In this blog, we walk you through the steps necessary to prevent a data leak in your organization.
In this blog, we walk you through your options once you're aware that you're at risk of identity theft.
In this blog, we discuss what makes or breaks a data breach search engine.
In this blog, we provide you with the data breach investigation and mitigation checklist necessary to avoid mishaps when dealing…
In this blog, we walk you through the TikTok and weChat data breaches in more detail - join us to…
Preface Data breach classification is a part of BreachDirectory. Data breach classification is made possible by using classifiers that can…
Introduction Zynga is an American social game developer. The company was founded in April 2007 with headquarters in San Francisco,…
Preface Edmodo, an educational technology company offering a communication, collaboration and coaching platform to K-12 schools and teachers, suffered a…
Preface The 2013 Verizon Breach Report found that 76% of intrusions exploited weak or stolen credentials. The problem is apparent…
Preface On November 23, 2017 imgur was notified of a potential security breach. The breach affected email addresses and passwords…