Software & Saas

malicious actors do with your data in secret

What Are Malicious Actors Secretly Doing with Your Data?

What Are Malicious Actors Secretly Doing with Your Data? A well-known malicious actor recently published on a forum the information of millions of customers of a popular T-shirt printing service. While no passwords were leaked, the criminal did publish the … Read More

cit0day-featured-picture

57% of Cit0Day leaked credentials linked to popular free email service providers

57% of Cit0Day leaked credentials linked to popular free email service providers Receive the full Intelligence report * This report will only be sent to Cyber Security Professionals. Please enter your corporate email. First reported in November 2020, the Cit0Day … Read More

What do fraudsters want for Christmas in 2020?

What do fraudsters want for Christmas in 2020? ‘Tis the season to be jolly, even though this year has been a challenge, to say the least. While some are thinking about end of year reports and others are looking ahead … Read More

Can a Data Breach Help Protect Your Company?

Can a Data Breach Help Protect Your Company? Cloud services, especially those related to communications, have massively been adopted by corporations, as they have shifted to a remote workforce this year. The poster child for this trend, Zoom, now has … Read More

Thought Reporting a Data Breach Was Easy? Think Again.

When Malicious Actors Turn Your Own Messages Against You When a data breach occurs, most companies contact their customers by email to inform them of what happened, which information may have been compromised, and what the company is doing to … Read More

data leak

Less than 10% of data breaches are made public

Less than 10% of data breaches are made public In 2020, ransomware groups ramped up their attacks against corporate networks to steal hundreds of gigabytes of confidential information from each of their victims. The stolen data is either released online, … Read More

Firework: Digital Risk Protection Product Brief

Solution Brief: Technical Data Leaks Detection Download the product document

Top 5 human errors that lead to data breaches

Top 5 human errors that lead to data breaches Malicious actors can identify and take advantage of security vulnerabilities in a matter of hours. Security vulnerabilities are an important part of this problem, but do not tell the whole story. … Read More

Solution Brief: Detect Technical Data Leaks

Solution Brief: Technical Data Leaks Detection Download the product document

When Private Photos Don't Stay Private For Long

When Private Photos Don’t Stay Private for Long

When Private Photos Don’t Stay Private for Long It has always been a challenge to securely share photos, videos and messages on the internet. Few applications offer a ‘trust no one’ mode where the shared content  benefits from end-to-end encryption, … Read More