator. We find 20% more vulnerabilities than all our competitors, and we know that it only takes one sub-par security practice to bring a business to [&#8230;]]]></description>
		
		
		
			</item>
	</channel>
</rss>
