A watering hole attack is a security exploit in which the attacker seeks to compromise a specific group of end […]
A watering hole attack is a security exploit in which the attacker seeks to compromise a specific group of end […]
The National Security Agency (NSA) is a federal government surveillance and intelligence agency that’s part of the U.S. Department of […]
In February 2025, the spyware service Spyzie suffered a data breach along with sibling spyware services, Spyic and Cocospy. The Spyzie breach alone exposed almost 519k customer email addresses which were provided to HIBP, and reportedly also enabled unauthorised access to captured messages, photos, call logs, and more. The data was provided to HIBP by a source who requested it be attributed to “zathienaephi@proton.me”.
A quantum, the singular form of quanta, is the smallest discrete unit of any physical entity. For example, a quantum […]
A domain controller is a server that processes authentication requests from users and computers within a computer domain. Domain controllers […]
In computer networks, a DMZ, or demilitarized zone, is a physical or logical subnet that separates a local area network […]
A domain generation algorithm (DGA) is a program that generates a large list of domain names. DGAs provide malware with […]
In February 2025, the Romanian arm of telecommunications company Orange suffered a data breach which was subsequently published to a popular hacking forum. The data included 556k email addresses (of which hundreds of thousands were in the form of [phone number]@as1.romtelecom.net), phone numbers, subscription details, partial credit card data (type, last 4 digits, expiration date and issuing bank). The breach also exposed an extensive number of internal documents.
What is federated identity management (FIM)? Federated identity management (FIM) is an arrangement between multiple enterprises or domains that enables […]
In February 2025, 23 billion rows of stealer logs were obtained from a Telegram channel known as ALIEN TXTBASE. The data contained 284M unique email addresses alongside the websites they were entered into and the passwords used. This data is now searchable in HIBP by both email domain and the domain of the target website.