Black Kite Blog
Are There Any Domains Impersonating Your Company for Phishing?
Are There Any Domains Impersonating Your Company For Phishing? Learn with Black Kite's Free Phishing Domain Search.
Nov 24, 2018
Black Friday Special: Potential Phishing Sites Have Quadrupled in the Last 6 Months
Following simple tips are useful to avoid phishing domains while enjoying your Black Friday shopping.
Nov 23, 2018
Third-party Attack on Cryptocurrency Exchange Gate.io
One of the largest cryptocurrency exchange, gate.io, was targeted by a third-party, aka supply-chain attack.
Nov 12, 2018
Major Third-party Breaches Revealed in October 2018
We regularly update the list of major third-party (aka supply-chain) attacks and breaches that are revealed in October 2018.
Nov 5, 2018
Reduce Your Cyber Exposure to Mitigate Your Cyber Risk
Explore how digital transformation enhances business efficiency while addressing the rising cyber risks associated with cloud services and IoT systems
Nov 4, 2018
Open Invitation to Hackers: Misconfigured Cloud Servers
Many companies use cloud servers to store their data Misconfigured servers may expose sensitive data, a mistake which is an open invitation to hackers
Oct 21, 2018
Check Whether Your Ip Assets Are Blacklisted or Not for Free
To learn whether your company’s IP addresses are blacklisted, check Black Kite’s free IP Blacklist Search service.
Oct 16, 2018
Major Third-party Breaches Revealed in September 2018
We regularly update the list of major third-party (aka supply-chain) attacks and breaches that are revealed in September 2018.
Oct 10, 2018
Free Gdpr Compliance Checker
See the compliance levels of your organization according to GDPR standards.
Sep 15, 2018
British Airways Breach: Is It a Third-party Attack?
British Airways announced that 380,000 customer records containing credit card details had been taken during the cyber attack executed.
Sep 11, 2018
Your Company Accounts May Be Breached. Find Out with Free Account Breach Search
Employees may use their same credentials (e-mail/username/password) used in their company accounts to register third-party services.
Sep 10, 2018
How to Prevent Software Supply-chain Attacks
Do you want to learn about how to prevent software supply chain attacks? Learn your supply-chain risk before it’s too late.
Sep 2, 2018