<?xml version="1.0" encoding="UTF-8"?><rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:atom="http://www.w3.org/2005/Atom" version="2.0" xmlns:itunes="http://www.itunes.com/dtds/podcast-1.0.dtd" xmlns:googleplay="http://www.google.com/schemas/play-podcasts/1.0"><channel><title><![CDATA[Yaksas Security: Archive]]></title><description><![CDATA[Section to redirect old posts]]></description><link>https://www.yaksas.com/s/archive</link><image><url>https://substackcdn.com/image/fetch/$s_!AvDo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feac72964-69ef-41b3-bf7a-79699b948964_500x500.png</url><title>Yaksas Security: Archive</title><link>https://www.yaksas.com/s/archive</link></image><generator>Substack</generator><lastBuildDate>Tue, 05 May 2026 22:40:57 GMT</lastBuildDate><atom:link href="https://www.yaksas.com/feed" rel="self" type="application/rss+xml"/><copyright><![CDATA[Yaksas Security]]></copyright><language><![CDATA[en]]></language><webMaster><![CDATA[yaksas@substack.com]]></webMaster><itunes:owner><itunes:email><![CDATA[yaksas@substack.com]]></itunes:email><itunes:name><![CDATA[Yaksas Security]]></itunes:name></itunes:owner><itunes:author><![CDATA[Yaksas Security]]></itunes:author><googleplay:owner><![CDATA[yaksas@substack.com]]></googleplay:owner><googleplay:email><![CDATA[yaksas@substack.com]]></googleplay:email><googleplay:author><![CDATA[Yaksas Security]]></googleplay:author><itunes:block><![CDATA[Yes]]></itunes:block><item><title><![CDATA[MOVED: Mona.py for exploit devs: 6 must know commands]]></title><description><![CDATA[Moved: Mona.py for exploit devs: 6 must know commands]]></description><link>https://www.yaksas.com/p/monapy-for-exploit-devs-6-commands</link><guid isPermaLink="false">https://www.yaksas.com/p/monapy-for-exploit-devs-6-commands</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Sat, 19 Oct 2024 05:40:38 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AvDo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feac72964-69ef-41b3-bf7a-79699b948964_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This post has been moved to </p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:184569780,&quot;url&quot;:&quot;https://www.udaymittal.com/p/monapy-for-exploit-devs-6-must-know-commands&quot;,&quot;publication_id&quot;:2319448,&quot;publication_name&quot;:&quot;Uday Mittal's Substack&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!4-oo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png&quot;,&quot;title&quot;:&quot;Mona.py for exploit devs: 6 must know commands&quot;,&quot;truncated_body_text&quot;:&quot;When it comes to exploit development for Microsoft Windows, Mona.py is the go to library for most security researchers. In this post I list six commands that I use often. Watch the video for demonstration.&quot;,&quot;date&quot;:&quot;2024-10-19T17:41:00.000Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:202856195,&quot;name&quot;:&quot;Uday Mittal&quot;,&quot;handle&quot;:&quot;udaymittal&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1bdc076-3826-4ec4-b1fe-a7a77ca4de01_561x562.jpeg&quot;,&quot;bio&quot;:&quot;Cybersecurity professional. Specializing in Offensive Security and Cyber Defense. I write about technology and cybersecurity.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-02-03T07:00:49.159Z&quot;,&quot;reader_installed_at&quot;:null,&quot;publicationUsers&quot;:[{&quot;id&quot;:2339450,&quot;user_id&quot;:202856195,&quot;publication_id&quot;:2319448,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:2319448,&quot;name&quot;:&quot;Uday Mittal's Substack&quot;,&quot;subdomain&quot;:&quot;udaymittal&quot;,&quot;custom_domain&quot;:&quot;www.udaymittal.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Cybersecurity professional. Specializing in Offensive Security and Cyber Defense. I write about technology and cybersecurity.