Security

The MongoDB Security Incident: What’s Known

During December 2023, a new data breach – a MongoDB security incident – emerged. What Happened? According to HackRead, MongoDB’s…

6 months ago

What Can Be Done with an Email Address? Cybercriminal Perspective

Email addresses are amongst the most frequently stolen pieces of information in data breaches. What can be done with them?…

1 year ago

Cyber Liability vs. Data Breach

In this blog, we walk you through the key similarities and differences between cyber liability and a data breach.

1 year ago

Which Team Is Responsible for Debriefing After a Cyber Attack?

Which team is responsible for debriefing after a cyber attack? Find out here.

1 year ago

3 Ways to Improve the Security of Your Web Application

There are many ways to improve the security of our web applications. In this blog, we provide you with some…

1 year ago

Web Application Security Headers Explained

In this blog, we walk you through the basics and possible implications of using HTTP security headers. Have a read!

1 year ago

Where Do Data Breaches Originate From? Top 10 Countries

In this blog, we’re walking you through the top 10 countries that data breaches originate from. We have some interesting…

2 years ago

Does a VPN Make You Anonymous?

Do VPN services make their users 100% anonymous? Join us as we answer that question!

2 years ago

Staying Cyber Safe on Christmas

In this blog, we're going to walk you through what can you do to stay safe when Christmas shopping online.

2 years ago

What Is a Data Leak? How Does It Differ From a Data Breach?

In this blog, we walk you through the similarities and differences between data leaks and data breaches. Have a read!

2 years ago