News & Events

CyberSecurity Shot

 

Investigation reports on network information leakage.

Discover with our analyst team all details about the latest data leaks cases and some recommendations that could have prevented it. Each comes with a real case. Are you going to miss it?


When preparing CyberSecurity Shots, the analysts use monitoring tools that get information from open source and other web sites, they also apply analysis methodologies to anticipate potential threats. Therefore, the work they carry out involves interpretation of leaked information in order to provide with the most exact approximation on implications of the recent security and high-impact breaches, as well as their consequences for individuals and companies from different sectors.

To define the leak’s impact level, they take into account the affected technology assets and analyze the sensitivity of the disclosed information. It's the nature of compromised services, put in the special context of each information leakage, which serves to define the scope and its potential fraudulent uses. Claims evaluation made about the incident and its identified documentary information is used to complete the information available about its authorship and the underlying motivation of suspected culprits.


Jul 2016

R2Games Information Leakage

On 11th July 2016, a database containing information on more than 22 million users was leaked from the Reality Squared Games platform. Want to find out more information? Download our new research!

Read more

Investigation report “iMesh data leakage”

Our intelligence analysts reveal the details of iMesh information breach. You will be surprised by the amount of leaked data and the responsible of this cyber-crime. Will you miss it?

Read more

Jun 2016