Data Breach

Explore 12 curated cybersecurity tools, with 14,519+ visitors searching for solutions

FEATURED

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

NordVPN Logo

VPN service providing encrypted internet connections and privacy protection

Mandos Fractional CISO Services Logo

Fractional CISO services for B2B companies to accelerate sales and compliance

Get Featured

Feature your product and reach thousands of professionals.

Proton Pass Logo

Password manager with end-to-end encryption and identity protection features

0
Resecurity Risk Digital Risk Monitoring Platform Logo

A digital risk monitoring platform that provides automated security posture assessment, threat intelligence, and continuous monitoring of enterprise digital assets across multiple risk vectors.

0
SOCRadar Digital Risk Protection Platform Logo

A digital risk protection platform that combines threat intelligence, dark web monitoring, attack surface management, brand protection, and supply chain intelligence to detect and respond to external cyber threats.

-1
Flare Security Threat Intelligence Products and Services Logo

A threat exposure management platform that monitors clear and dark web environments to detect and provide actionable intelligence on potential security threats like data leaks, credentials, and malicious actor activities.

0
OSINTLeak Logo

OSINTLeak is a tool for discovering and analyzing leaked sensitive information across various online sources to identify potential security risks.

4
Dark Web Exposure Test by ImmuniWeb Logo

A free online service that scans the dark web for exposed credentials and sensitive data associated with specific domains or email addresses.

0
DeTCT Logo

DeTCT is a digital risk discovery and protection platform that monitors attack surfaces, vulnerabilities, data leaks, brand impersonation, and third-party risks to help organizations manage their cyber risk posture.

0
Kaduu Darknetsearch Logo

A dark web monitoring platform that scans dark and deep web sources to detect exposed organizational data, compromised credentials, domain spoofing, and supply chain threats.

0
Trufflehog-Chrome-Extension Logo

A Chrome browser extension that uses machine learning to detect and alert users about sensitive data exposure and potential data breaches across web environments.

0
LeakedIn.com Logo

Check if your email address has been involved in a data breach.

0
Incident Response & Computer Forensics, Third Edition Logo

A comprehensive guide to incident response and computer forensics, covering the entire lifecycle of incident response and remediation.

0
Multiple Cybersecurity News and Updates Logo

Catch up on the latest cybersecurity news and updates from around the world.

0