Take a look at these recent Breached Incidents
See more
Have you been breached? Here's how to protect yourself
A guide to responding to cybersecurity incidents.
800
Breaches Tracked
12,474,715,854
Breached Accounts Detected
9,494,727,201
Stolen Passwords
What is Breached.Me?
Breached.Me is a website that tells you if your information has been breached by hackers.
Data breach reporting requirements vary by industry and often we only hear about data breaches long after the fact. In the meantime, our personal information could be traded or sold hundreds of times on the dark web.
Data breach reporting requirements vary by industry and often we only hear about data breaches long after the fact. In the meantime, our personal information could be traded or sold hundreds of times on the dark web.
These are the following consumer challenges:
Awareness
If we don’t hear about it fast enough (or at all) then we (the users) blissfully carry-on with zero knowledge except for the occasional news article about a breach…but did it really affect me, the consumer? Who knows.
Example breach:
MGM Resorts hacked: 10.6 million guests have their personal data exposed on hacking forum
Password Reset
If you’re a consumer whose information was leaked, at a minimum, you need to login to the affected site and reset your password.
Credential Reuse
If you’re a consumer whose information was leaked, and if you re-use that same password elsewhere, you need to find those sites (good luck!) and reset those passwords.
These are the following enterprise challenges:
Spear-phishing and Phishing
Executives are often the unfortunate receivers of targeted phishing attacks (spear-phishing). Spear-phishing relies on more personal & believable information being included in the phish. After a data breach, we often see an increase in spear-phishing attacks due to executive PII being publicly leaked.
Credential Reuse and Password Reset
Data breaches often include cleartext passwords, weakly encrypted passwords, or passwords that were sent through a one-way hash function. When any of these occur, a very high percentage of real passwords can be recovered. Attackers then automatically test these same username/password combinations at other sites to steal information money, and order goods in your name.