BreachDirectory API

Web Application Security Headers Explained

In this blog, we walk you through the basics and possible implications of using HTTP security headers. Have a read!

1 year ago

Where Do Data Breaches Originate From? Top 10 Countries

In this blog, we’re walking you through the top 10 countries that data breaches originate from. We have some interesting…

2 years ago

Does a VPN Make You Anonymous?

Do VPN services make their users 100% anonymous? Join us as we answer that question!

2 years ago

Staying Cyber Safe on Christmas

In this blog, we're going to walk you through what can you do to stay safe when Christmas shopping online.

2 years ago

What Is a Data Leak? How Does It Differ From a Data Breach?

In this blog, we walk you through the similarities and differences between data leaks and data breaches. Have a read!

2 years ago

Data Breaches In the News

In this blog, we walk you through what impact can the media have on data breaches. Have a read.

2 years ago

How to Prepare For a Cyber Attack?

In this blog, we walk you through the things you should consider to be adequately prepared for a cyber attack.…

2 years ago

Steam Account Hacked? Here’s What to Do!

In this blog, we walk you through the things you need to do once you find out that your Steam…

2 years ago

What Is Bloatware?

In this blog, we walk you through bloatware and its impact on your computer. Have a read!

2 years ago