brute-force attack
Seceon to Participate In AGC Partners’ 2017 Boston Technology Growth Conference
Seceon will again be participating with AGC Partners in its 14th Annual Boston Technology Growth Conference to be held on Thursday, November 9th. The AGC Partner Conference is a premier showcase for fast ...
Seceon to Participate In AGC Partners’ 2017 Boston Technology Growth Conference
Seceon will again be participating with AGC Partners in its 14th Annual Boston Technology Growth Conference to be held on Thursday, November 9th. The AGC Partner Conference is a premier showcase for fast ...
How to Solve the Password Problem
An Overhaul in Password Security Passwords aren’t going anywhere. Despite the buzz that biometrics and MFA are holistic solutions, passwords are a ubiquitous, crucial layer for authentication—and they’re low-cost and simple, too. That’s ...
The Exploitation of Privileged Accounts
The flow of news about data breaches and ransomware attacks is relentless. Businesses of all sizes—large companies included—continue to suffer. Not only do cyber attacks lead to financial damage, but they have ...
Palo Alto Networks Issues BRc4 Attack Simulation Tool Warning
The Unit 42 research arm of Palo Alto Networks this week reported a Brute Ratel C4 (BRc4) adversarial attack simulation tool is being used by cyberattackers to evade detection. Peter Renals, principal ...
The Top 6 Methods Hackers Use to Steal Your Passwords
Install one layer of cyber security protection, and suddenly there’s a whole new way bad actors have discovered to penetrate it. Staying on top of the latest password security methods can sometimes ...
Busting the Myths Surrounding Password-Based Security
People have been relying on password-based security for millennia. The Roman military reportedly used what they called “watchwords” to identify soldiers on patrol. Exclusive groups and guilds used secret passwords to prove ...
The Largest Pipeline Network went down by Cyberattack
The post The Largest Pipeline Network went down by Cyberattack appeared first on Seceon ...
Hacking MFA the Technical Way and How to Guard Against These Attacks
Multi-factor authentication (MFA) requires several elements in order to function as real security for your data systems. Each factor in a multi-factor system must be appropriately protected because malicious actors can take ...
Password Spraying: How Common Passwords Threaten Your Organization
When hackers target your organization with a password spraying attack, hackers are betting that one (or more) of your employees is logging in with a commonly used password. Threat actors adopt this ...