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png&quot;,&quot;author_id&quot;:202856195,&quot;primary_user_id&quot;:202856195,&quot;theme_var_background_pop&quot;:&quot;#FD5353&quot;,&quot;created_at&quot;:&quot;2024-02-03T07:00:54.398Z&quot;,&quot;email_from_name&quot;:&quot;Uday Mittal&quot;,&quot;copyright&quot;:&quot;Uday Mittal&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}},{&quot;id&quot;:3500207,&quot;user_id&quot;:202856195,&quot;publication_id&quot;:3434593,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:3434593,&quot;name&quot;:&quot;100 Days of Red Team&quot;,&quot;subdomain&quot;:&quot;100daysofredteam&quot;,&quot;custom_domain&quot;:&quot;www.100daysofredteam.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Learn red team concepts, tools, techniques and tradecraft with me, one day at a time.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19163ba8-5f2e-4d5f-9801-56cae2aea701_837x837.png&quot;,&quot;author_id&quot;:202856195,&quot;primary_user_id&quot;:null,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-11-29T12:43:20.091Z&quot;,&quot;email_from_name&quot;:&quot;Uday Mittal&quot;,&quot;copyright&quot;:&quot;Uday Mittal&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:false,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.udaymittal.com/p/monapy-for-exploit-devs-6-must-know-commands?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!4-oo!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png"><span class="embedded-post-publication-name">Uday Mittal's Substack</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Mona.py for exploit devs: 6 must know commands</div></div><div class="embedded-post-body">When it comes to exploit development for Microsoft Windows, Mona.py is the go to library for most security researchers. In this post I list six commands that I use often. Watch the video for demonstration&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">2 years ago &#183; Uday Mittal</div></a></div>]]></content:encoded></item><item><title><![CDATA[MOVED: Seven Common Cryptography Attacks]]></title><description><![CDATA[MOVED: Seven Common Cryptography Attacks]]></description><link>https://www.yaksas.com/p/seven-common-cryptography-attacks</link><guid isPermaLink="false">https://www.yaksas.com/p/seven-common-cryptography-attacks</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Fri, 18 Oct 2024 09:34:56 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AvDo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feac72964-69ef-41b3-bf7a-79699b948964_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<p>This post has been moved to </p><div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:184760285,&quot;url&quot;:&quot;https://www.udaymittal.com/p/seven-common-cryptography-attacks&quot;,&quot;publication_id&quot;:2319448,&quot;publication_name&quot;:&quot;Uday Mittal's Substack&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!4-oo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png&quot;,&quot;title&quot;:&quot;Seven Common Cryptography Attacks&quot;,&quot;truncated_body_text&quot;:&quot;Cryptography, the cornerstone of data security, is under constant threat from attackers employing various techniques to crack encrypted data. In this article, we explore seven prominent cryptographic attacks and how they exploit weaknesses in cryptographic systems.&quot;,&quot;date&quot;:&quot;2024-10-18T09:45:00.000Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:202856195,&quot;name&quot;:&quot;Uday Mittal&quot;,&quot;handle&quot;:&quot;udaymittal&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1bdc076-3826-4ec4-b1fe-a7a77ca4de01_561x562.jpeg&quot;,&quot;bio&quot;:&quot;Cybersecurity professional. Specializing in Offensive Security and Cyber Defense. I write about technology and cybersecurity.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-02-03T07:00:49.159Z&quot;,&quot;reader_installed_at&quot;:null,&quot;publicationUsers&quot;:[{&quot;id&quot;:2339450,&quot;user_id&quot;:202856195,&quot;publication_id&quot;:2319448,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:2319448,&quot;name&quot;:&quot;Uday Mittal's Substack&quot;,&quot;subdomain&quot;:&quot;udaymittal&quot;,&quot;custom_domain&quot;:&quot;www.udaymittal.