Felipe Contin Sampaio 3:26 PM (0 minutes ago) to me

BR +55 11 3069 3925 | USA +1 469 620 7643


by | Jun 28, 2023 | BLOG

Organizations that do not respond to cyber incidents efficiently can suffer major losses, such as loss of credibility, sanctions, and fines.




1. Melissa Virus

2. Colonial Pipeline

3. Incident at Sony

4. Yahoo data leak

5. Attack on Kaseya

6. SolarWinds

7. Microsoft data leak



The Melissa virus became known in 1999 due to its rapid spread due to opening unsolicited email attachments. It targeted systems based on Microsoft Word and Outlook.

This virus inspired the creation of other, more potent viruses and reinforced concerns about digital security.



In May 2021, the American oil pipeline company Colonial Pipeline was the target of a cyberattack, which impacted its infrastructure of devices and gas pipelines, in addition to the distribution and transport of gasoline.



Malicious agents accessed and copied the personal data of 77 million users of the Playstation Network (PSN) and the Qriocity music sales portal, in addition to taking Sony’s services offline in 2011.

In January 2013, the company was fined £250,000 by the Information Commissioner’s Office in the United Kingdom for leaking data.

Are you enjoying this post? Join our Newsletter!

Newsletter Blog EN

11 + 9 =

We will send newsletters and promotional emails. By entering my data, I agree to the Privacy Policy and the Terms of Use.



In 2014, 500 million Yahoo user accounts were compromised due to a major cyberattack.

However, apparently the malicious attackers only had access to basic information and passwords, bank details were not stolen.



In July 2021, some suspicious activities were performed on the VSA servers, software developed by Kaseya, which offers services to technology systems management companies. Realizing that it was a cyberattack, the organization’s CEO shut down the VSA servers and prevented the action, which compromised around 1500 companies, from impacting a much larger number of customers.



In December 2020, Russian hackers exploited vulnerabilities found in the SolarWinds infrastructure monitoring and management software solution. In this way, they sent malicious updates to about 18 thousand customers of the organization.

With this, attackers could gain access to customer networks and carry out other attacks, distributing malware and impersonating users to access files.

Several government agencies and private companies were affected.



In March 2022, it was Microsoft’s turn to be attacked by a group of hackers called Lapsus$.

At the time, cybercriminals posted a screenshot on Telegram, indicating the cyberattack.

However, Microsoft quickly stopped the action of the attackers, preventing the theft of data from its users.

The main causes of data leaks

Data leaks occur whenever a user or organization has their sensitive information exposed, putting the security and privacy of companies and people at risk. Know more! The Data Breach Investigation Report 2022, conducted by the Ponemon Institute, provides an overview...

What is the SOC 2 report and why is it important for senhasegura?

SOC 2 provides a report after completing the audit. Recently, senhasegura conquered this milestone, providing details on the principles of confidentiality, processing integrity, availability, and information security. Want to know more about this subject? Read our...

What is a lateral movement attack and how does it occur?

A lateral movement attack occurs when the cybercriminal gains access to an initial target to move between devices within the network without their presence being noticed. In this article, we explain in detail what side threats are and how to avoid them. Want to know...

Why are government organizations favorite targets for cybercriminals?

The government segment was one of the most attacked by hackers in the last quarter of 2022. Learn more! In recent years, malicious actors have demonstrated a propensity to attack government organizations, including through ransomware, although governments are not...

Building a Ransomware Incident Response Plan

Ransomware is a type of cyberattack where malicious attackers lock down their victims' computers and demand a ransom to unlock. In this, we show you how to create a response plan for incidents involving ransomware. Want to know everything about it? Read our text until...