Can the SQL EXPLAIN Statement be a DoS Vector?

7 months ago

Can the SQL EXPLAIN statement be a DoS vector and how to mitigate this threat? Find out here.

Cross Site Scripting (XSS) Explained

7 months ago

What is Cross Site Scripting, how does it work, and how can developers prevent it? Learn here.

Why You Shouldn’t Open Compressed Files with a Password on Them

7 months ago

BreachDirectory explains the risks of compressed files with a password on them for your infrastructure and the meaning of checksum…

Schneider Electric: JIRA Server Breached

10 months ago

There have been rumors about a data breach targeting Schneider Electric. Did a data breach happen and how to protect…

The Makers of Fiskars Scissors Got Breached: What’s Known

10 months ago

There have been rumors about the Fiskars Group – the company behind Fiskars scissors and the Fiskars axe – having…

Russia Fines Google for $20,000,000,000,000,000,000,000,000,000,000,000

10 months ago

Russia has fined Google more than two undecillion roubles because Google has refused to pay fines for blocking pro-Russian channels…

RockYou 2024.txt Looks Like a Binary File – Here’s Why

10 months ago

Why does RockYou 2024.txt look like a binary file when you open it up? Find out here.

Duolicious Data Leak: What You Need to Know

10 months ago

Duolicious is a dating app that connects people who are “chronically online.” Did the Duolicious data leak happen? Find out…

What is RockYou 2024.txt and How Did RockYou 2024 Come to Be?

10 months ago

This blog will tell you what RockYou 2024 is, how RockYou 2024.txt came to be, and what you should know…

Keeper Security: Beyond a Password Manager

11 months ago

What is the Keeper password manager provided by Keeper Security and what else should you do to protect yourself on…