BlackFog Logo

rharpur

About Rebecca Harpur

This author has not yet filled in any details.
So far Rebecca Harpur has created 64 blog entries.

The World’s Largest Credential Leak Hits 16 Billion Records

The world’s largest credential leak exposed 16 billion records, including passwords, session tokens, and infostealer malware data. Learn what happened and how to stay protected.

2025-07-24T04:02:00+01:00July 9th, 2025|Breach, Cybersecurity, Privacy|

AI in Cybersecurity: The Good, the Bad, the Ugly, and What’s Next

Learn how AI reshapes cybersecurity: stronger defenses, AI‑based threats, key regulations, future trends. Insights for cybersecurity experts featuring BlackFog ADX.

2025-07-24T14:25:10+01:00June 23rd, 2025|AI, Cybersecurity|

Data Splicing vs. Traditional DLP: The New Threat for Enterprises

Explore how data splicing attacks bypass traditional DLP solutions and why ADX, with its real-time endpoint monitoring and AI based threat analysis, offers a powerful defense against advanced data exfiltration techniques.

2025-07-24T14:34:08+01:00June 16th, 2025|AI, Cybersecurity, Exploits|

How Do You Protect Yourself From Hackers? Proactive Strategies for Business Data Security

Follow these advanced data protection strategies to help protect your firm from hackers in an increasingly challenging environment.

2025-07-24T14:41:27+01:00June 12th, 2025|Breach, Cybersecurity, Data Exfiltration|

Marks & Spencer Breach: How A Ransomware Attack Crippled a UK Retail Giant

Marks & Spencer suffered a major ransomware attack in April 2025 that disrupted operations and exposed customer data. Here's what happened and how it could have been prevented.

2025-07-24T14:47:07+01:00June 12th, 2025|Breach, Cybersecurity, Ransomware|

BlackSuit Ransomware: How It Works and Who’s Behind It

Learn how BlackSuit ransomware operates, who is behind it, and why it’s becoming a bigger cyberthreat. This simple guide also offers key tips to protect yourself and respond the right way.

2025-07-24T14:48:31+01:00June 10th, 2025|Cybersecurity, Data Exfiltration, Ransomware, Variants|