
Home Depot Data Breach 2014: $179M Cost, Timeline & Lessons
What Happened in the Home Depot Data Breach? The Home Depot data breach was one of the largest retail security incidents …

What Happened in the Home Depot Data Breach? The Home Depot data breach was one of the largest retail security incidents …

Digital Risk Protection DRP Security Dark Web Monitoring Threat Intelligence Cybersecurity
What is Digital Risk Protection? Most security teams watch their internal networks. DRP platforms watch everywhere else. …

Dark Web Monitoring Threat Intelligence SocRadar Digital Risk Protection Credential Monitoring
What Does SocRadar Do? SocRadar markets itself as an “Extended Threat Intelligence” platform. That’s their branding for …

Data Breach Threat Intelligence
What Is A Password Combo List? Combo List: A file containing username and password pairs collected from data breaches …

What Happened in the Equifax Data Breach? The Equifax breach started with a web application vulnerability that had been …

Phishing Domain Security Typosquatting Brand Protection
What Is Phishing? Phishing is a social engineering attack where criminals impersonate trusted entities to steal …

Dark Web Monitoring ZeroFox Digital Risk Protection Compromised Credentials Credential Monitoring
What Does ZeroFox Do? ZeroFox is a digital risk protection platform that monitors external threats across social media …

Threat Intelligence Recorded Future Dark Web Monitoring Compromised Credentials Credential Monitoring
What Does Recorded Future Do? Recorded Future is an enterprise threat intelligence platform providing broad coverage …

Dark Web Monitoring Compromised Credentials SpyCloud Threat Intelligence Credential Monitoring
What Does SpyCloud Do? SpyCloud is an enterprise-focused platform that detects stolen credentials to prevent account …

Dark Web Tor Browser Privacy Anonymity Cybersecurity
What Is the Dark Web? The dark web is a small encrypted portion of the internet requiring special browsers to access. It …

Supply Chain Security Third-Party Risk Data Breaches Vendor Risk Management Dark Web Monitoring
What Is a Supply Chain Attack? Your vendors have keys to your kingdom. When attackers steal those keys, they walk right …

Data Breach Case Studies Telecom Security Network Security
What Happened in the T-Mobile Data Breaches? T-Mobile has disclosed at least seven significant data breaches since 2018. …