credential stuffing

The Reality of Compromised Credentials

Cracked Wide Open Over the past decade, the number of data breaches in almost all industries has skyrocketed. From healthcare to finance, user credentials have become both the tool of cyberattack and one of its primary targets. The 2021 Verizon DBIR report indicated that upwards of 61% of breaches involved leveraged credentials. Communicating clearly about the problem The Open Web Application …

state of password security

Passwords Security: Past, Present, and Future

The recent report on The State Password Security in the Enterprise reveals several essential findings for system administrators and security professionals alike.  First, whether we are happy about it or not, passwords are going to be around for a long time. Second, organizations need to familiarize themselves with current industry recommendations. And third, due to the frequency of cyber-attacks involving …

pipeline

Lessons from the Colonial Pipeline Breach

One of the largest, most economically devastating ransomware attacks occurred less than a month ago, and details of the attack are starting to become clearer. So what was the catalyst for this attack? It was as simple as a compromised password. As initially reported by Bloomberg, DarkSide was able to breach Colonial Pipeline and inject ransomware, crippling their infrastructure and …

dark web

Throwing Light on the Dark Web

As recent reviews have shown, upwards of 80% of hacking-related attacks involve compromised credentials. Threat actors can target individuals and companies through many different types of cyber attacks, but where does their information come from in the first place?  It’s easy to find lists of usernames and passwords, sometimes for free, but more often for sale online. In fact, according …