• About
  • Disclaimer
  • Privacy Policy
  • Contact
Friday, July 18, 2025
Cyber Defense GO
  • Login
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration
No Result
View All Result
Cyber Defense Go
No Result
View All Result
Home Cyber Security

Welcoming Truyu to Have I Been Pwned’s Companion Program

Md Sazzad Hossain by Md Sazzad Hossain
0
Welcoming Truyu to Have I Been Pwned’s Companion Program
585
SHARES
3.2k
VIEWS
Share on FacebookShare on Twitter


I at all times used to joke that when individuals used Have I Been Pwned (HIBP), we successfully stated “Oh no – you’ve got been pwned! Uh, good luck!” and left it at that. That was fantastic when it was a pet venture utilized by individuals who dwell in the same world to me, but it surely did not do so much for the on a regular basis of us simply studying in regards to the scary world of knowledge breaches. Partnering with 1Password in 2018 helped, however the impression of knowledge breaches goes effectively past the publicity of passwords, so a few months in the past, I wrote about discovering new companions to assist victims “after the breach”, Right this moment, I am very comfortable to welcome the primary such companion, Truyu.

I alluded to Truyu being a wonderful instance of a possible companion within the aforementioned weblog put up, so their inclusion on this program ought to come as no shock, however let me embellish additional. In truth, let’s begin with one thing very topical as of the second of posting:

New e-mail from @Qantas simply now: “we consider your private info was accessed throughout the cyber incident”. They positively deserve credit score for early communication. pic.twitter.com/dTLlvI0Byq

— Troy Hunt (@troyhunt) July 2, 2025

It is pure coincidence that Qantas’ incident coincides with the onboarding of an Aussie id safety service, but it surely additionally makes it all of the extra related. My very own private circumstances are an ideal instance: apparently, my identify, e-mail tackle, telephone quantity, date of start, and frequent flyer quantity at the moment are within the fingers of a hacking group not precisely identified for shielding individuals’s privateness. In the sooner weblog put up about onboarding new companions, I confirmed how Truyu had despatched me early alerts when my id information was used to join a few completely different monetary providers. If that occurs because of the Qantas breach, no less than I’ll learn about it early.

The introduction of Truyu as the primary of a number of upcoming companions heralds the primary time we have tailor-made content material based mostly on the geolocation of the person. What meaning is that relying on the place you might be on the earth, you may even see one thing completely different to this:

I am seeing Truyu on the Dropbox breach web page as a result of I am in Australia, and for those who’re not, you will not. You may have your individual footer with your individual nation, which relies on Cloudflare’s IP geolocation headers. In time, relying on the place you might be on the earth, you will see extra content material tailor-made particularly for you the place it is related to your location. That is not simply product placements both, we’ll be including different sources I will share extra about shortly.

Placing one other model identify on HIBP isn’t one thing I take evenly, as is evidenced by the actual fact that is solely the second time I’ve executed this in almost 12 years. Truyu is there as a result of it is a product I genuinely consider gives worth to information breach victims and on this case, one I additionally use myself. And for what it is price, I’ve additionally hung out with the Truyu workforce in individual on a number of events and have solely constructive issues to say about them. That, in my e book, goes a great distance.

So, that is our new companion, and so they’ve arrived at simply the right time. Now I am off to leap on a Qantas flight, want me luck!

Have I Been Pwned



You might also like

Hackers Use GitHub Repositories to Host Amadey Malware and Knowledge Stealers, Bypassing Filters

Why Your Wi-Fi Works however Your Web Doesn’t (and How you can Repair It)

How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits

Tags: PartnerProgramPwnedsTruyuWelcoming
Previous Post

AI Safety in Motion: Making use of NVIDIA’s Garak to LLMs on Databricks

Next Post

My new favourite keychain accent provides me 2TB of SSD storage immediately

Md Sazzad Hossain

Md Sazzad Hossain

Related Posts

Hackers Use GitHub Repositories to Host Amadey Malware and Knowledge Stealers, Bypassing Filters
Cyber Security

Hackers Use GitHub Repositories to Host Amadey Malware and Knowledge Stealers, Bypassing Filters

by Md Sazzad Hossain
July 17, 2025
The Carruth Knowledge Breach: What Oregon Faculty Staff Must Know
Cyber Security

Why Your Wi-Fi Works however Your Web Doesn’t (and How you can Repair It)

by Md Sazzad Hossain
July 17, 2025
How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits
Cyber Security

How Fidelis Integrates Detection and Response for SQL-Based mostly Exploits

by Md Sazzad Hossain
July 16, 2025
How India’s DPDP Act Impacts Digital Lending
Cyber Security

How India’s DPDP Act Impacts Digital Lending

by Md Sazzad Hossain
July 16, 2025
MITRE Launches New Framework to Sort out Crypto Dangers
Cyber Security

MITRE Launches New Framework to Sort out Crypto Dangers

by Md Sazzad Hossain
July 15, 2025
Next Post
My new favourite keychain accent provides me 2TB of SSD storage immediately

My new favourite keychain accent provides me 2TB of SSD storage immediately

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

Recommended

Author Survey: 42% of C-Suite Say Gen AI Is Tearing Their Firms Aside

Author Survey: 42% of C-Suite Say Gen AI Is Tearing Their Firms Aside

March 21, 2025
Find out how to Clear and Preserve Air Movers

Find out how to Clear and Preserve Air Movers

July 7, 2025

Categories

  • Artificial Intelligence
  • Computer Networking
  • Cyber Security
  • Data Analysis
  • Disaster Restoration
  • Machine Learning

CyberDefenseGo

Welcome to CyberDefenseGo. We are a passionate team of technology enthusiasts, cybersecurity experts, and AI innovators dedicated to delivering high-quality, insightful content that helps individuals and organizations stay ahead of the ever-evolving digital landscape.

Recent

Mannequin predicts long-term results of nuclear waste on underground disposal programs | MIT Information

Mannequin predicts long-term results of nuclear waste on underground disposal programs | MIT Information

July 18, 2025
Networks Constructed to Final within the Actual World

Networks Constructed to Final within the Actual World

July 18, 2025

Search

No Result
View All Result

© 2025 CyberDefenseGo - All Rights Reserved

No Result
View All Result
  • Home
  • Cyber Security
  • Artificial Intelligence
  • Machine Learning
  • Data Analysis
  • Computer Networking
  • Disaster Restoration

© 2025 CyberDefenseGo - All Rights Reserved

Welcome Back!

Login to your account below

Forgotten Password?

Retrieve your password

Please enter your username or email address to reset your password.

Log In