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Cybersecurity professional. Specializing in Offensive Security and Cyber Defense. I write about technology and cybersecurity.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png&quot;,&quot;author_id&quot;:202856195,&quot;primary_user_id&quot;:202856195,&quot;theme_var_background_pop&quot;:&quot;#FD5353&quot;,&quot;created_at&quot;:&quot;2024-02-03T07:00:54.398Z&quot;,&quot;email_from_name&quot;:&quot;Uday Mittal&quot;,&quot;copyright&quot;:&quot;Uday Mittal&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}},{&quot;id&quot;:3500207,&quot;user_id&quot;:202856195,&quot;publication_id&quot;:3434593,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:3434593,&quot;name&quot;:&quot;100 Days of Red Team&quot;,&quot;subdomain&quot;:&quot;100daysofredteam&quot;,&quot;custom_domain&quot;:&quot;www.100daysofredteam.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Learn red team concepts, tools, techniques and tradecraft with me, one day at a time.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19163ba8-5f2e-4d5f-9801-56cae2aea701_837x837.png&quot;,&quot;author_id&quot;:202856195,&quot;primary_user_id&quot;:null,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-11-29T12:43:20.091Z&quot;,&quot;email_from_name&quot;:&quot;Uday Mittal&quot;,&quot;copyright&quot;:&quot;Uday Mittal&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:false,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.udaymittal.com/p/seven-common-cryptography-attacks?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!4-oo!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png"><span class="embedded-post-publication-name">Uday Mittal's Substack</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">Seven Common Cryptography Attacks</div></div><div class="embedded-post-body">Cryptography, the cornerstone of data security, is under constant threat from attackers employing various techniques to crack encrypted data. In this article, we explore seven prominent cryptographic attacks and how they exploit weaknesses in cryptographic systems&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">2 years ago &#183; Uday Mittal</div></a></div>]]></content:encoded></item><item><title><![CDATA[MOVED: The Data Breach That Changed Everything]]></title><description><![CDATA[MOVED: The Data Breach That Changed Everything]]></description><link>https://www.yaksas.com/p/the-data-breach-that-changed-everything</link><guid isPermaLink="false">https://www.yaksas.com/p/the-data-breach-that-changed-everything</guid><dc:creator><![CDATA[Yaksas Security]]></dc:creator><pubDate>Wed, 09 Oct 2024 06:54:50 GMT</pubDate><enclosure url="https://substackcdn.com/image/fetch/$s_!AvDo!,w_256,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2Feac72964-69ef-41b3-bf7a-79699b948964_500x500.png" length="0" type="image/jpeg"/><content:encoded><![CDATA[<div class="embedded-post-wrap" data-attrs="{&quot;id&quot;:184840650,&quot;url&quot;:&quot;https://www.udaymittal.com/p/the-data-breach-that-changed-everything&quot;,&quot;publication_id&quot;:2319448,&quot;publication_name&quot;:&quot;Uday Mittal's Substack&quot;,&quot;publication_logo_url&quot;:&quot;https://substackcdn.com/image/fetch/$s_!4-oo!,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png&quot;,&quot;title&quot;:&quot;The Data Breach That Changed Everything&quot;,&quot;truncated_body_text&quot;:&quot;The 2013 Target data breach stands as one of the most impactful cybersecurity incidents in the history, not just because of its scale, but due to the profound changes it brought to how businesses handle cybersecurity. The breach exposed the personal information, including credit and debit card data, of over&quot;,&quot;date&quot;:&quot;2026-01-17T05:04:31.376Z&quot;,&quot;like_count&quot;:0,&quot;comment_count&quot;:0,&quot;bylines&quot;:[{&quot;id&quot;:202856195,&quot;name&quot;:&quot;Uday Mittal&quot;,&quot;handle&quot;:&quot;udaymittal&quot;,&quot;previous_name&quot;:null,&quot;photo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/c1bdc076-3826-4ec4-b1fe-a7a77ca4de01_561x562.jpeg&quot;,&quot;bio&quot;:&quot;Cybersecurity professional. Specializing in Offensive Security and Cyber Defense. I write about technology and cybersecurity.