Are Long-Lived Credentials the New Achilles’ Heel for Cloud Security?
Datadog advises Australian and APAC companies to phase out long-lived cloud credentials. Continue reading Are Long-Lived Credentials the New Achilles’ Heel for Cloud Security?
Collaborate Disseminate
Datadog advises Australian and APAC companies to phase out long-lived cloud credentials. Continue reading Are Long-Lived Credentials the New Achilles’ Heel for Cloud Security?
One of the more common forms of cyberattack is that of a business email compromise (BEC) – when the email account of either a buyer or seller (or both) is compromised by a hacker who then spoofs one or both of the parties to demand or redirect p… Continue reading Ninth Circuit Says Demand for Cyberinsurance Payment not a “Claim”
Cybercriminals are using big data technology to make money from data obtained on the Chinese-language underground. Quelle surprise. An analysis of open source information and data drawn from a variety of closed forums showed a cycle that included mult… Continue reading China’s Cybercriminals Profit From Underground Data Monetization
In 2017, the National Institute of Standards and Technology (NIST) released NIST Special Publication 800-63B Digital Identity Guidelines to help organizations properly comprehend and address risk as it relates to password management on the part of end … Continue reading NIST Password Guidelines 2021: Challenging Traditional Password Management
Emails from legitimate, compromised accounts are being sent to numerous enterprise employees with the aim of stealing their O365 credentials. Continue reading Microsoft Office 365 Credentials Under Attack By Fax ‘Alert’ Emails
How Hackers Are Actually Using Exposed Passwords to Infiltrate Active Directory Recent reports like the Verizon DBIR have noted that stolen credentials are often the foothold that attackers use to compromise networks and systems. A simple phishing or c… Continue reading From Stolen Credentials to Full Network Compromise
“Open, Sesame!”Upon reflection it’s easy to see that passwords have an incredibly long history: from shibboleths to military codes, they’ve been used in many situations to preserve privacy and identity. With the creation of comp… Continue reading Trusting Passwords: Best Practices for Threat-Proofing Credentials
As businesses turn to remote access solutions to empower workers during the COVID-19 crisis, trouble seems to be brewing across numerous illegal marketplaces and the Dark Web. Cybercriminals are actively shopping for credentials hoping to access valua… Continue reading Is Your Corporate Access Data for Sale on the Dark Web?
The emails, hashed passwords and usernames of 3.5 million users of the dating app MobiFriends were put up for sale on an underground forum. Continue reading Hackers Breach 3.5 Million MobiFriends Dating App Credentials
Today is World Password Day and organizations are unfortunately still reliant on archaic password strategies that put the onus on users to create and remember numerous complex and constantly changing password strings. It’s no wonder that this app… Continue reading Solving the Compromised Credentials Conundrum