“I present you a new rockyou2024 password list with over 9.9 billion passwords!” – said a hacker. That’s RockYou.txt: one of the biggest password dumps ever.
Read moreWhy Use the BreachDirectory API?
BreachDirectory is often asked – what’s the BreachDirectory API? Why should people use data breach API appliances to begin with? Read this blog and find out.
Read moreTop 3 Data Breaches of January 2023
In this blog post, we cover some of the biggest data breaches in January 2023. Have a read!
Read moreWhat is DbVisualizer and Should You Use It?
Read this blog and understand why DbVisualizer is the top choice for software and database engineers for more than 20 years.
Read moreIs CyberGhost VPN Free?
Is CyberGhost VPN free a myth? Does the CyberGhost VPN software keep logs or is it safe to use? Find out everything you need to know here.
Read moreThe AT&T Data Breach: Here’s What We Know
Did the AT&T data breach happen? What data classes did it expose and what can you do to protect yourself? Learn here.
Read morePostgreSQL vs MySQL: A Comparison
In this PostgreSQL vs MySQL blog, we walk you through when to choose PostgreSQL or MySQL for your use case.
Read moreAn Intro to Secure Internal Communication
In this blog, we walk you through secure internal communication tools and tell you what they’re used for.
Read moreThe Basics of Securing an Application
In the wake of recent news, knowledge of securing both your database and your application is more and more beneficial. In this short blog, we’ll
Read more