Profile Pics and How Trends Can Bite You
What happened? A new app generating eye-catching illustrated profile pics spiked in popularity at the beginning of May. The app, NewProfilePic, uses the user’s photo to create an...
What happened? A new app generating eye-catching illustrated profile pics spiked in popularity at the beginning of May. The app, NewProfilePic, uses the user’s photo to create an...
Credential stuffing is easily the most common technique of account takeover AND the primary use of breached usernames and passwords. With billions of stolen credentials for sale on...
What happened? The data of Puma employees was compromised in a ransomware attack. The targeted attack was part of a larger invasion of the third-party software, Kronos, used...
Phishing messages plague work emails as much as they flood our personal inboxes. For every Nigerian prince you turn down, a CEO is asking for an employee’s cell...
Breaches and cyber attacks are happening constantly. We are all vulnerable as we navigate the internet, for work or personal use. If you’ve experienced a breached password OR...