Young hacker smiling

Zero false positives

Expert intelligence + effective automation

People manipulation

Attacking the weakest link

Attacking without borders.

Companies invest millions of dollars on IT infrastructure and cybersecurity to keep their information protected. But when it comes to training their employees the investment is barely enough. Employees that daily manipulate, organize, create or update a company’s main data are the main link between IT...



Weak bicycle lock with words

Requiem for a p455w0rD

Why passphrases are better than passwords

What would you rather have at your home door: a simple, weak key that needs to be changed every other week, or a one-time-setup, state-of-the-art, virtually unpickable cruciform key? Figure 1. Lock key comparison via Locksmith Ledger. That’s just the difference between rotating short passwords vs having one good …



Magnifying glass finding password in a set of binary data

Storing passwords safely

Solving Yashira hash challenge 3

By the end of the year, we witnessed a huge increase in the amount of attacks that extracted large quantities of personal information, emails and passwords. Even one of the biggest email services, Yahoo, suffered an attack by cyber-criminals and they robbed more than 500000 accounts, in doing so, accessing …



Service status - Terms of Use