Skip to content

Commit 29bd9a7

Browse files
authored
Update index.md to 2025
1 parent 8e547d0 commit 29bd9a7

1 file changed

Lines changed: 31 additions & 31 deletions

File tree

index.md

Lines changed: 31 additions & 31 deletions
Original file line numberDiff line numberDiff line change
@@ -24,47 +24,47 @@ You do not have to be a security expert or a programmer to contribute. Contact t
2424
* We are actively looking for organizations and individuals who understand data security challenges.
2525
* Individuals and organizations contributing to the project will be listed on the acknowledgments page.
2626

27-
## Data Security Top 10 2023
27+
## Data Security Top 10 2025
2828

29-
* **[DATA1:2023 - Injection Attacks][DATA1:2023]**
29+
* **[DATA1:2025 - Injection Attacks][DATA1:2025]**
3030

31-
Unauthorized individuals exploiting vulnerabilities to inject malicious code or commands that can compromise data integrity and confidentiality. [Continue reading][DATA1:2023].
31+
Unauthorized individuals exploiting vulnerabilities to inject malicious code or commands that can compromise data integrity and confidentiality. [Continue reading][DATA1:2025].
3232

33-
* **[DATA2:2023 - Broken Authentication and Access Control][DATA2:2023]**
33+
* **[DATA2:2025 - Broken Authentication and Access Control][DATA2:2025]**
3434

35-
Weak authentication mechanisms, inadequate access controls, or misconfigured permissions that allow unauthorized access to sensitive data. [Continue reading][DATA2:2023].
35+
Weak authentication mechanisms, inadequate access controls, or misconfigured permissions that allow unauthorized access to sensitive data. [Continue reading][DATA2:2025].
3636

37-
* **[DATA3:2023 - Data Breaches][DATA3:2023]**
37+
* **[DATA3:2025 - Data Breaches][DATA3:2025]**
3838

39-
Unauthorized disclosure or theft of sensitive data, compromising its confidentiality and potentially leading to legal and reputational consequences. [Continue reading][DATA3:2023].
39+
Unauthorized disclosure or theft of sensitive data, compromising its confidentiality and potentially leading to legal and reputational consequences. [Continue reading][DATA3:2025].
4040

41-
* **[DATA4:2023 - Malware and Ransomware Attacks][DATA4:2023]**
41+
* **[DATA4:2025 - Malware and Ransomware Attacks][DATA4:2025]**
4242

43-
Malicious software infections that can compromise data availability, confidentiality, and integrity, often through phishing attacks or unpatched software vulnerabilities. [Continue reading][DATA4:2023].
43+
Malicious software infections that can compromise data availability, confidentiality, and integrity, often through phishing attacks or unpatched software vulnerabilities. [Continue reading][DATA4:2025].
4444

45-
* **[DATA5:2023 - Insider Threats][DATA5:2023]**
45+
* **[DATA5:2025 - Insider Threats][DATA5:2025]**
4646

47-
Malicious or unintentional actions by authorized users, such as employees or contractors, that lead to unauthorized access, misuse, or exposure of sensitive data. [Continue reading][DATA5:2023].
47+
Malicious or unintentional actions by authorized users, such as employees or contractors, that lead to unauthorized access, misuse, or exposure of sensitive data. [Continue reading][DATA5:2025].
4848

49-
* **[DATA6:2023 - Weak Cryptography][DATA6:2023]**
49+
* **[DATA6:2025 - Weak Cryptography][DATA6:2025]**
5050

51-
Inadequate encryption practices, including weak algorithms, improper key management, or lack of encryption, making data vulnerable to unauthorized access or tampering. [Continue reading][DATA6:2023].
51+
Inadequate encryption practices, including weak algorithms, improper key management, or lack of encryption, making data vulnerable to unauthorized access or tampering. [Continue reading][DATA6:2025].
5252

53-
* **[DATA7:2023 - Insecure Data Handling][DATA7:2023]**
53+
* **[DATA7:2025 - Insecure Data Handling][DATA7:2025]**
5454

55-
Improper storage, transmission, or disposal of sensitive data, leading to inadvertent exposure or loss. [Continue reading][DATA7:2023].
55+
Improper storage, transmission, or disposal of sensitive data, leading to inadvertent exposure or loss. [Continue reading][DATA7:2025].
5656

