Categories: Announcements

An Enterprise Edition of The BreachDirectory API Is Now Available!

The BreachDirectory API is used widely by companies in all kinds of industries – from online shopping and universities to cyber security. The use cases of the API range from operations in the open source intelligence (OSINT) sector to supporting the projects of private cyber security enthusiasts. However, the API has always had one downside – people could only check one account against the API at a time. Now, everything has changed – BreachDirectory also has an Enterprise edition of its API offering allowing bulk account checks. When an Enterprise edition of the BreachDirectory API is in use, users can not only make use of the powerful features offered by the API in the first place, but also check whether accounts are at risk of identity theft by scanning through a set of them at once – here‘s how everything looks like:

The bulk version of BreachDirectory‘s API is available here (you can also see how the page looks by looking at the image above), and its core principle is indeed very simple:

  1. Provide the system with the email address you‘ve purchased access to the bulk version of the API with.
  2. Provide a CSV file with the accounts you‘d like to be scanned through the API (at present, the API can scan through up to 100 accounts at once – we‘re working to increase the capabilities.)
  3. Last but not least, choose what types of data are in the CSV file – if you‘ve used the BreachDirectory API before you will know that the API supports all types of data supported by the search engine itself including email addresses, usernames, IP addresses, and domains of websites.

Wrapping Up

We hope that the bulk version of the API will be useful to both cybersecurity enthusiasts and information security experts alike. However, the next set of features is already in the works, so subscribe to our newsletter, and make sure to follow us on LinkedIn and Twitter for future updates.

Nirium

Recent Posts

When and How Best to Index Data?

Dive deep into ways to best index your data and learn how to mysql if…

1 week ago

How to Load Billions of Records Into MySQL? MySQL INSERT Explained

Dive deep into ways to load big data sets into MySQL with BreachDirectory. From MySQL…

2 weeks ago

Can the SQL EXPLAIN Statement be a DoS Vector?

Can the SQL EXPLAIN statement be a DoS vector and how to mitigate this threat?…

2 weeks ago

Cross Site Scripting (XSS) Explained

What is Cross Site Scripting, how does it work, and how can developers prevent it?…

2 weeks ago

Why You Shouldn’t Open Compressed Files with a Password on Them

BreachDirectory explains the risks of compressed files with a password on them for your infrastructure…

2 weeks ago

Schneider Electric: JIRA Server Breached

There have been rumors about a data breach targeting Schneider Electric. Did a data breach…

3 months ago