Only 58% of users know what phishing is, according to a Proofpoint survey — a staggering gap considering phishing attacks […]
Only 58% of users know what phishing is, according to a Proofpoint survey — a staggering gap considering phishing attacks […]
In 2016, the now defunct global LAN gaming network Tunngle suffered a data breach that exposed 8.2M unique email addresses. The compromised data also included usernames, IP addresses and passwords stored as salted MD5 hashes.
In September 2023, over 1M rows of data from the educational robots company Sphero was posted to a popular hacking forum. The data contained 832k unique email addresses alongside names, usernames, dates of birth and geographic locations.
This second blog in the ongoing series gives and overview of Generative AI and prompt engineering.
What is Structured Threat Information eXpression (STIX)? Structured Threat Information eXpression (STIX) is a standardized Extensible Markup Language (XML) programming […]
What is antispoofing? Antispoofing is a technique for identifying and dropping packets that have a false source address. In a […]
In July 2021, the Android applications and games review site AndroidLista suffered a data breach. The incident exposed 6.6M user records containing email addresses, names, usernames and passwords stored as salted SHA-1 hashes, all of which were subsequently posted to a popular hacking forum. AndroidLista did not respond when contacted about the breach.
What is Secure Sockets Layer certificate (SSL certificate)? A Secure Sockets Layer certificate (SSL certificate) is a small data file […]
In mid-2021, the “vintage messaging reborn” service Phoenix suffered a data breach that exposed 75k unique email addresses. The breach also exposed IP addresses, usernames and passwords.
security 101 — they’re a compliance necessity. Sarbanes-Oxley Act, PCI DSS, HIPAA and GDPR all have mandatory user access review […]