data leak

Understanding Hacker Forums: From Data Breaches to Porn

Hacker forums are communities for hackers to interact and share their thoughts. Read this blog and understand everything you need…

12 months ago

The AT&T Data Breach: Here’s What We Know

Did the AT&T data breach happen? What data classes did it expose and what can you do to protect yourself?…

12 months ago

The Basics of Securing an Application

In the wake of recent news, knowledge of securing both your database and your application is more and more beneficial.…

1 year ago

What Can Be Done with an Email Address? Cybercriminal Perspective

Email addresses are amongst the most frequently stolen pieces of information in data breaches. What can be done with them?…

2 years ago

Cyber Liability vs. Data Breach

In this blog, we walk you through the key similarities and differences between cyber liability and a data breach.

2 years ago

Which Team Is Responsible for Debriefing After a Cyber Attack?

Which team is responsible for debriefing after a cyber attack? Find out here.

2 years ago

3 Ways to Improve the Security of Your Web Application

There are many ways to improve the security of our web applications. In this blog, we provide you with some…

2 years ago

Web Application Security Headers Explained

In this blog, we walk you through the basics and possible implications of using HTTP security headers. Have a read!

2 years ago

Where Do Data Breaches Originate From? Top 10 Countries

In this blog, we’re walking you through the top 10 countries that data breaches originate from. We have some interesting…

2 years ago