password-reuse

Detecting Phishing Attacks with Shadow IT Discovery

Detecting Phishing Attacks with Shadow IT Discovery

Phishing attacks need no introduction, so we will skip the part where we discuss h...

How to Protect Microsoft Active Directory Passwords?

How to Protect Microsoft Active Directory Passwords?

Even though Microsoft has ranted about passwords being irrelevant, they do provide...

And, in the Darkest Corner of Shadow IT: Privacy.

And, in the Darkest Corner of Shadow IT: Privacy.

When it comes to shadow IT and security, we have blogged about the oversight and c...

The Password Security Conundrum

The Password Security Conundrum

Password strength requirements have been around since the early 2000’s. Although t...

Anatomy of Account Takeover Attacks

Anatomy of Account Takeover Attacks

Account takeover (ATO) describes a scenario where user accounts and password integ...

Anatomy of Credential Stuffing Attacks

Anatomy of Credential Stuffing Attacks

Credential stuffing is the automated injection of usernames and passwords – usuall...

Record Number Of Account Leaks In 2020

Record Number Of Account Leaks In 2020

Due to the global pandemic, most of our lives and livelihoods have shifted online....

Shadow IT: What It Is And Why It Is An Alarming Security Concern For Every Organization

Shadow IT: What It Is And Why It Is An Alarming Security Concern For Every Organization

Post-breach investigation reports like those from IBM and Verizon agree that for t...

Credential Stuffing in the Media Industry aka.

Credential Stuffing in the Media Industry aka. "date-night offers"

As we discussed in an earlier blog post credential stuffing is one of the most pro...