Your IP: Unknown · Your Status: ProtectedUnprotectedUnknown

Skip to main content

The Cybersecurity Hub

Your one-stop-shop for all things cybersec. What is the Cybersecurity Hub? It’s a place for people interested in cybersecurity, where they can find useful links and information about the most prevalent online threats and the best ways to protect themselves and their devices.

a woman safely browsing on her laptop, happy that she is protected online by cybersecurity.

Introduction to cybersecurity

Cybersecurity can be categorized into several distinct types:

Critical infrastructure security

Protecting networks, systems, and assets that are critical to the security and operation of an organization or a country.

Network security

Protecting networking infrastructure from unauthorized access and misuse — both by outsiders and insiders.

Internet of Things security

Protecting networks and the IoT devices connected to them from malware and data breaches.

Cloud security

Protecting cloud infrastructure, applications, and data from various threats and unauthorized access.

Application security

Protecting applications from threats by creating, adding, and testing special security features.

Want to find out more?

Explore our cybersecurity hub and learn about the most prevalent online threats, different cybersecurity measures you can take, and how Nord Security products can help.

The worst cybersecurity incidents
of all time

passwords surrounding an unlocked padlock, symbolizing password theft in a data breach.

2013 · Database vulnerability

Yahoo database breach

  • How many accounts were compromised? 3 billion
  • What kind of data was affected? Names, emails, phone numbers, birthdays, hashed passwords, security questions and answers.
  • What happened next? Yahoo hid the scope of the breach for 4 years.

an open eye over a document on a laptop, symbolizing the loss of private data in the cyberattack.

2017 · NotPetya cyberattack

Ukraine cyberattack

  • How many accounts were compromised? 50,000
  • What kind of data was affected? Data and devices in multiple airports, shipping and oil companies, banks, and government agencies.
  • What happened next? The attack caused $10 billion worth of damage and the infrastructure took months to restore.

a personal identity card with a system rollback icon, representing data that needs to be protected.

2019 · Crawler software scraped customer data

Alibaba cyberattack

  • How many accounts were compromised? 1,1 billion
  • What kind of data was affected? Names, ID numbers, phone numbers, addresses, criminal records, order history.
  • What happened next? Hackers put it for sale for 10 bitcoins. Alibaba stated that they will work with law enforcement to protect its user data.

a LinkedIn profile on a computer screen under attack by online threats in an API cyberattack.

2021 · Exploit in the site’s API

LinkedIn cyberattack

  • How many accounts were compromised? 700 million
  • What kind of data was affected? Email addresses, phone numbers, geolocation records, genders.
  • What happened next? LinkedIn argued that no sensitive data was exposed. The hacker posted the data on a dark web forum.

an open envelope with an embedded fishing hook, symbolizing the theft of data in the cyberattack.

2019 · Unrestricted access to two databases

Facebook database attack

  • How many accounts were compromised? 533 million
  • What kind of data was affected? Phone numbers, account names, and Facebook IDs.
  • What happened next? The data was posted online for free. The HIBP website was updated with a phone number lookup.

an unlocked padlock over a computer server with a cloud in the background.

2017 · The WannaCry ransomware attack

Windows ransomware attack

  • How many accounts were compromised? 300,000
  • What kind of data was affected? Data and devices in multiple companies and organizations.
  • What happened next? The attack caused $4 billion in losses worldwide.

Knowledge at a glance

Browse thousands of cybersecurity definitions in NordVPN’s Cybersecurity Glossary.

Cybersecurity frameworks and regulations

Overview of common cybersecurity frameworks

NIST Cybersecurity Framework

Developed by the National Institute of Standards and Technology (NIST), it integrates industry standards and best practices to help organizations manage and protect their data and infrastructure.

CIS Controls

Developed by the Center for Internet Security, this framework provides organizations with a set of actions that help them improve their cybersecurity structure.

ISO/IEC 27001

A recognized international standard for creating and improving an organization’s information security management systems. It outlines the best industry practices and requirements for establishing, maintaining, and improving organizational cybersecurity.

SANS Critical Security Controls

Developed by the SANS Institute, this framework consists of a set of 20 security controls that are organized into three categories: basic, foundational, and organizational. The controls are meant to help organizations defend against cyber threats.

FAIR (Factor Analysis of Information Risk

A quantitative information risk management framework that provides a structured approach to evaluating and prioritizing information security risks.

CISA and TAXII

Frameworks designed to improve the sharing of cybersecurity threat intelligence between private organizations and the government.

Privacy Regulations

HIPAA

The Health Insurance Portability and Accountability Act is a US law that ensures the privacy and security of individually identifiable medical data.

GDPR

The General Data Protection Regulation is a data protection law within the EU and the European Economic Area meant to protect the privacy of EU citizens, give more control to the users, and regulate the collection, use, and storage of personal data.

COPPA

The Children’s Online Privacy Protection Act is a US federal law that regulates the collection of personal information of children under the age of 13.

CCPA

The California Consumer Privacy Act is a state law in California that gives consumers the right to know what personal information is being collected about them, request that it be deleted, and to opt-out of the sale of their personal information.

a man working on his laptop with a serious expression, concerned about his cybersecurity online.

Protect yourself from cybercriminals and report cybercrime

Faced with unknown digital threats and cybercrime? You are not alone in this battle — contact us.

Online security tools

Keep your digital life safe and secure with NordVPN’s free online security tools.

a man happily browsing on his phone with a calendar showing cybersecurity events in the background.

Upcoming cybersecurity events

Want to hear directly from the people behind Nord Security? Let’s meet!

Event nameDateLocation
Data Connectors OT/ICS Virtual Cybersecurity Summit2 May 2024Virtual
BSides Knoxville | 202424 May 2024Knoxville, TN, USA
Black Hat USA 20243–8 August 2024Las Vegas, NV, USA
DEF CON 328–11 August 2024Las Vegas, NV, USA
OWASP 2024 Global AppSec San Francisco23–27 September 2024San Francisco, CA, USA
FutureCon Phoenix Cybersecurity Conference30 October 2024Phoenix, AZ, USA
Gartner Identity & Access Management Summit9–11 December 2024Grapevine, TX, USA

Cybersecurity training

Want to learn more about cybersecurity but don’t know where to start? From beginner-friendly tutorials on our YouTube channel to in-depth engineering knowledge on our blog, we’ve got you covered.

cybersecurity for beginners introduction to cybersecurity

Cybersecurity for Beginners

Watch on YouTube
woman in cybersecurity

Women in Cybersecurity

Watch on YouTube
cybersecurity myths explained

Cybersecurity myths explained

Watch on YouTube

Explore our cybersecurity resources

NordVPN has many experts, tech-savvy writers, and dedicated researchers who are ready to help you learn everything there is to know about cybersecurity.

Secure your digital life

Browse in confidence with the help of NordVPN’s cybersecurity experts.