Data Breach Analysis

How to Prevent a Data Leak?

In this blog, we walk you through the steps necessary to prevent a data leak in your organization.

2 years ago

“This Password Has Appeared In a Data Leak.” What Now?

In this blog, we walk you through your options once you're aware that you're at risk of identity theft.

2 years ago

What Makes a Good Data Breach Checker?

In this blog, we discuss what makes or breaks a data breach search engine.

2 years ago

The Data Breach Investigation and Mitigation Checklist

In this blog, we provide you with the data breach investigation and mitigation checklist necessary to avoid mishaps when dealing…

2 years ago

The TikTok & weChat Data Breaches: What’s Known?

In this blog, we walk you through the TikTok and weChat data breaches in more detail - join us to…

2 years ago

Exploit.in Data Breach Classification

Preface Data breach classification is a part of BreachDirectory. Data breach classification is made possible by using classifiers that can…

4 years ago

Zynga Data Breach Analysis

Introduction Zynga is an American social game developer. The company was founded in April 2007 with headquarters in San Francisco,…

4 years ago

Edmodo Data Breach Analysis

Preface Edmodo, an educational technology company offering a communication, collaboration and coaching platform to K-12 schools and teachers, suffered a…

5 years ago

Exploit.in Data Breach Analysis

Preface The 2013 Verizon Breach Report found that 76% of intrusions exploited weak or stolen credentials. The problem is apparent…

5 years ago

imgur.com Data Breach Analysis

Preface On November 23, 2017 imgur was notified of a potential security breach. The breach affected email addresses and passwords…

5 years ago