RockYou2021

Demystifying RockYou2021

Unless you’ve been living under a rock, you’ve probably heard of the RockYou2021 breached password list. Many articles have been published about this incident and password lists associated with it. However, some reported information is misleading or downright wrong. Let’s dive into what the RockYou2021 list means for you and organizations worldwide. What is RockYou2021? For a quick recap, RockYou2021 …

pipeline

Lessons from the Colonial Pipeline Breach

One of the largest, most economically devastating ransomware attacks occurred less than a month ago, and details of the attack are starting to become clearer. So what was the catalyst for this attack? It was as simple as a compromised password. As initially reported by Bloomberg, DarkSide was able to breach Colonial Pipeline and inject ransomware, crippling their infrastructure and …

MFA 3

Mixing It Up – Defending Against a Blended MFA Attack

Most businesses employ multi-factor authentication (MFA) security measures to protect their systems and accounts. We’ve talked about the best ways to use MFA effectively and how important it is to protect each layer to keep the bad actors out while still granting your employees and users the access they require. Unfortunately, many businesses believe MFA is all they need to …

mfa

Hacking MFA the Technical Way and How to Guard Against These Attacks

Multi-factor authentication (MFA) requires several elements in order to function as real security for your data systems. Each factor in a multi-factor system must be appropriately protected because malicious actors can take advantage of a weak link to dismantle your protection. In part one of our series on the vulnerabilities of multi-factor authentication, we talked about the social engineering tactics …

cybersecurity

Get Involved in Cybersecurity Now

All Hands on Deck The average person is familiar with the idea of security systems at large organizations: key cards, security guards, and ID badges. Similarly, we have a grasp on some small-scale home security: motion-detecting lights, home cameras, and our physical locks and keys. What we haven’t come to terms with is that the digital landscape. It isn’t the …

Municipalities

Cyberattacks on Municipalities & How to Defend Against Them

Cyberattacks continue to have a massive economic impact on local and state branches of governments across the U.S. When sectors of government are breached, the credibility of their institutions is jeopardized, leading to a negative cycle of resource allocation. When focusing on municipalities, it’s particularly easy to see how detrimental the impact can be.  A Perfect Target Municipalities are ideal …

dark web

Throwing Light on the Dark Web

As recent reviews have shown, upwards of 80% of hacking-related attacks involve compromised credentials. Threat actors can target individuals and companies through many different types of cyber attacks, but where does their information come from in the first place?  It’s easy to find lists of usernames and passwords, sometimes for free, but more often for sale online. In fact, according …