credential theft
3 Tips to Protect Employees From External Exploitation Threats
Here's how credentialed insider attacks work and how to avoid situations where user negligence can lead to successful attacks ...
Understanding the Progression of a Ransomware Attack
Everyone should be familiar with ransomware and its impact on businesses by now. But while you may understand the very basics of ransomware, you can’t really protect your organization until you are ...
Permiso Discovers Smishing Attack to Steal AWS Credentials
Permiso, a provider of a platform for correlating IT events to identities, today disclosed the discovery of an attack through which cybercriminals are employing text messages to steal credentials that enable them ...
Weak Passwords Offer Easy Access to Enterprise Networks
Poor password practices continue to put businesses at risk, with nearly 90% of passwords used in successful attacks consisting of 12 characters or less, indicating additional security measures are required to protect ...
How Information Stealers Get User Credentials
Throughout 2022, the theft of user credentials continued to blanket the threat landscape. A recent example that illustrates both the simplicity and depth of this tactic is the Uber breach by threat ...
LastPass Breach Raises Disclosure Transparency Concerns
In the graphic novel “The Watchman” by Alan Moore and Dave Gibbons, one of the recurring themes is ‘Who watches the watchers?’, a question originally posed by the Roman poet Juvenal as ...
Malware Families Love Telegram, Discord as Much as Users
Messaging apps like Discord and Telegram have become a conduit for malware, as their popularity grows among users who want to create and share programs on the platforms. These bots may facilitate ...
Gone Ape? How to Protect NFTs from Theft
What are NFTs? Non-fungible tokens (NFTs) are unique and irreplaceable digital assets that, by their nature, have an intrinsic value. These could be digital art, photography, GIFs, avatars, memes, 3D objects, domain ...
Five Security Lessons From the Lapsus$ Attacks
Threat groups like Lapsus$ are increasingly targeting the blind spots in otherwise robust corporate cybersecurity programs ...
Why ATO Attacks Are Attacks on Your Customers
Motivated by the continual surge in eCommerce, which according to UNCTAD has seen unprecedented growth during the COVID-19 pandemic, retailers are scrambling to adapt to a shift in consumer demand and create ...