FreshRSS

πŸ”’
❌ Secure Planet Training Courses Updated For 2019 - Click Here
There are new available articles, click to refresh the page.
☐ β˜† βœ‡ The Hacker News

4 Ways Hackers use Social Engineering to Bypass MFA

By: The Hacker News β€” February 12th 2024 at 11:14
When it comes to access security, one recommendation stands out above the rest: multi-factor authentication (MFA). With passwords alone being simple work for hackers, MFA provides an essential layer of protection against breaches. However, it's important to remember that MFA isn't foolproof. It can be bypassed, and it often is.  If a password is compromised, there are several options
☐ β˜† βœ‡ The Hacker News

How Hackers Phish for Your Users' Credentials and Sell Them

By: The Hacker News β€” November 28th 2023 at 11:13
Account credentials, a popular initial access vector, have become a valuable commodity in cybercrime. As a result, a single set of stolen credentials can put your organization’s entire network at risk. According to the 2023 Verizon Data Breach Investigation Report, external parties were responsible for 83 percent of breaches that occurred between November 2021 and October 2022.&
☐ β˜† βœ‡ The Hacker News

Take an Offensive Approach to Password Security by Continuously Monitoring for Breached Passwords

By: The Hacker News β€” October 11th 2023 at 12:02
Passwords are at the core of securing access to an organization's data. However, they also come with security vulnerabilities that stem from their inconvenience. With a growing list of credentials to keep track of, the average end-user can default to shortcuts. Instead of creating a strong and unique password for each account, they resort to easy-to-remember passwords, or use the same password
☐ β˜† βœ‡ The Hacker News

Are You Willing to Pay the High Cost of Compromised Credentials?

By: The Hacker News β€” September 25th 2023 at 11:19
Weak password policies leave organizations vulnerable to attacks. But are the standard password complexity requirements enough to secure them?Β 83% of compromised passwordsΒ would satisfy the password complexity and length requirements of compliance standards. That’s because bad actors already have access to billions of stolen credentials that can be used to compromise additional accounts by
☐ β˜† βœ‡ The Hacker News

Key Cybersecurity Tools That Can Mitigate the Cost of a Breach

By: The Hacker News β€” September 5th 2023 at 11:14
IBM's 2023 installment of their annual "Cost of a Breach" report has thrown up some interesting trends. Of course, breaches being costly is no longer news at this stage! What’s interesting is the difference in how organizations respond to threats and which technologies are helping reduce the costs associated with every IT team’s nightmare scenario.Β  The average cost of a breach rose once again
☐ β˜† βœ‡ The Hacker News

What's the State of Credential theft in 2023?

By: The Hacker News β€” August 16th 2023 at 11:57
At a little overt halfway through 2023, credential theft is still a major thorn in the side of IT teams. The heart of the problem is the value of data to cybercriminals and the evolution of the techniques they use to get hold of it. TheΒ 2023 Verizon Data Breach Investigations Report (DBIR)Β revealed that 83% of breaches involved external actors, with almost all attacks being financially motivated
☐ β˜† βœ‡ The Hacker News

Local Governments Targeted for Ransomware – How to Prevent Falling Victim

By: The Hacker News β€” July 21st 2023 at 11:41
Regardless of the country, local government is essential in most citizens' lives. It provides many day-to-day services and handles various issues. Therefore, their effects can be far-reaching and deeply felt when security failures occur. In early 2023, Oakland, California,Β fell victim to a ransomware attack. Although city officials have not disclosed how the attack occurred, experts suspect a
☐ β˜† βœ‡ The Hacker News

Preventing Insider Threats in Your Active Directory

By: The Hacker News β€” March 22nd 2023 at 11:20
Active Directory (AD) is a powerful authentication and directory service used by organizations worldwide. With this ubiquity and power comes the potential for abuse. Insider threats offer some of the most potentials for destruction. Many internal users have over-provisioned access and visibility into the internal network. Insiders' level of access and trust in a network leads to unique
☐ β˜† βœ‡ The Hacker News

Does Your Help Desk Know Who's Calling?

By: The Hacker News β€” March 9th 2023 at 12:25
Phishing, the theft of users' credentials or sensitive data using social engineering, has been a significant threat since the early days of the internet – and continues to plague organizations today,Β accounting for more than 30% of all known breaches. And with the mass migration to remote working during the pandemic, hackers have ramped up their efforts to steal login credentials as they take
❌