Category: Data Leakage

Data Leakage

Cryptocurrency Attacks to be Aware of in 2021

June 8, 2021 | 10 Min Read

It’s been a pretty big year so far for cryptocurrency. After it reached an all-time high in April 2021, new investors desperate not to miss out on the digital gold rush flocked to the exchanges to...
Cryptocurrency Attacks to be Aware of in 2021

Cryptocurrency Attacks to be Aware of in 2021

June 8, 2021 | 10 Min Read

It’s been a pretty big year so far for cryptocurrency. After it reached an all-time high in April 2021, new...
How Cybercriminals Can Leverage Your Vaccination Card Selfie

How Cybercriminals Can Leverage Your Vaccination Card Selfie

May 13, 2021 | 6 Min Read

Gotta do it for the ‘Gram (Instagram), as the kids might say. After a year in quarantine, you just got...
Creating Security-Aware Passwords

Creating Security-Aware Passwords

May 6, 2021 | 8 Min Read

Note: This blog is an overview of password history and best practices for individuals in honor of World Password Day,...
The Facebook Data Leak Explained

The Facebook Data Leak Explained

April 8, 2021 | 8 Min Read

This weekend press exposed a significant data leakage containing the records of 533 million Facebook users. The records were posted...
Year in Review: COVID-19 Concerns for Cybersecurity

Year in Review: COVID-19 Concerns for Cybersecurity

March 10, 2021 | 7 Min Read

Note: This blog is a follow-up on our remote worker series on navigating security as organizations continue to work from...
How to Monitor Initial Access Broker Listings in SearchLight

How to Monitor Initial Access Broker Listings in SearchLight

February 25, 2021 | 4 Min Read

By now, you might have caught wind of Photon’s new research on Initial Access Brokers (IABs). It’s a pretty awesome,...
Threat Intelligence Can Be Noisy: SearchLight Helps

Threat Intelligence Can Be Noisy: SearchLight Helps

February 16, 2021 | 6 Min Read

Let’s start with a scenario. You’ve finally convinced the business to begin the journey of building up a threat intelligence...
Prevent Account Takeover with Our New Exposed Credentials Solutions Guide

Prevent Account Takeover with Our New Exposed Credentials Solutions Guide

February 9, 2021 | 5 Min Read

Note: This blog is taken from our recently published Exposed Credentials Solutions Guide, which includes a complete list of our...
Brexit 2021: implications for the security landscape

Brexit 2021: implications for the security landscape

January 27, 2021 | 8 Min Read

Ok I’ll admit it, I feel pretty sorry for Boris Johnson. That doesn’t appear to be a particularly common consensus...
Azure AD: Auto Validate Exposed Credentials

Azure AD: Auto Validate Exposed Credentials

January 19, 2021 | 3 Min Read

SearchLight customers can now automatically validate credential alerts via an integration with Azure AD, drastically reducing the time required to...
ICYMI: SolarWinds Compromise Update

ICYMI: SolarWinds Compromise Update

January 8, 2021 | 7 Min Read

Note: This blog is a follow-up of our previous SolarWinds blog by our in-house threat intelligence team. You can read...
Looking back at 2020: A Year in Review

Looking back at 2020: A Year in Review

January 6, 2021 | 8 Min Read

2020 is truly an extraordinary year (and some aspects worse than others). This year was also made up of some...