Credential abuse stories
Countering the rise of credential-based attacks
By implementing behavioural analytics and smart password practices, security teams can thwart credential-based attacks across the organisation.
Attivo Networks launches credential-cloaking tool to deter data thieves
The tool is part of Attivo’s Endpoint Detection Net suite, and is aimed at enabling organisations to hide credentials from would-be attackers and their tools.
How a vantage point sees threats before they impact
When the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons.
Thycotic rolls out SCIM Connector for expanded user access integration
SCIM Connector 2.0 allows organisations to set up workflows to synchronise, provision or modify entitlements in Secret Server directly within their IGA platform.
Online users giving out social media details too freely - Kaspersky
The survey revealed that online users in Asia Pacific appear to be willing to share their private information in exchange for various personal gains from social media.
Gaming industry a rising target of cyber-attacks – Akamai
“Gamers are a niche demographic known for spending money, so their financial status is also a tempting target.”
CERT NZ report: Unauthorised account access a growing problem
New Zealanders reported direct financial losses of $1.7 million. While that is still a substantial loss, the figure is a 71% drop from the previous quarter.
Cyber criminals targeting the gaming industry at an alarming rate
New research from Akamai shows the gaming community is quickly becoming one of the most highly targeted industries for cyber attacks, with hackers largely driven by gaining consumer credentials.
SIM swapping: What is it and should you be worried?
Due to the growing reliance on mobile phones, SIM swapping is increasingly targeted as a way to take over a victim’s online accounts.
Google's new Chrome feature warns about compromised logins
This week Google released extra measures in a bid to provide better security for its users’ data.
Expert comment: What the Collection #2-5 data dump means for credential abuse
Techday spoke to experts and executives in the security industry about the data leak and the implications on phishing and credential stuffing.
Massive 2.2bil-username data dump leaked on dark web
This makes the second leak three times bigger than the Collection #1 dump leaked last month.
Credential theft industry booming in US, declining in Asia & EU
New research reveals the US is ripe for harvest, but Blueliv says the declines in EU and Asia are almost definitely only temporary.
Mega users affected by credential stuffing attack; 15,000 affected
Users of file sharing website Mega have been tripped up in a credential stuffing attack.
Online businesses under siege from botnet DDoS attacks and credential abuse – report
Attack traffic origination against from China and Russia combined was three times the number of attacks from the US.