Data Leakage

Can a Data Breach Help Protect Your Company?

Can a Data Breach Help Protect Your Company? Cloud services, especially those related to communications, have massively been adopted by corporations, as they have shifted to a remote workforce this year. The poster child for this trend, Zoom, now has … Read More

Leaked Spotify passwords may expose your business to credential stuffing attacks

Leaked Spotify passwords may expose your business to credential stuffing attacks This past year has been tough for most enterprises. While some industries appear more targeted than others by malicious actors, the media and entertainment industry has definitely felt the … Read More

Thought Reporting a Data Breach Was Easy? Think Again.

When Malicious Actors Turn Your Own Messages Against You When a data breach occurs, most companies contact their customers by email to inform them of what happened, which information may have been compromised, and what the company is doing to … Read More

Open source developers not interested in solving code security issues?

Open source developers not interested in solving code security issues? Software developers invest less than 3% of their time in solving security issues in free and open source software (FOSS) and show little interest in allocating more resources moving forward, … Read More

data leak

Less than 10% of data breaches are made public

Less than 10% of data breaches are made public In 2020, ransomware groups ramped up their attacks against corporate networks to steal hundreds of gigabytes of confidential information from each of their victims. The stolen data is either released online, … Read More

brazil data leak

Government Source Code Leaks Compromise the Personal Data of Millions

Government Source Code Leaks Compromise the Personal Data of Millions It’s not always security researchers who uncover major data breaches or security mishaps. Reporters from a Brazilian publication have been very good lately at detecting unfortunate incidents generated by official … Read More

Top 5 human errors that lead to data breaches

Top 5 human errors that lead to data breaches Malicious actors can identify and take advantage of security vulnerabilities in a matter of hours. Security vulnerabilities are an important part of this problem, but do not tell the whole story. … Read More

When Private Photos Don't Stay Private For Long

When Private Photos Don’t Stay Private for Long

When Private Photos Don’t Stay Private for Long It has always been a challenge to securely share photos, videos and messages on the internet. Few applications offer a ‘trust no one’ mode where the shared content  benefits from end-to-end encryption, … Read More

github leak

Who Lets Access Keys Out?

Who Lets Access Keys Out? Technical data leakage takes on many forms, but often revolves around the publication of passwords or cloud services’ access keys on the internet. Many technical data leakages are not the result of a malicious actor. … Read More

digital risk protection

Webinar Replay: Who is Digital Risk Protection For?

Who Is Digital Risk Protection for? David Hétu, Chief Research Officer at Flare Systems, defined what Digital Risk Protection is and who needs it most. Who is Digital Risk Protection for? The short answer is everyone who stores personal and financial information … Read More