Download the report about Philippines’ voter data hacking. Our team of analysts tell you first hand about the new case of COMELEC information leak.
News & Events
Investigation reports on network information leakage.
Discover with our analyst team all details about the latest data leaks cases and some recommendations that could have prevented it. Each comes with a real case. Are you going to miss it?
When preparing CyberSecurity Shots, the analysts use monitoring tools that get information from open source and other web sites, they also apply analysis methodologies to anticipate potential threats. Therefore, the work they carry out involves interpretation of leaked information in order to provide with the most exact approximation on implications of the recent security and high-impact breaches, as well as their consequences for individuals and companies from different sectors.
To define the leak’s impact level, they take into account the affected technology assets and analyze the sensitivity of the disclosed information. It's the nature of compromised services, put in the special context of each information leakage, which serves to define the scope and its potential fraudulent uses. Claims evaluation made about the incident and its identified documentary information is used to complete the information available about its authorship and the underlying motivation of suspected culprits.
Download now the report and find out from our Analyst Team a database associated to the Central Population Management System (MERNIS, for its acronym in Turkish) of the Turkish Ministry of Interior containing 49,611,709 records related to Turkish citizens was