Technical leakage

malicious actors do with your data in secret

What Are Malicious Actors Secretly Doing with Your Data?

What Are Malicious Actors Secretly Doing with Your Data? A well-known malicious actor recently published on a forum the information of millions of customers of a popular T-shirt printing service. While no passwords were leaked, the criminal did publish the … Read More

digital risk protection infographic

Infographic: How Flare Systems Makes Digital Risk Protection Even Better

How Flare Systems Makes Digital Risk Protection Even Better Is your organization struggling with emerging digital risks as you’re adapting to the new normal? In this infographic you will learn about the root causes of digital risks and the business … Read More

Saskatchewan eHealth ransomware attack

Human Error Triggers Ransomware Attack, Largest Healthcare Security Breach in Sask.’s History

Human Error Triggers Ransomware Attack, Largest Healthcare Security Breach in Sask.’s History Some time between December 2019 and January 2020, eHealth Saskatchewan, the province-wide health delivery service, fell victim to a Ryuk crypto-ransomware attack, exposing the personal and medical information … Read More

joker's stach

Another one bites the dust: goodbye Joker’s Stash. What’s next?

Another one bites the dust: goodbye Joker’s Stash. What’s next? Last week DarkMarket, the second largest dark web marketplace, was shut down by law enforcement in Europe. This takedown is the result of increasing joint efforts to take down dark … Read More

Malicious Actors Show Little Interest in Automotive Source Code Leak

Malicious Actors Show Little Interest in Automotive Source Code Leak Technical data leakage strikes again, this time affecting a major manufacturer in the automotive industry. Bleeping Computer reported this week that a misconfigured Git server has leaked source code from … Read More

capitol attack cyber security

U.S. Capitol Riots: What May Happen After the Physical Penetration of A Network

U.S. Capitol Riots: What May Happen After the Physical Penetration of A Network Recent events at the Capitol in Washington D.C. were condemned for their impact on the democracy of the United States. What was much less discussed, however, is … Read More

cyber trends 2021

Our Take on the Top 5 Predictions for 2021

Our Take on the Top 5 Predictions for 2021 Every December, analysts make predictions about the key events in the following months. These lists range from the most obvious (ex. ransomware will be a big risk in the next 12 … Read More

Leaked Spotify passwords may expose your business to credential stuffing attacks

Leaked Spotify passwords may expose your business to credential stuffing attacks This past year has been tough for most enterprises. While some industries appear more targeted than others by malicious actors, the media and entertainment industry has definitely felt the … Read More

Open source developers not interested in solving code security issues?

Open source developers not interested in solving code security issues? Software developers invest less than 3% of their time in solving security issues in free and open source software (FOSS) and show little interest in allocating more resources moving forward, … Read More

data leak

Less than 10% of data breaches are made public

Less than 10% of data breaches are made public In 2020, ransomware groups ramped up their attacks against corporate networks to steal hundreds of gigabytes of confidential information from each of their victims. The stolen data is either released online, … Read More