57-
* **[DATA8:2023 - Inadequate Third-Party Security][DATA8:2023]**
57+
* **[DATA8:2025 - Inadequate Third-Party Security][DATA8:2025]**
5858

59-
Insufficient security measures by third-party vendors or integrations, creating vulnerabilities that can be exploited to gain unauthorized access to data. [Continue reading][DATA8:2023].
59+
Insufficient security measures by third-party vendors or integrations, creating vulnerabilities that can be exploited to gain unauthorized access to data. [Continue reading][DATA8:2025].
6060

61-
* **[DATA9:2023 - Data Inventory and Data Management][DATA9:2023]**
61+
* **[DATA9:2025 - Data Inventory and Data Management][DATA9:2025]**
6262

63-
Incomplete or inaccurate inventory of digital assets and inadequate data management practices, leading to difficulties in protecting and securing data effectively. [Continue reading][DATA9:2023].
63+
Incomplete or inaccurate inventory of digital assets and inadequate data management practices, leading to difficulties in protecting and securing data effectively. [Continue reading][DATA9:2025].
6464

65-
* **[DATA10:2023 - Non-Compliance with Data Protection Regulations][DATA10:2023]**
65+
* **[DATA10:2025 - Non-Compliance with Data Protection Regulations][DATA10:2025]**
6666

67-
Failure to comply with applicable data protection regulations, industry standards, and legal requirements, exposing organizations to legal liabilities and reputational harm. [Continue reading][DATA10:2023].
67+
Failure to comply with applicable data protection regulations, industry standards, and legal requirements, exposing organizations to legal liabilities and reputational harm. [Continue reading][DATA10:2025].
6868

6969
## Licensing
7070

@@ -78,13 +78,13 @@ this work, you may distribute the resulting work only under the same or similar
7878
license to this one.
7979

8080
[license]: https://creativecommons.org/licenses/by-sa/4.0/
81-
[DATA1:2023]: https://owasp.org/www-project-data-security-top-10/1-injection-attacks/
82-
[DATA2:2023]: https://owasp.org/www-project-data-security-top-10/2-broken-authentication-and-access-control/
83-
[DATA3:2023]: https://owasp.org/www-project-data-security-top-10/3-data-breaches/
84-
[DATA4:2023]: https://owasp.org/www-project-data-security-top-10/4-malware-and-ransomware-attacks/
85-
[DATA5:2023]: https://owasp.org/www-project-data-security-top-10/5-insider-threats/
86-
[DATA6:2023]: https://owasp.org/www-project-data-security-top-10/6-weak-encryption/
87-
[DATA7:2023]: https://owasp.org/www-project-data-security-top-10/7-insecure-data-handling/
88-
[DATA8:2023]: https://owasp.org/www-project-data-security-top-10/8-inadequate-thirdparty-security/
89-
[DATA9:2023]: https://owasp.org/www-project-data-security-top-10/9-data-inventory-and-data-management/
90-
[DATA10:2023]: https://owasp.org/www-project-data-security-top-10/10-non-compliance-and-data-protection-regulations/
81+
[DATA1:2025]: https://owasp.org/www-project-data-security-top-10/1-injection-attacks/
82+
[DATA2:2025]: https://owasp.org/www-project-data-security-top-10/2-broken-authentication-and-access-control/
83+
[DATA3:2025]: https://owasp.org/www-project-data-security-top-10/3-data-breaches/
84+
[DATA4:2025]: https://owasp.org/www-project-data-security-top-10/4-malware-and-ransomware-attacks/
85+
[DATA5:2025]: https://owasp.org/www-project-data-security-top-10/5-insider-threats/
86+
[DATA6:2025]: https://owasp.org/www-project-data-security-top-10/6-weak-encryption/
87+
[DATA7:2025]: https://owasp.org/www-project-data-security-top-10/7-insecure-data-handling/
88+
[DATA8:2025]: https://owasp.org/www-project-data-security-top-10/8-inadequate-thirdparty-security/
89+
[DATA9:2025]: https://owasp.org/www-project-data-security-top-10/9-data-inventory-and-data-management/
90+
[DATA10:2025]: https://owasp.org/www-project-data-security-top-10/10-non-compliance-and-data-protection-regulations/

0 commit comments

Comments
 (0)