Credential abuse stories
Tidal Cyber maps out 2024's election cyber threats worldwide
Tidal Cyber unveils a study revealing high-risk countries and top offenders for election cyber interference threats in 2024, spotlighting the methods used and potential defences.
Google Cloud's 2024 report highlights key cyber threats & defences
Google Cloud's 2024 Threat Horizons Report identifies credential misuse, cryptomining, ransomware, and data theft as the key cloud-related threats, citing the need for stringent defensive strategies.
Okta set to acquire Spera Security in enhancement of identity threat detection
Identity security giant, Okta, gears up to acquire 2022-born Spera Security, set to boost its identity threat detection capabilities and enrich its customer base with advanced technology.
Delinea introduces MFA enforcement in its Secret Server offering
Delinea Secret Server introduces MFA enforcement at depth to meet increasingly stringent cyber insurance requirements.
Keeper Security introduces major password manager update for iOS
The updates include performance boosts for large vaults, advanced search, accessibility and workflow improvements for iOS users.
In-house intelligence teams not fit-for-purpose – report
Most in-house intelligence teams lack the in-country experience and access to quality intelligence necessary for avoiding costly and embarrassing mistakes.
Malicious HTML attachments a popular cyber threat: Barracuda
Barracuda Networks has highlighted how cybercriminals leverage HTML as an attack technique in phishing, credential theft, and malware delivery.
Darktrace notes health, retail and energy cyberattack trends
The most observed 2022 cyber incident in Australia’s healthcare was suspicious network scan activity and multiple lateral movement model breaches in 2021.
Sophos report reveals stark reality of cybercrime-as-a-service
The report addresses how ransomware remains one of the greatest cyber crime threats to organisations with operators innovating their extortion tactics.
A third of cyberattacks in the cloud leverage credential access
A new report has revealed adversary success in identity theft indicates default cloud security controls are ineffective at preventing attacks.
Vectra Protect team finds Microsoft Teams vulnerability
The Vectra Protect team identified a post-exploitation opportunity in August, allowing malicious actors to steal valid user credentials from Microsoft Teams.
Asia’s data privacy landscape is ‘coming of age’ – how can businesses cope?
Identity theft and online fraud are on the rise, but data protection laws are evolving to combat them. Here are three key steps to address data privacy.
What every CISO must answer to enable a best-in-class security operations program
It has been widely reported recently that South Australian government employees have been the victims of a cyberattack.
How credentials became an attacker’s easiest target
Even with education and phishing tests, users continue to hand over legitimate logins to attackers, who in turn exploit them with a high degree of success.
Lack of security controls continues to put organisations at risk
Organisations still operate with limited visibility of user activity associated with web applications, despite the risk of insider threats and credential theft.
Countering the rise of credential-based attacks
By implementing behavioural analytics and smart password practices, security teams can thwart credential-based attacks across the organisation.
Attivo Networks launches credential-cloaking tool to deter data thieves
The tool is part of Attivo’s Endpoint Detection Net suite, and is aimed at enabling organisations to hide credentials from would-be attackers and their tools.
How a vantage point sees threats before they impact
80% of data breaches involve compromised passwords, according to Verizon. Organisations must prioritize security measures. #CyberSecurity.
Thycotic rolls out SCIM Connector for expanded user access integration
Thycotic announces general availability of SCIM Connector 2.0, allowing expanded integrations between identity providers and Secret Server.
Online users giving out social media details too freely - Kaspersky
APAC users sacrifice privacy for safety, with 39.2% trading data for security, reveals Kaspersky report.
Gaming industry a rising target of cyber-attacks – Akamai
Hackers hit gaming sector with 12bn credential stuffing attacks, Akamai reveals.
CERT NZ report: Unauthorised account access a growing problem
New Zealanders reported direct financial losses of $1.7 million. While that is still a substantial loss, the figure is a 71% drop from the previous quarter.
Cyber criminals targeting the gaming industry at an alarming rate
Gaming industry faces cyber onslaught, 12bn attacks in 17 months target player credentials.
SIM swapping: What is it and should you be worried?
Due to the growing reliance on mobile phones, SIM swapping is increasingly targeted as a way to take over a victim’s online accounts.