Password Reuse Risk is Exacerbated by Dark Web Data

A flood of data to the dark web in the last 12 months has kicked up the cybercrime risk of password reuse. Here’s how to protect your data.
The post Password Reuse Risk is Exacerbated by Dark Web Data appeared first on Security Boulevard.
Continue reading Password Reuse Risk is Exacerbated by Dark Web Data

Lessons Learned from the Global Year in Breach: Supply Chain Cybersecurity Risk is Swamping Businesses

Clients love the ID Agent Digital Risk Protection Platform. But don’t take our word for it – hear from them directly in 2 new case studies!
The post Lessons Learned from the Global Year in Breach: Supply Chain Cybersecurity Risk is Swamping Businesses … Continue reading Lessons Learned from the Global Year in Breach: Supply Chain Cybersecurity Risk is Swamping Businesses

See Our Solutions at Work in New Case Studies

Clients love the ID Agent Digital Risk Protection Platform. But don’t take our word for it – hear from them directly in 2 new case studies!
The post See Our Solutions at Work in New Case Studies appeared first on Security Boulevard.
Continue reading See Our Solutions at Work in New Case Studies

Easy to Deceive, Difficult to Detect, Impersonation Dominates Attacks

Impersonation enables threat actors to manipulate victims into disclosing sensitive information as well as enhance their ability to commit fraud. An organization’s name, logo, or messaging can be incorporated into almost any threat type, makin… Continue reading Easy to Deceive, Difficult to Detect, Impersonation Dominates Attacks

Royal Ripper: Multi-Stage Phishing Attack Adapts to Victim Input

PhishLabs is monitoring a multi-stage phishing campaign that impersonates government entities and telecoms to target financial institutions and their customers. The threat actor behind the attacks has been designated Royal Ripper. The initial s… Continue reading Royal Ripper: Multi-Stage Phishing Attack Adapts to Victim Input