BreachDirectory

The Indicators of Compromise: Have You Been Hacked?

In this blog, we walk you through the various Indicators of Compromise (IoC) that can signal a data breach in…

2 years ago

What Is a Hacker?

In this blog post, we dig into the world of hackers and answer the age old question - what is…

2 years ago

DDoS Attacks: Common Types and Protection Methods

In this blog, we walk you through the common types of DDoS attacks and ways to protect against them.

2 years ago

The Importance of APIs In the Information Security Industry: A Walkthrough

In this blog, we walk you through what API solutions can do to safeguard your data. Have a read!

2 years ago

The API Security Checklist

In this blog, we walk you through everything you need to know about APIs from the security perspective.

2 years ago

Staying Safe In a Work From Home Environment: A Guide

This blog will act as a guide teaching you how to safely work remotely from home. Have a read!

2 years ago

How Secure is Slack?

In this blog, we answer a popular question for those working from home - is Slack safe to use?

2 years ago

What Not to Do After a Data Breach?

In this blog, we explain what you should avoid doing after the company you work at suffers a data breach.…

2 years ago

Discord Data Leak – Did the Service Suffer a Data Breach?

In this blog, we dig into the rumors surrounding Discord - did the Discord data breach really happen?

2 years ago