In this blog, we walk you through the steps necessary to prevent a data leak in your organization.
Read more“This Password Has Appeared In a Data Leak.” What Now?
In this blog, we walk you through your options once you’re aware that you’re at risk of identity theft.
Read moreWhat Makes a Good Data Breach Checker?
In this blog, we discuss what makes or breaks a data breach search engine.
Read moreThe Data Breach Investigation and Mitigation Checklist
In this blog, we provide you with the data breach investigation and mitigation checklist necessary to avoid mishaps when dealing with a data breach.
Read moreThe TikTok & weChat Data Breaches: What’s Known?
In this blog, we walk you through the TikTok and weChat data breaches in more detail – join us to learn more!
Read moreExploit.in Data Breach Classification
Preface Data breach classification is a part of BreachDirectory. Data breach classification is made possible by using classifiers that can provide strong assumptions in regards
Read moreZynga Data Breach Analysis
Introduction Zynga is an American social game developer. The company was founded in April 2007 with headquarters in San Francisco, California, United States. The company
Read moreEdmodo Data Breach Analysis
Preface Edmodo, an educational technology company offering a communication, collaboration and coaching platform to K-12 schools and teachers, suffered a data breach in the spring
Read moreExploit.in Data Breach Analysis
Preface The 2013 Verizon Breach Report found that 76% of intrusions exploited weak or stolen credentials. The problem is apparent – password reuse. It’s been
Read more