BreachDirectory API

Alternatives to YouTube & TikTok

In this blog, we walk you through a bunch of alternatives to YouTube & TikTok. Have a read!

2 years ago

Salaries within the Information Security Sector: What, Why, How?

In this blog, we walk you through the salary information pertaining to information security experts. Have a read!

2 years ago

How to Prepare for Black Friday? Staying Safe

In this guide, we walk you through how to stay safe online when shopping for Black Friday deals. Have a…

2 years ago

The Attack on Danish Railways – Lessons Learned

In this blog, we'll tell you what cyber attack caused Danish Railways to shut down their operations in early November.

2 years ago

What’s the Average Price of a Data Breach?

This blog will walk you through what determines the price of a data breach in the cybercriminal underworld. Have a…

2 years ago

Password Strength Meters Explained: What, How, Why?

In this blog, we walk you through the ins and outs of password strength checkers. Have a read!

2 years ago

What’s the Price of Your Social Media Accounts?

In this blog, we walk you through how attackers assess the price of your social media accounts and answer the…

2 years ago

How to Delete Incognito History?

Did you know that browsing in incognito mode also leaves its traces on your device? Learn how to delete your…

2 years ago

Does the Russia-Ukraine War Have an Effect on Cybercrime?

In this blog, we provide you with some insights surrounding the war between Russia and Ukraine in the cybercriminal underworld.

2 years ago