Software & Saas

secret leak

How Do Company Secrets Get Leaked Online?

How Do Company Secrets Get Leaked Online? Back in 2017, Facebook suffered a source code leak, initially believed to have been the result of either a developer intentionally leaking it or a security loophole in company servers. The source code … Read More

How Much Would a Technical Leak Cost You in Stolen Cloud Resources?

How Much Would a Technical Leak Cost You in Stolen Cloud Resources? If you have ever wondered how cryptocurrencies like bitcoin or monero issue  new currency, the answer is through a competition called cryptocurrency mining. This competition is open to … Read More

Docker Hub

How Sudden Policy Changes Put Company Secrets at Risk

How Sudden Policy Changes Put Company Secrets at Risk Popular among developers, Docker Hub has been used for years to share applications and code libraries. In August 2020, Docker reported its service was used by more than 6.5 million developers … Read More

Technical Leakage

What is technical leakage and how does it happen?

What is technical leakage and how does it happen? In July, more than 50 international companies suffered a source code leak due to software development misconfigurations in DevOps applications, Bleeping Computer writes. The businesses operated in various industries, including technology, … Read More

dorking

Dorking: Preventing Leaks From Hurting Your Firm

Dorking: Preventing Leaks From Hurting Your Firm While readily available, malware is far from being the only tool that malicious actors use to steal data and illegally access computer networks. Malicious actors indeed threaten firms’ security using far more mundane … Read More

What Does The "Free" in Free Food Really Mean?

What Does the « Free » in Free Food Really Mean?

What Does the « Free » in Free Food Really Mean? Hijacked accounts are one of the most common items available for purchase on online illicit markets. On our blog, we’ve discussed in the past the issue of bank credentials being put … Read More

The Risks Of Using Corporate Emails For Personal Services

The Risks of Using Corporate Emails for Personal Services

The Risks Of Using Corporate Emails For Personal Services Everyday, Flare Systems collects leaked usernames and passwords on the internet and the darkweb. Our customers use our extensive leaked credentials database to prevent credential stuffing attacks. Credential stuffing happens when … Read More

What Passwords Do Fraudsters Use?

What Passwords Do Fraudsters Use?

What Passwords Do Fraudsters Use? Five years ago, Avast published a blog post that analyzed a database of 2,000 passwords used by hackers. It found that hackers use very easy to crack passwords just like most people. In fact, their … Read More

46M cracked passwords - Are people getting better at securing their accounts?

46M Cracked Passwords – Are People Getting Better at Securing Their Accounts?

46M Cracked Passwords – Are People Getting Better at Securing Their Accounts? A little over a year ago, malicious actors hacked the MyFitnessPal service. With 143 million users, this was one of the largest hack of credentials ever reported. Now, … Read More