You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: index.md
+31-31Lines changed: 31 additions & 31 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -24,47 +24,47 @@ You do not have to be a security expert or a programmer to contribute. Contact t
24
24
* We are actively looking for organizations and individuals who understand data security challenges.
25
25
* Individuals and organizations contributing to the project will be listed on the acknowledgments page.
26
26
27
-
## Data Security Top 10 2023
27
+
## Data Security Top 10 2025
28
28
29
-
***[DATA1:2023 - Injection Attacks][DATA1:2023]**
29
+
***[DATA1:2025 - Injection Attacks][DATA1:2025]**
30
30
31
-
Unauthorized individuals exploiting vulnerabilities to inject malicious code or commands that can compromise data integrity and confidentiality. [Continue reading][DATA1:2023].
31
+
Unauthorized individuals exploiting vulnerabilities to inject malicious code or commands that can compromise data integrity and confidentiality. [Continue reading][DATA1:2025].
32
32
33
-
***[DATA2:2023 - Broken Authentication and Access Control][DATA2:2023]**
33
+
***[DATA2:2025 - Broken Authentication and Access Control][DATA2:2025]**
34
34
35
-
Weak authentication mechanisms, inadequate access controls, or misconfigured permissions that allow unauthorized access to sensitive data. [Continue reading][DATA2:2023].
35
+
Weak authentication mechanisms, inadequate access controls, or misconfigured permissions that allow unauthorized access to sensitive data. [Continue reading][DATA2:2025].
36
36
37
-
***[DATA3:2023 - Data Breaches][DATA3:2023]**
37
+
***[DATA3:2025 - Data Breaches][DATA3:2025]**
38
38
39
-
Unauthorized disclosure or theft of sensitive data, compromising its confidentiality and potentially leading to legal and reputational consequences. [Continue reading][DATA3:2023].
39
+
Unauthorized disclosure or theft of sensitive data, compromising its confidentiality and potentially leading to legal and reputational consequences. [Continue reading][DATA3:2025].
40
40
41
-
***[DATA4:2023 - Malware and Ransomware Attacks][DATA4:2023]**
41
+
***[DATA4:2025 - Malware and Ransomware Attacks][DATA4:2025]**
42
42
43
-
Malicious software infections that can compromise data availability, confidentiality, and integrity, often through phishing attacks or unpatched software vulnerabilities. [Continue reading][DATA4:2023].
43
+
Malicious software infections that can compromise data availability, confidentiality, and integrity, often through phishing attacks or unpatched software vulnerabilities. [Continue reading][DATA4:2025].
44
44
45
-
***[DATA5:2023 - Insider Threats][DATA5:2023]**
45
+
***[DATA5:2025 - Insider Threats][DATA5:2025]**
46
46
47
-
Malicious or unintentional actions by authorized users, such as employees or contractors, that lead to unauthorized access, misuse, or exposure of sensitive data. [Continue reading][DATA5:2023].
47
+
Malicious or unintentional actions by authorized users, such as employees or contractors, that lead to unauthorized access, misuse, or exposure of sensitive data. [Continue reading][DATA5:2025].
48
48
49
-
***[DATA6:2023 - Weak Cryptography][DATA6:2023]**
49
+
***[DATA6:2025 - Weak Cryptography][DATA6:2025]**
50
50
51
-
Inadequate encryption practices, including weak algorithms, improper key management, or lack of encryption, making data vulnerable to unauthorized access or tampering. [Continue reading][DATA6:2023].
51
+
Inadequate encryption practices, including weak algorithms, improper key management, or lack of encryption, making data vulnerable to unauthorized access or tampering. [Continue reading][DATA6:2025].
52
52
53
-
***[DATA7:2023 - Insecure Data Handling][DATA7:2023]**
53
+
***[DATA7:2025 - Insecure Data Handling][DATA7:2025]**
54
54
55
-
Improper storage, transmission, or disposal of sensitive data, leading to inadvertent exposure or loss. [Continue reading][DATA7:2023].
55
+
Improper storage, transmission, or disposal of sensitive data, leading to inadvertent exposure or loss. [Continue reading][DATA7:2025].
Insufficient security measures by third-party vendors or integrations, creating vulnerabilities that can be exploited to gain unauthorized access to data. [Continue reading][DATA8:2023].
59
+
Insufficient security measures by third-party vendors or integrations, creating vulnerabilities that can be exploited to gain unauthorized access to data. [Continue reading][DATA8:2025].
60
60
61
-
***[DATA9:2023 - Data Inventory and Data Management][DATA9:2023]**
61
+
***[DATA9:2025 - Data Inventory and Data Management][DATA9:2025]**
62
62
63
-
Incomplete or inaccurate inventory of digital assets and inadequate data management practices, leading to difficulties in protecting and securing data effectively. [Continue reading][DATA9:2023].
63
+
Incomplete or inaccurate inventory of digital assets and inadequate data management practices, leading to difficulties in protecting and securing data effectively. [Continue reading][DATA9:2025].
64
64
65
-
***[DATA10:2023 - Non-Compliance with Data Protection Regulations][DATA10:2023]**
65
+
***[DATA10:2025 - Non-Compliance with Data Protection Regulations][DATA10:2025]**
66
66
67
-
Failure to comply with applicable data protection regulations, industry standards, and legal requirements, exposing organizations to legal liabilities and reputational harm. [Continue reading][DATA10:2023].
67
+
Failure to comply with applicable data protection regulations, industry standards, and legal requirements, exposing organizations to legal liabilities and reputational harm. [Continue reading][DATA10:2025].
68
68
69
69
## Licensing
70
70
@@ -78,13 +78,13 @@ this work, you may distribute the resulting work only under the same or similar
0 commit comments