data breach

Why Use the BreachDirectory API?

BreachDirectory is often asked – what’s the BreachDirectory API? Why should people use data breach API appliances to begin with?…

5 months ago

Top 3 Data Breaches of January 2023

In this blog post, we cover some of the biggest data breaches in January 2023. Have a read!

5 months ago

Is CyberGhost VPN Free?

Is CyberGhost VPN free a myth? Does the CyberGhost VPN software keep logs or is it safe to use? Find…

5 months ago

The AT&T Data Breach: Here’s What We Know

Did the AT&T data breach happen? What data classes did it expose and what can you do to protect yourself?…

5 months ago

PostgreSQL vs MySQL: A Comparison

In this PostgreSQL vs MySQL blog, we walk you through when to choose PostgreSQL or MySQL for your use case.

5 months ago

An Intro to Secure Internal Communication

In this blog, we walk you through secure internal communication tools and tell you what they're used for.

6 months ago

The Basics of Securing an Application

In the wake of recent news, knowledge of securing both your database and your application is more and more beneficial.…

6 months ago

The MongoDB Security Incident: What’s Known

During December 2023, a new data breach – a MongoDB security incident – emerged. What Happened? According to HackRead, MongoDB’s…

6 months ago

What Can Be Done with an Email Address? Cybercriminal Perspective

Email addresses are amongst the most frequently stolen pieces of information in data breaches. What can be done with them?…

1 year ago