Thoughts

5 Cybersecurity Tips for Remote Work

If you’ve recently shifted to remote work, or have been for awhile but looking to secure your home set up,…

4 years ago

Gravatar API lets you scrape millions of user profiles

Italian security researcher, Carlo Di Dato discovered that the hidden URL API routes as those shown below can allow a…

4 years ago

AI and ML: Are they one and the same?

As children we believed in magic, imagined, and a fantasy where robots would one day follow our commands, undertaking our…

4 years ago

That ‘BCC’ email field can save you from data leaks

This month multiple stories have emerged of companies exposing their member email addresses to each other. This typically happens due…

4 years ago

Why do Hulu and Netflix not use 2-factor authentication?

Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or…

4 years ago

Why do Hulu and Netflix not use 2-factor authentication?

Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or…

4 years ago

Why do Hulu and Netflix not use 2-factor authentication?

Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or…

4 years ago

Why do Hulu and Netflix not use 2-factor authentication?

Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or…

4 years ago

Why do Hulu and Netflix not use 2-factor authentication?

Streaming service accounts get compromised all the time either due to data breaches, credential stuffing attacks from leaked databases, or…

4 years ago

Keepnet Labs case study: how NOT to handle a data breach

  We just released news on this one but here's a summary of what happened: In March 2020, Bob Diachenko,…

5 years ago

This website uses cookies.