Blacklisted Shell Games

Published on March 23rd, 2017 | by Akshay Nayak

It’s always amazing to see what we uncover during an SS8 BreachDetect risk assessment. BreachDetect was recently deployed in the customer’s environment to analyze network traffic, detect previously unknown threats and pinpoint any compromised devices-of-interest. What... Read More


Breach of the Month — February 2017

Published on March 15th, 2017 | by Joel Roy

Every week on our Twitter stream we share news on the top breaches making the headlines. At the end of each week one ‘unlucky winner’ — the largest, the weirdest, the most dangerous, or the most... Read More


RSAC 2017 – a View from the Floor

Published on March 3rd, 2017 | by Akshay Nayak

The 2017 RSA Conference showcased almost 500 security companies proposing elegant solutions to solve a plethora of problems across different domains of security, including web application security, network attacks, data forensics, malware and APTs, encryption key... Read More


Hello Kitty

The Hello Kitty Data Breach – a Deeper Look

Published on February 21st, 2017 | by Akshay Nayak

Earlier this month we chose the Hello Kitty breach as the ‘winner’ of 2017’s first Breach of the Month. Why did we choose this particular data leak from the other January contenders? We’d like to outline... Read More


SS8 BreachDetect Streamlined Dashboard

Welcome to our Improved BreachDetect Dashboard

Published on February 17th, 2017 | by Joel Roy

Analysts — how is your breach detection workflow? Do you struggle to sift through reports to find insights into suspicious network activity? If you’re like most security pros, chances are you’d benefit from a system which... Read More

Back to Top ↑