Darius Burks
September 16, 2024
Journal 3
If you were to look at the timeline, you would see it is categorized by organizations with the most to the least number of breaches. Researchers might use this information to see where the most breaches are occurring and how they continuously are able to hack into these systems. By acquiring this information, researchers and other members of the cybersecurity team, can delete any viruses and put up better overall security defenses on their web. On this website you can see the timeline on when, where, and how these organizations were breached. This can give researchers ideas on how these hackers are making their malware more advanced and undectable against regular system scans.