account-takeover

Anatomy of Account Takeover Attacks

Anatomy of Account Takeover Attacks

Account takeover (ATO) describes a scenario where user accounts and password integ...

Anatomy of Credential Stuffing Attacks

Anatomy of Credential Stuffing Attacks

Credential stuffing is the automated injection of usernames and passwords – usuall...

Shadow IT: What It Is And Why It Is An Alarming Security Concern For Every Organization

Shadow IT: What It Is And Why It Is An Alarming Security Concern For Every Organization

Post-breach investigation reports like those from IBM and Verizon agree that for t...

Credential Stuffing in the Media Industry aka.

Credential Stuffing in the Media Industry aka. "date-night offers"

As we discussed in an earlier blog post credential stuffing is one of the most pro...

The Top 3 Problems Cloud-first Organizations Face Every Day When Using SaaS Software

The Top 3 Problems Cloud-first Organizations Face Every Day When Using SaaS Software

In recent years, businesses have begun to adopt a cloud-first approach with increa...