Category: Breach

Read our latest blog posts

Domino’s Breach and the Nucleus ransomware attack: More than just isolated...

We are investigating the possible attack vectors that could have led to the compromise of Domino’s Breach...

Continue reading

Modern Underground Marketplaces and Digital Goods

How do modern underground marketplaces operate? What are digital goods and how have they played a major...

Continue reading

Phishing Attacks 101: Types of Phishing Attacks and How to Prevent...

Hackers target large organizations to trick their employees and steal sensitive data. What are phishing attacks and...

Continue reading

Grappling with COVID-Themed Cyber Attacks: Pharmaceutical Sector

In the event of full scale cyberattack the pharmaceutical sector could incur huge loss. We review the...

Continue reading

How to build a secure AWS infrastructure

Summary of the recommendations of AWS' Well-Architected Framework, with respect to design, delivery, and maintenance of secure...

Continue reading

How much does a data breach cost you?

Executive summary for the Cost of a Data Breach Report 2020, highlighting factors that strengthen an organization’s...

Continue reading

Want to deter threat actors? Start by nullifying your data leaks.

Companies that have experienced a breach, underperform the market by > 15%, even years later. Here are...

Continue reading

Threat actors’ next big target: VIPs, Executives, and Board members

Senior executives are 12 times more likely to be targets of social incidents, and 9 times more...

Continue reading