RESOURCES
Research, views, and insights on cybersecurity, account takeover, fraud, and more
Cybersecurity, Data Breaches, Regulation and Compliance
The PSR protections will help address the growing threat of APP scams, with the £85,000 refund limit giving relief for victims of scams.
Active Directory, Credential Screening, Cybersecurity, Data Breaches
Once attackers have valid credentials, they gain unauthorized access to email accounts, making it much easier to carry out a BEC attack.
Active Directory, Credential Screening, Cybersecurity, Threat Intel
Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.
Cybersecurity, Data Breaches, Threat Intel
Infostealers still take the top spot as the most prominent source for newly compromised credentials (and potentially other PII as well).
Account Takeover, Active Directory, Cybersecurity, Data Breaches, Threat Intel
Infostealer malware has led to an increase in credential compromise with threat actors exploiting password managers and targeting RMM tools.
Black Hat 2024 tackled global challenges, briefings that dived into the depths of emerging threats, and an undeniable focus on data breaches.
Cybersecurity, Data Breaches, Threat Intel
Understand the Dark Web's complex character. The practical implications for cybersecurity and the importance of using this intelligence.
Credential Screening, Cybersecurity, Data Breaches, Threat Intel
For ITDR solutions, addressing compromised credentials head-on is crucial to protecting end users' environments.
Cybersecurity, Data Breaches, Threat Intel
The Google Threat Horizons report found that cloud computing services are facing increasing threats of compromise and abuse.
Cybersecurity, Data Breaches, Regulation and Compliance
Around the world, countries are rolling out stringent regulations aimed at improving consumer protection within the financial sector.
Cybersecurity, Data Breaches, Threat Intel
The Heritage Foundation, which authored a controversial policy roadmap called project2025, has been hacked. The group that hacked it, SiegedSec, has now disbanded.
Account Takeover, Credential Screening, Cybersecurity, Data Breaches, Threat Intel
Get advanced integration of Dark Web intelligence and compromised credential data into PAM solutions to enhance security measures.
No Spam. Only sweet content and updates on our products and solutions.