Application allowlisting, previously known as application whitelisting, is the practice of specifying an index of approved software applications or executable […]
Application allowlisting, previously known as application whitelisting, is the practice of specifying an index of approved software applications or executable […]
Identity and access management, or IAM — the discipline of ensuring the right individuals have access to the right things […]
In February 2025, the spyware service Spyic suffered a data breach along with sibling spyware service, Cocospy. The Spyic breach alone exposed almost 876k customer email addresses which were provided to HIBP, and reportedly also enabled unauthorised access to captured messages, photos, call logs, and more. The data was provided to HIBP by a source who requested it be attributed to “zathienaephi@proton.me”.
In February 2025, the spyware service Cocospy suffered a data breach along with sibling spyware service, Spyic. The Cocospy breach alone exposed almost 1.8M customer email addresses which were provided to HIBP, and reportedly also enabled unauthorised access to captured messages, photos, call logs, and more. The data was provided to HIBP by a source who requested it be attributed to “zathienaephi@proton.me”.
A checksum is a value that represents the number of bits in a transmission message. IT professionals use it to […]
Transport Layer Security (TLS) is an Internet Engineering Task Force (IETF) standard protocol that provides authentication, privacy and data integrity […]
Email spoofing is a form of cyber attack in which a hacker sends an email that has been manipulated to […]
In computer security, challenge-response authentication is a set of protocols used to protect digital assets and services from unauthorized users, […]
Social engineering is an attack vector that relies heavily on human interaction and often involves psychological manipulation of people into […]
In mid-2019, the e-commerce website Storenvy suffered a data breach that exposed millions of customer records. A portion of the breached records were subsequently posted to a hacking forum with cracked password hashes, whilst the entire corpus of 23M rows was put up for sale. The data contained 11M unique email addresses alongside usernames, IP addresses, the user’s city, gender date of birth and original salted SHA-1 password hash.