In spite of many, many public warnings, users of Windows and Microsoft's various cloud-based services appear to still be committing the cyber sin of password reuse.
Even with 64% of cloud security incidents stemming from unauthorized access, businesses are still underestimating access security with only 7% of security leaders citing account takeovers as top risk.
Compromised passwords happens to everyone. Any company, regardless of size should be using MFA as part of their security strategy as it can be one of the easiest ways to secure accounts.
Hackers recently launched a credential stuffing attack on the new Disney+ streaming service by using database of usernames and passwords from previous hacks.
With data breaches happening every day, it's time for enterprises to understand the severity of password reuse and prevent it from becoming a costly affair.
Since March 2019, hackers have been targeting the UN and affiliated humanitarian aid organizations with a sophisticated, mobile-centric phishing campaign to harvest Microsoft Office 365 login credentials.
2019 password security report shows that even though businesses are increasingly adopting MFA and password generator solution, the passwords are still not strong enough or being reused between different accounts.
Multi-factor authentication might not be as effective as before to secure user accounts and profiles. What are the ways used by hackers to bypass the authentication?
State Farm, the insurance giant with more than 83 million customers, was hit by a credential stuffing attack with unknown number of customer accounts compromised.
Honeypots set up by Sophos logged a staggering amount of scripted attacks attempting to pass default credentials. What’s more alarming is the aggressive speed and scale of these attempts with the first attack in less than 60 seconds.