Last updated today
No recent security news.
More security reports
Amazon.com, Inc. is an American electronic commerce and cloud computing company founded by Jeff Bezos in 1994.
Yahoo! is an American web services provider headquartered in Sunnyvale, California, and owned by Verizon Media. The original Yahoo! company was founded by Jerry Yang and David Filo in January 1994 and was incorporated on March 2, 1995. Yahoo was one of the pioneers of the early Internet era in the 1990s.
Nvidia Corporation ( en-VID-ee-…ô; more commonly referred to as Nvidia, stylized as NVIDIA, or, due to their logo, nVIDIA) is an American technology company incorporated in Delaware and based in Santa Clara, California. It designs graphics processing units (GPUs) for the gaming and professional markets, as well as system on a chip units (SoCs) for the mobile computing and automotive market.
Zappos.com is an online shoe and clothing retailer based in Las Vegas, Nevada. The company was founded in 1999 by Nick Swinmurn and launched under the domain name Shoesite.com. In July 2009, Amazon acquired Zappos in an all-stock deal worth around $1.2 billion at the time.
Cybersecurity & Risk Management Library
The ultimate guide to attack surface and third-party risk management – actionable advice for security teams, managers, and executives.
Security research and global news about data breaches.
Third-party risk management
Articles, news, and research on third-party risk management.
Attack Surface Management
Articles, news, and research on attack surface management.
Articles, news, and research on cybersecurity.
Leader in Third Party & Supplier Risk Management Software
See how UpGuard shapes up against other platforms in the market.
"This is some text inside of a div block."
Free instant security score
How secure is your organization?
Request a free cybersecurity report to discover key risks on your website, email, network, and brand.
- Instant insights you can act on immediately
- Hundreds of risk factors including email security, SSL, DNS health, open ports and common vulnerabilities