Twitch Hack: Data Breach Exposed Sensitive Information

Twitch Hack: Data Breach Exposed Sensitive Information

The Amazon-owned gaming platform Twitch has suffered a data breach that experts have called a “highly targeted attack”. Twitch on Wednesday confirmed it suffered a breach, and said its teams were working to understand its extent. Read more…
Twitch Suffers Massive Data Breach

Twitch Suffers Massive Data Breach

American livestreaming service Twitch has been hit by a massive leak after an anonymous hacker posted a torrent file containing a vast amount of data for the public to access. Read more…
Video Game Streamer ‘Twitch’ Confirms Massive Data Breach

Video Game Streamer ‘Twitch’ Confirms Massive Data Breach

The Amazon-owned video streaming service Twitch, which focuses on video games and e-sports broadcasts, has suffered a massive breach, which the company confirmed via Twitter on Wednesday. Read more… Schedule a demo today with our cybersecurity experts and...
Twitch Gets Gutted: All Source Code Leaked

Twitch Gets Gutted: All Source Code Leaked

An anonymous user posted a link to a 125GB torrent to 4chan yesterday, containing all of Twitch’s source code, comments going back to its inception and more. An attacker claims to have ransacked Twitch for everything it’s got, including all of its source code and...

ThreatModeler

ThreatModeler revolutionizes threat modeling during the design phase by automatically analyzing potential attack surfaces. Harness our patented functionalities to make critical architectural decisions and fortify your security posture.

Learn more >

CloudModeler

Threat modeling remains essential even after deploying workloads, given the constantly evolving landscape of cloud development and digital transformation. CloudModeler not only connects to your live cloud environment but also accurately represents the current state, enabling precise modeling of your future state

Learn more >

IaC-Assist

DevOps Engineers can reclaim a full (security-driven) sprint with IAC-Assist, which streamlines the implementation of vital security policies by automatically generating threat models through its intuitive designer.

Learn more >