&quot;,&quot;profile_set_up_at&quot;:&quot;2024-02-03T07:00:49.159Z&quot;,&quot;reader_installed_at&quot;:null,&quot;publicationUsers&quot;:[{&quot;id&quot;:2339450,&quot;user_id&quot;:202856195,&quot;publication_id&quot;:2319448,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:true,&quot;publication&quot;:{&quot;id&quot;:2319448,&quot;name&quot;:&quot;Uday Mittal's Substack&quot;,&quot;subdomain&quot;:&quot;udaymittal&quot;,&quot;custom_domain&quot;:&quot;www.udaymittal.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Cybersecurity professional. Specializing in Offensive Security and Cyber Defense. I write about technology and cybersecurity.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png&quot;,&quot;author_id&quot;:202856195,&quot;primary_user_id&quot;:202856195,&quot;theme_var_background_pop&quot;:&quot;#FD5353&quot;,&quot;created_at&quot;:&quot;2024-02-03T07:00:54.398Z&quot;,&quot;email_from_name&quot;:&quot;Uday Mittal&quot;,&quot;copyright&quot;:&quot;Uday Mittal&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}},{&quot;id&quot;:3500207,&quot;user_id&quot;:202856195,&quot;publication_id&quot;:3434593,&quot;role&quot;:&quot;admin&quot;,&quot;public&quot;:true,&quot;is_primary&quot;:false,&quot;publication&quot;:{&quot;id&quot;:3434593,&quot;name&quot;:&quot;100 Days of Red Team&quot;,&quot;subdomain&quot;:&quot;100daysofredteam&quot;,&quot;custom_domain&quot;:&quot;www.100daysofredteam.com&quot;,&quot;custom_domain_optional&quot;:false,&quot;hero_text&quot;:&quot;Learn red team concepts, tools, techniques and tradecraft with me, one day at a time.&quot;,&quot;logo_url&quot;:&quot;https://substack-post-media.s3.amazonaws.com/public/images/19163ba8-5f2e-4d5f-9801-56cae2aea701_837x837.png&quot;,&quot;author_id&quot;:202856195,&quot;primary_user_id&quot;:null,&quot;theme_var_background_pop&quot;:&quot;#FF6719&quot;,&quot;created_at&quot;:&quot;2024-11-29T12:43:20.091Z&quot;,&quot;email_from_name&quot;:&quot;Uday Mittal&quot;,&quot;copyright&quot;:&quot;Uday Mittal&quot;,&quot;founding_plan_name&quot;:null,&quot;community_enabled&quot;:true,&quot;invite_only&quot;:false,&quot;payments_state&quot;:&quot;disabled&quot;,&quot;language&quot;:null,&quot;explicit&quot;:false,&quot;homepage_type&quot;:&quot;newspaper&quot;,&quot;is_personal_mode&quot;:false}}],&quot;is_guest&quot;:false,&quot;bestseller_tier&quot;:null,&quot;status&quot;:{&quot;bestsellerTier&quot;:null,&quot;subscriberTier&quot;:null,&quot;leaderboard&quot;:null,&quot;vip&quot;:false,&quot;badge&quot;:null,&quot;paidPublicationIds&quot;:[],&quot;subscriber&quot;:null}}],&quot;utm_campaign&quot;:null,&quot;belowTheFold&quot;:false,&quot;type&quot;:&quot;newsletter&quot;,&quot;language&quot;:&quot;en&quot;}" data-component-name="EmbeddedPostToDOM"><a class="embedded-post" native="true" href="https://www.udaymittal.com/p/the-data-breach-that-changed-everything?utm_source=substack&amp;utm_campaign=post_embed&amp;utm_medium=web"><div class="embedded-post-header"><img class="embedded-post-publication-logo" src="https://substackcdn.com/image/fetch/$s_!4-oo!,w_56,c_limit,f_auto,q_auto:good,fl_progressive:steep/https%3A%2F%2Fsubstack-post-media.s3.amazonaws.com%2Fpublic%2Fimages%2F8eca86ff-0051-4405-b74f-74d582ba8c15_561x561.png"><span class="embedded-post-publication-name">Uday Mittal's Substack</span></div><div class="embedded-post-title-wrapper"><div class="embedded-post-title">The Data Breach That Changed Everything</div></div><div class="embedded-post-body">The 2013 Target data breach stands as one of the most impactful cybersecurity incidents in the history, not just because of its scale, but due to the profound changes it brought to how businesses handle cybersecurity. The breach exposed the personal information, including credit and debit card data, of over&#8230;</div><div class="embedded-post-cta-wrapper"><span class="embedded-post-cta">Read more</span></div><div class="embedded-post-meta">4 months ago &#183; Uday Mittal</div></a></div>]]></content:encoded></item></channel></rss>