16 billion passwords leaked online: here’s what really happened
It reads like a headline from a dystopian future, but it is real, and it happened. A file dump containing more than 16 billion stolen credentials, yes, a billion with a "b", has been posted online, and it has been
Meet the talent: Torsten Wiedemeyer, Regional Director DACH
Place of residence: Munich, Germany Position: Regional Director DACH and Eastern Germany for K2View Please describe a day in your life I usually wake up around 5 a.m. and head to the gym by 6. After working out, I have breakfast around 8
Keyboard strokes: how to tell someone is tracking your patterns
Typing is automatic. You do not think twice when entering your password, writing an email, or opening a terminal. But what if someone was watching? Not through your webcam, not by hijacking your browser, but through the keyboard itself. Keyloggers
Meet the talent: Emanuela Hysenllari, Director of Growth
Place of Residence: CT, USA Position: Director of Growth/General Manager Please describe a day in your life: My day starts early, around 6 am. I typically go for a run around my neighbourhood first thing in the morning. That helps me clear my
How to limit the data social media collects on you
Ever get the feeling your phone is a little too smart? You like a single video of a beach in Greece, and suddenly TikTok serves you flight deals, hotel tours, and "day in Mykonos" vlogs. It is not magic; it
Pentesting, reimagined: inside Cyver Core with founder Luis Abreu
If you've ever managed a pentest, you probably know the drill: long email threads, clunky PDFs, delayed responses, and findings that get buried before they're fixed. Cyver Core was built to change that. Born from firsthand frustration with outdated pentest workflows,
How to build secure AI agents
From automated customer service reps to code-writing copilots and decision-making bots, intelligent agents are no longer science fiction. They are shipping products. But somewhere between the wow factor of generative AI and the push to production, we forget that these
What SOC teams really need from a penetration test report?
When a penetration test ends, the SOC team becomes the primary audience for the final report, yet too often, reports are written with a detached, formal tone that ignores the practical needs of those defending the organization every day. SOC
Why many SOCs still fail to detect identity-based attacks?
Most security teams are good at spotting vulnerabilities when they make noise. They are used to chasing red flags, alerts, and patterns that scream for attention. However, identity-based attacks do not work like that. They move quietly, using real credentials