Is your email or password among the 240+ million compromised by infostealers?

For the second time since the start of 2025, a huge number of login credentials extracted from infostealer logs has been added to the database powering the HaveIBeenPwned (HIBP) site and breach notification service. In January 2025, HIBP’s creato… Continue reading Is your email or password among the 240+ million compromised by infostealers?

6 considerations for 2025 cybersecurity investment decisions

Cybersecurity professionals may be concerned about the constantly shifting threat landscape. From the increased use of artificial intelligence (AI) by malicious actors to the expanding attack surface, cybersecurity risks evolve, and defenders need to m… Continue reading 6 considerations for 2025 cybersecurity investment decisions

How does Windows store interactive logon credentials in memory in a domain environment?

I’m trying to understand how a user’s domain credentials are stored in the LSASS (Local Security Authority Subsystem Service) process after performing an interactive logon, such as through RDP (Remote Desktop Protocol).
I read this article… Continue reading How does Windows store interactive logon credentials in memory in a domain environment?

Over 3 million Fortune 500 employee accounts compromised since 2022

More than three million employee-linked corporate accounts were compromised between 2022 and 2024 across Fortune 500 companies, according to Enzoic. This surge is fueled by the widespread use of corporate email addresses for personal accounts and the g… Continue reading Over 3 million Fortune 500 employee accounts compromised since 2022

Balancing usability and security in the fight against identity-based attacks

In this Help Net Security interview, Adam Bateman, CEO of Push Security, talks about the rise in identity-based attacks, how they’re becoming more sophisticated each year, and how AI and ML are both fueling these threats and helping to defend against t… Continue reading Balancing usability and security in the fight against identity-based attacks

Is credential in URL obsolete (or should I be bold to drop support for it)? [duplicate]

As we know, it is possible to include username and password in the authority part of an URL. I see it’s still being documented in MDN. BUT:
Would I do people a favor if I drop support for it in my web protocols library?
Answer in question … Continue reading Is credential in URL obsolete (or should I be bold to drop support for it)? [duplicate]

Do I really need to keep the username for a shared user in HTTP Basic auth private?

I am developing a NestJS application that makes use of the Bullboard feature which brings a web frontend to manage jobs on a job queue inside redis (looking at which jobs are running with what job data, allowing to click a button to retry … Continue reading Do I really need to keep the username for a shared user in HTTP Basic auth private?