Technical leakage

joker's stach

Another one bites the dust: goodbye Joker’s Stash. What’s next?

Another one bites the dust: goodbye Joker’s Stash. What’s next? Last week DarkMarket, the second largest dark web marketplace, was shut down by law enforcement in Europe. This takedown is the result of increasing joint efforts to take down dark … Read More

Malicious Actors Show Little Interest in Automotive Source Code Leak

Malicious Actors Show Little Interest in Automotive Source Code Leak Technical data leakage strikes again, this time affecting a major manufacturer in the automotive industry. Bleeping Computer reported this week that a misconfigured Git server has leaked source code from … Read More

capitol attack cyber security

U.S. Capitol Riots: What May Happen After the Physical Penetration of A Network

U.S. Capitol Riots: What May Happen After the Physical Penetration of A Network Recent events at the Capitol in Washington D.C. were condemned for their impact on the democracy of the United States. What was much less discussed, however, is … Read More

cyber trends 2021

Our Take on the Top 5 Predictions for 2021

Our Take on the Top 5 Predictions for 2021 Every December, analysts make predictions about the key events in the following months. These lists range from the most obvious (ex. ransomware will be a big risk in the next 12 … Read More

Leaked Spotify passwords may expose your business to credential stuffing attacks

Leaked Spotify passwords may expose your business to credential stuffing attacks This past year has been tough for most enterprises. While some industries appear more targeted than others by malicious actors, the media and entertainment industry has definitely felt the … Read More

Open source developers not interested in solving code security issues?

Open source developers not interested in solving code security issues? Software developers invest less than 3% of their time in solving security issues in free and open source software (FOSS) and show little interest in allocating more resources moving forward, … Read More

data leak

Less than 10% of data breaches are made public

Less than 10% of data breaches are made public In 2020, ransomware groups ramped up their attacks against corporate networks to steal hundreds of gigabytes of confidential information from each of their victims. The stolen data is either released online, … Read More

brazil data leak

Government Source Code Leaks Compromise the Personal Data of Millions

Government Source Code Leaks Compromise the Personal Data of Millions It’s not always security researchers who uncover major data breaches or security mishaps. Reporters from a Brazilian publication have been very good lately at detecting unfortunate incidents generated by official … Read More

Top 5 human errors that lead to data breaches

Top 5 human errors that lead to data breaches Malicious actors can identify and take advantage of security vulnerabilities in a matter of hours. Security vulnerabilities are an important part of this problem, but do not tell the whole story. … Read More

When Private Photos Don't Stay Private For Long

When Private Photos Don’t Stay Private for Long

When Private Photos Don’t Stay Private for Long It has always been a challenge to securely share photos, videos and messages on the internet. Few applications offer a ‘trust no one’ mode where the shared content  benefits from end-to-end encryption, … Read More