Credential-based Attacks

blue closed lock in front of dark backgound

Password spraying: Attack guide and prevention tips 

The phrase ‘spray and pray’ likely came from the military, used to describe inaccurately firing automatic weapons in the hope that one shot eventually found its mark. It’s now used to describe any scenario where a strategy relies on... Read More

dark ufo with red lights in the sky above the houses - alien txtbase featured image

ALIEN TXTBASE data-dump analysis: Dangerous or junk?

Specops researchers have been digging into the ALIEN TXTBASE data-dump, which was recently merged into the HaveIBeenPwned (HIBP) dataset by Troy Hunt. After some analysis of the over 200 million passwords in this dataset, we estimate about 20 million... Read More

cyber attack incident response plan graphic - blackboard with writing: What's your plan

Cyber-attack incident response plan: Responding to a breach

Having an incident response plan is crucial in the wake of a cyber-attack because it provides a structured and systematic approach to managing the crisis. Without a plan, organizations may find themselves scrambling to respond, leading to confusion, delays,... Read More