RESOURCES
Research, views, and insights on cybersecurity, account takeover, fraud, and more
Cybersecurity, Data Breaches, Regulation and Compliance
The PSR protections will help address the growing threat of APP scams, with the £85,000 refund limit giving relief for victims of scams.
Active Directory, Credential Screening, Cybersecurity, Data Breaches
Once attackers have valid credentials, they gain unauthorized access to email accounts, making it much easier to carry out a BEC attack.
Active Directory, Credential Screening, Cybersecurity, Threat Intel
Active Directory can be exploited through password spraying attacks and compromised credentials. Five Eyes recommends the following controls.
Cybersecurity, Data Breaches, Threat Intel
Infostealers still take the top spot as the most prominent source for newly compromised credentials (and potentially other PII as well).
Account Takeover, Active Directory, Cybersecurity, Data Breaches, Threat Intel
Infostealer malware has led to an increase in credential compromise with threat actors exploiting password managers and targeting RMM tools.
Active Directory, Continuous Password Protection, Data Breaches, Entra ID / Azure AD
Can Entra ID continually defend against exposed passwords in new data breaches as businesses operate across a hybrid environment?
Active Directory, Continuous Password Protection, Data Breaches, Entra ID / Azure AD
Microsoft Entra ID is one of the tools many organizations rely on to protect their passwords, but is it enough? Understand the limitations.
Data Breaches, Password Security, Regulation and Compliance
Helping government agencies and organizations operating in the public sector navigate password and credential security.
Account Takeover, Data Breaches
The most prevalent and damaging attack plaguing the online betting and gambling industry is fraud stemming from account takeover.
No Spam. Only sweet content and updates on our products and solutions.