data breach scanner

How to Prepare for Black Friday? Staying Safe

In this guide, we walk you through how to stay safe online when shopping for Black Friday deals. Have a…

2 years ago

The Attack on Danish Railways – Lessons Learned

In this blog, we'll tell you what cyber attack caused Danish Railways to shut down their operations in early November.

2 years ago

What’s the Average Price of a Data Breach?

In this blog, we walk you through what determines a price of a data breach in the cybercriminal underworld. Have…

2 years ago

Password Strength Meters Explained: What, How, Why?

In this blog, we walk you through the ins and outs of password strength checkers. Have a read!

2 years ago

How to Delete Incognito History?

Did you know that browsing in incognito mode also leaves its traces on your device? Learn how to delete your…

2 years ago

Does the Russia-Ukraine War Have an Effect on Cybercrime?

In this blog, we provide you with some insights surrounding the war between Russia and Ukraine in the cybercriminal underworld.

2 years ago

What Is a Backdoor?

In this blog, we discuss everything about backdoors - what are they, are they harmful, and what damage can they…

2 years ago

What Are The Different Types of DDoS Attacks?

In this blog, we walk you through various types of DDoS attacks and tell you why are each of them…

2 years ago

How to Secure a Database?

In this blog, we will walk you through a couple of necessary steps to secure a database, no matter what…

2 years ago