Ninth Circuit Says Demand for Cyberinsurance Payment not a “Claim”

One of the more common forms of cyberattack is that of a business email compromise (BEC) – when the email account of either a buyer or seller (or both) is compromised by a hacker who then spoofs one or both of the parties to demand or redirect p… Continue reading Ninth Circuit Says Demand for Cyberinsurance Payment not a “Claim”

China’s Cybercriminals Profit From Underground Data Monetization

Cybercriminals are using big data technology to make money from data obtained on the Chinese-language underground. Quelle surprise. An analysis of open source information and data drawn from a variety of closed forums showed a cycle that included mult… Continue reading China’s Cybercriminals Profit From Underground Data Monetization

Microsoft Office 365 Credentials Under Attack By Fax ‘Alert’ Emails

Emails from legitimate, compromised accounts are being sent to numerous enterprise employees with the aim of stealing their O365 credentials. Continue reading Microsoft Office 365 Credentials Under Attack By Fax ‘Alert’ Emails

From Stolen Credentials to Full Network Compromise

How Hackers Are Actually Using Exposed Passwords to Infiltrate Active Directory Recent reports like the Verizon DBIR have noted that stolen credentials are often the foothold that attackers use to compromise networks and systems. A simple phishing or c… Continue reading From Stolen Credentials to Full Network Compromise

Trusting Passwords: Best Practices for Threat-Proofing Credentials

“Open, Sesame!”Upon reflection it’s easy to see that passwords have an incredibly long history: from shibboleths to military codes, they’ve been used in many situations to preserve privacy and identity. With the creation of comp… Continue reading Trusting Passwords: Best Practices for Threat-Proofing Credentials

Is Your Corporate Access Data for Sale on the Dark Web?

As businesses turn to remote access solutions to empower workers during the COVID-19 crisis, trouble seems to be brewing across numerous illegal marketplaces and the Dark Web. Cybercriminals are actively shopping for credentials hoping to access valua… Continue reading Is Your Corporate Access Data for Sale on the Dark Web?

Solving the Compromised Credentials Conundrum

Today is World Password Day and organizations are unfortunately still reliant on archaic password strategies that put the onus on users to create and remember numerous complex and constantly changing password strings. It’s no wonder that this app… Continue reading Solving the Compromised Credentials Conundrum