What Are Malicious Actors Secretly Doing with Your Data? A well-known malicious actor recently published on a forum the information of millions of customers of a popular T-shirt printing service. While no passwords were leaked, the criminal did publish the … Read More
Software & Saas

57% of Cit0Day leaked credentials linked to popular free email service providers
57% of Cit0Day leaked credentials linked to popular free email service providers Receive the full Intelligence report * This report will only be sent to Cyber Security Professionals. Please enter your corporate email. First reported in November 2020, the Cit0Day … Read More

What do fraudsters want for Christmas in 2020?
What do fraudsters want for Christmas in 2020? ‘Tis the season to be jolly, even though this year has been a challenge, to say the least. While some are thinking about end of year reports and others are looking ahead … Read More

Can a Data Breach Help Protect Your Company?
Can a Data Breach Help Protect Your Company? Cloud services, especially those related to communications, have massively been adopted by corporations, as they have shifted to a remote workforce this year. The poster child for this trend, Zoom, now has … Read More

Thought Reporting a Data Breach Was Easy? Think Again.
When Malicious Actors Turn Your Own Messages Against You When a data breach occurs, most companies contact their customers by email to inform them of what happened, which information may have been compromised, and what the company is doing to … Read More

Less than 10% of data breaches are made public
Less than 10% of data breaches are made public In 2020, ransomware groups ramped up their attacks against corporate networks to steal hundreds of gigabytes of confidential information from each of their victims. The stolen data is either released online, … Read More

Firework: Digital Risk Protection Product Brief
Solution Brief: Technical Data Leaks Detection Download the product document

Top 5 human errors that lead to data breaches
Top 5 human errors that lead to data breaches Malicious actors can identify and take advantage of security vulnerabilities in a matter of hours. Security vulnerabilities are an important part of this problem, but do not tell the whole story. … Read More

Solution Brief: Detect Technical Data Leaks
Solution Brief: Technical Data Leaks Detection Download the product document

When Private Photos Don’t Stay Private for Long
When Private Photos Don’t Stay Private for Long It has always been a challenge to securely share photos, videos and messages on the internet. Few applications offer a ‘trust no one’ mode where the shared content benefits from end-to-end encryption, … Read More