Storenvy – 11,052,071 breached accounts

In mid-2019, the e-commerce website Storenvy suffered a data breach that exposed millions of customer records. A portion of the breached records were subsequently posted to a hacking forum with cracked password hashes, whilst the entire corpus of 23M rows was put up for sale. The data contained 11M unique email addresses alongside usernames, IP addresses, the user’s city, gender date of birth and original salted SHA-1 password hash.

Read More
Stealing Firmware from Over-The-Air Updates

Stealing Firmware from Over-The-Air Updates

Connected devices make up one of the largest attack surfaces on the modern Internet. Billions of devices, many with little to no consideration given to their secure operation, controlling everything from sewage treatment systems to safety-critical vehicle functions. As a result, security research on the low-level firmware that control these devices has become more important than ever. But how is a research to get access to closed-source firmware for proprietary hardware to begin with? One method that we have been using for some ongoing research is intercepting firmware from updater apps that use Bluetooth to perform over-the-air updates.

Read More

Doxbin (TOoDA) – 136,461 breached accounts

In February 2025, the “doxing” website Doxbin was compromised by a group calling themselves “TOoDA” and the data dumped publicly. Included in the breach were 336k unique email addresses alongside usernames. The data was provided to HIBP by a source who requested it be attributed to “emo.rip”.

Read More

Zacks (2024) – 11,994,223 breached accounts

In June 2024, the investment research company Zacks was allegedly breached, and data was later published to a popular hacking forum. This comes after a separate Zacks data breach confirmed by the organisation in 2023 with the subsequent breach disclosing millions of additional records representing a superset of data from the first incident. The 2024 breach included 12M unique email addresses along with IP and physical addresses, names, usernames, phone numbers and unsalted SHA-256 password hashes. Zacks did not respond to multiple attempts to contact them about the incident.

Read More

Understanding Injection Attacks in Application Security: Types, Tools, and Examples

How Injection Attacks Exploit Web Application Vulnerabilities Injection attacks occur when malicious input is inserted into a web application, exploiting vulnerabilities in unvalidated user input to execute unintended commands. Attackers craft payloads that manipulate how the application processes data, often leading to unauthorized access, data…
Read more
The post Understanding Injection Attacks in Application Security: Types, Tools, and Examples appeared first on Acunetix.

Read More
X