Your IP:Unknown

·

Your Status: Unknown

Skip to main content

The Cybersecurity Hub

Your one-stop-shop for all things cybersec. What is the Cybersecurity Hub? It’s a place for people interested in cybersecurity, where they can find useful links and information about the most prevalent online threats and the best ways to protect themselves and their devices.

A woman safely browsing on her laptop, happy that she is protected online by cybersecurity.

Introduction to cybersecurity

Cybersecurity can be categorized into several distinct types:

The worst cybersecurity incidents of all time

Passwords surrounding an unlocked padlock, symbolizing password theft in a data breach.

2013 · Database vulnerability

Yahoo database breach

  • How many accounts were compromised? 3 billion

  • What kind of data was affected? Names, emails, phone numbers, birthdays, hashed passwords, security questions and answers.

  • What happened next? Yahoo hid the scope of the breach for 4 years.

An open eye over a document on a laptop, symbolizing the loss of private data in the cyberattack.

2017 · NotPetya cyberattack

Ukraine cyberattack

  • How many accounts were compromised? 50,000

  • What kind of data was affected? Data and devices in multiple airports, shipping and oil companies, banks, and government agencies.

  • What happened next? The attack caused $10 billion worth of damage and the infrastructure took months to restore.

A personal identity card with a system rollback icon, representing data that needs to be protected.

2019 · Crawler software scraped customer data

Alibaba cyberattack

  • How many accounts were compromised? 1,1 billion

  • What kind of data was affected? Names, ID numbers, phone numbers, addresses, criminal records, order history.

  • What happened next? Hackers put it for sale for 10 bitcoins. Alibaba stated that they will work with law enforcement to protect its user data.

A LinkedIn profile on a computer screen under attack by online threats in an API cyberattack.

2021 · Exploit in the site’s API

LinkedIn cyberattack

  • How many accounts were compromised? 700 million

  • What kind of data was affected? Email addresses, phone numbers, geolocation records, genders.

  • What happened next? LinkedIn argued that no sensitive data was exposed. The hacker posted the data on a dark web forum.

An open envelope with an embedded fishing hook, symbolizing the theft of data in the cyberattack.

2019 · Unrestricted access to two databases

Facebook database attack

  • How many accounts were compromised? 533 million

  • What kind of data was affected? Phone numbers, account names, and Facebook IDs.

  • What happened next? The data was posted online for free. The HIBP website was updated with a phone number lookup.

An unlocked padlock over a computer server with a cloud in the background.

2017 · The WannaCry ransomware attack

Windows ransomware attack

  • How many accounts were compromised? 300,000

  • What kind of data was affected? Data and devices in multiple companies and organizations.

  • What happened next? The attack caused $4 billion in losses worldwide.

Knowledge at a glance

Browse thousands of cybersecurity definitions in NordVPN’s Cybersecurity Glossary.

Cybersecurity frameworks and regulations

Overview of common cybersecurity frameworks

NIST Cybersecurity Framework

Developed by the National Institute of Standards and Technology (NIST), it integrates industry standards and best practices to help organizations manage and protect their data and infrastructure.

CIS Controls

Developed by the Center for Internet Security, this framework provides organizations with a set of actions that help them improve their cybersecurity structure.

ISO/IEC 27001

A recognized international standard for creating and improving an organization’s information security management systems. It outlines the best industry practices and requirements for establishing, maintaining, and improving organizational cybersecurity.

SANS Critical Security Controls

Developed by the SANS Institute, this framework consists of a set of 20 security controls that are organized into three categories: basic, foundational, and organizational. The controls are meant to help organizations defend against cyber threats.

FAIR (Factor Analysis of Information Risk

A quantitative information risk management framework that provides a structured approach to evaluating and prioritizing information security risks.

CISA and TAXII

Frameworks designed to improve the sharing of cybersecurity threat intelligence between private organizations and the government.

Privacy Regulations

HIPAA

The Health Insurance Portability and Accountability Act is a US law that ensures the privacy and security of individually identifiable medical data.

GDPR

The General Data Protection Regulation is a data protection law within the EU and the European Economic Area meant to protect the privacy of EU citizens, give more control to the users, and regulate the collection, use, and storage of personal data.

COPPA

The Children’s Online Privacy Protection Act is a US federal law that regulates the collection of personal information of children under the age of 13.

CCPA

The California Consumer Privacy Act is a state law in California that gives consumers the right to know what personal information is being collected about them, request that it be deleted, and to opt-out of the sale of their personal information.

A man working on his laptop with a serious expression, concerned about his cybersecurity online.

Protect yourself from cybercriminals and report cybercrime

Faced with unknown digital threats and cybercrime? You are not alone in this battle — contact us.

Online security tools

Keep your digital life safe and secure with NordVPN’s free online security tools.

Upcoming cybersecurity events

Want to hear directly from the people behind Nord Security? Let’s meet!

Event name

Date

Location

Gartner Identity & Access Management Summit 2026

March 9-10, 2026

London, U.K.

RSAC Conference 2026

March 23-26, 2026

San Francisco, CA, USA

#OMR26: OMR Festival

May 5-6, 2026

Hamburg, Germany

BSides Tampa 2026

May 15-16, 2026

Tampa, FL, USA

BSides Knoxville 2026

May 22, 2026

Knoxville, TN, USA

2026 NICE Conference and Expo

June 1-3, 2026

Philadelphia, PA, USA

Black Hat USA 2026

August 1-6, 2026

Las Vegas, NV, USA

DEF CON 34

August 6-9, 2026

Las Vegas, NV, USA

Billington CyberSecurity Summit 2026

September 8-10, 2026

Washington DC, USA

A man happily browsing on his phone with a calendar showing cybersecurity events in the background.

Cybersecurity training

Want to learn more about cybersecurity but don’t know where to start? From beginner-friendly tutorials on our YouTube channel to in-depth engineering knowledge on our blog, we’ve got you covered.

Explore our cybersecurity resources

NordVPN has many experts, tech-savvy writers, and dedicated researchers who are ready to help you learn everything there is to know about cybersecurity.

Secure your digital life

Browse in confidence with the help of NordVPN’s cybersecurity experts.