DEV Community

BreachDirectory profile picture

BreachDirectory

One of the biggest & fastest data breach search engines in the world. https://breachdirectory.com

What Can Be Done with an Email Address? a Cybercriminal Perspective

What Can Be Done with an Email Address? a Cybercriminal Perspective

Comments
5 min read

Want to connect with BreachDirectory?

Create an account to connect with BreachDirectory. You can also sign in below to proceed if you already have an account.

Already have an account? Sign in
3 Ways to Improve the Security of Your Web Application

3 Ways to Improve the Security of Your Web Application

Comments
3 min read
Cyber Liability vs. Data Breach

Cyber Liability vs. Data Breach

Comments
3 min read
Web Application Security Headers Explained

Web Application Security Headers Explained

2
Comments
4 min read
Where Do Data Breaches Originate From? Top 10 Countries

Where Do Data Breaches Originate From? Top 10 Countries

1
Comments
6 min read
Which Team Is Responsible for Debriefing After a Cyber Attack?

Which Team Is Responsible for Debriefing After a Cyber Attack?

Comments
6 min read
Does a VPN Make You Anonymous?

Does a VPN Make You Anonymous?

Comments
3 min read
What Is a Data Leak? How Does It Differ From a Data Breach?

What Is a Data Leak? How Does It Differ From a Data Breach?

2
Comments
6 min read
Staying Cyber Safe on Christmas

Staying Cyber Safe on Christmas

1
Comments
6 min read
How to Prepare For a Cyber Attack?

How to Prepare For a Cyber Attack?

1
Comments
4 min read
Steam Account Hacked? Here's What to Do!

Steam Account Hacked? Here's What to Do!

1
Comments
8 min read
Alternatives to YouTube & TikTok

Alternatives to YouTube & TikTok

1
Comments
2 min read
What Is Bloatware?

What Is Bloatware?

Comments
3 min read
Salaries within the Information Security Sector: What, Why, How?

Salaries within the Information Security Sector: What, Why, How?

Comments
5 min read
How to Prepare for Black Friday: Staying Safe

How to Prepare for Black Friday: Staying Safe

Comments
4 min read
The Attack on Danish Railways – Lessons Learned

The Attack on Danish Railways – Lessons Learned

1
Comments
4 min read
What's the Average Price of a Data Breach?

What's the Average Price of a Data Breach?

1
Comments
5 min read
Understanding Password Strength Meters

Understanding Password Strength Meters

Comments
5 min read
What's the Price of Your Social Media Accounts?

What's the Price of Your Social Media Accounts?

Comments
4 min read
What Are the Different Types of DDoS Attacks?

What Are the Different Types of DDoS Attacks?

Comments
5 min read
WAF vs. IPS — What’s the Difference?

WAF vs. IPS — What’s the Difference?

3
Comments
5 min read
Protecting Applications From RCE with a Single Function: a Cheat Sheet

Protecting Applications From RCE with a Single Function: a Cheat Sheet

1
Comments
3 min read
The API Security Checklist

The API Security Checklist

2
Comments
4 min read
The Basics of Data Leak Prevention

The Basics of Data Leak Prevention

1
Comments
2 min read
Protecting MySQL Beyond mysql_secure_installation: A Guide

Protecting MySQL Beyond mysql_secure_installation: A Guide

1
Comments
6 min read
“This Password Appears In a Data Leak.” What Now?

“This Password Appears In a Data Leak.” What Now?

3
Comments
5 min read
Composite Indexes in Databases: What are They?

Composite Indexes in Databases: What are They?

3
Comments
3 min read
The Requirements for Your Web Application Firewall: What’s On the List?

The Requirements for Your Web Application Firewall: What’s On the List?

1
Comments
4 min read
Choosing Character Sets in MySQL: A Short Guide

Choosing Character Sets in MySQL: A Short Guide

1
Comments
4 min read
Optimizing MySQL Query Performance with DESCRIBE and EXPLAIN

Optimizing MySQL Query Performance with DESCRIBE and EXPLAIN

2
Comments
5 min read
The Importance of APIs In the Information Security Industry: A Walkthrough

The Importance of APIs In the Information Security Industry: A Walkthrough

Comments
4 min read
Data Breach Investigation and Mitigation Checklist

Data Breach Investigation and Mitigation Checklist

2
Comments
6 min read
Password Hashing Explained

Password Hashing Explained

1
Comments
4 min read
What Makes a Good Data Breach Checker?

What Makes a Good Data Breach Checker?

Comments
4 min read
CPRA (CCPA) vs. GDPR — What’s On the Radar?

CPRA (CCPA) vs. GDPR — What’s On the Radar?

1
Comments
3 min read
The T-Mobile Data Breach: What Can We Learn?

The T-Mobile Data Breach: What Can We Learn?

Comments
6 min read
What To Do If Your Socials Have Been Broken Into?

What To Do If Your Socials Have Been Broken Into?

Comments
5 min read
Chrome Has Found Your Password In a Data Breach. What Now?

Chrome Has Found Your Password In a Data Breach. What Now?

Comments
3 min read
Protecting Web Applications From Remote Code Execution (RCE): A Short Guide

Protecting Web Applications From Remote Code Execution (RCE): A Short Guide

2
Comments
2 min read
How to Protect Yourself and Others From Phishing Attacks?

How to Protect Yourself and Others From Phishing Attacks?

Comments
4 min read
The Twitter Data Breach: What's Known?

The Twitter Data Breach: What's Known?

2
Comments
5 min read
SHEIN.com Data Breach Analysis

SHEIN.com Data Breach Analysis

Comments
26 min read
APIs: What Are They, How They Work, and Where Should They Be Used?

APIs: What Are They, How They Work, and Where Should They Be Used?

Comments
3 min read
What Should You Do After a Data Breach?

What Should You Do After a Data Breach?

Comments
5 min read
Discord Data Leak - Did Discord Suffer a Data Breach?

Discord Data Leak - Did Discord Suffer a Data Breach?

1
Comments
3 min read
MySQL After a Data Breach

MySQL After a Data Breach

Comments
7 min read
MySQL Security Best Practices: A Checklist

MySQL Security Best Practices: A Checklist

5
Comments
7 min read
Identifying Slow Queries in MySQL: Slow Query Log 101

Identifying Slow Queries in MySQL: Slow Query Log 101

Comments
7 min read
Edmodo Data Breach Analysis

Edmodo Data Breach Analysis

Comments
15 min read
Zynga Data Breach Analysis

Zynga Data Breach Analysis

Comments
20 min read
The Problem with MyISAM

The Problem with MyISAM

1
Comments
4 min read
What is Server-Side Request Forgery (SSRF)?

What is Server-Side Request Forgery (SSRF)?

4
Comments 1
3 min read
The MySQL Server – mysqld

The MySQL Server – mysqld

1
Comments
7 min read
The Basics of MySQL Deadlocks

The Basics of MySQL Deadlocks

2
Comments
5 min read
What Is a Hacker?

What Is a Hacker?

2
Comments
4 min read
WeHeartIt Data Breach Analysis

WeHeartIt Data Breach Analysis

1
Comments
11 min read
Schrödinger's Paradox in MySQL

Schrödinger's Paradox in MySQL

1
Comments
4 min read
What Not to Do After a Data Breach?

What Not to Do After a Data Breach?

5
Comments
3 min read
What Is Synthetic Identity Theft?

What Is Synthetic Identity Theft?

1
Comments
4 min read
Handling File Uploads Securely with PHP

Handling File Uploads Securely with PHP

1
Comments
3 min read
loading...