Credential-based Attacks

Impersonation attacks cybersquatting

What is cybersquatting and how can you protect your brand?

Impersonation fraud is one of the biggest threats facing today’s businesses — and the threat continues to grow. In fact, the US Federal Trade Commission reports that impersonation attacks, which includes misleading domain names (also known as cybersquatting), are increasing... Read More

Microsoft logo on building

Microsoft transitions NTLM to Kerberos in Windows to boost security 

Windows authentication is a process that’s been around for decades. Unsurprisingly, attackers often target this authentication mechanism, preying upon weaknesses and vulnerabilities as they crop up. To help secure Windows authentication, Microsoft recently announced it was deprecating reliance on... Read More

holiday service desk cybersecurity attacks

Holiday season cyber threats: Is your service desk prepared?

Cybercriminals strategically time their attacks for when cyber defenses are most vulnerable. The Federal Bureau of Investigation (FBI) and the Cybersecurity and Infrastructure Security Agency (CISA) have noticed a significant increase in ransomware attacks against US companies during holidays and weekends.... Read More

hacker with hat

Hybrid password attacks: How they work and how to stop them

Cybersecurity measures force threat actors to get creative and come up with new and inventive ways to compromise user credentials. As the name suggests, hybrid password attacks involve combining two or more attack methods to carry out password cracking.... Read More

ransomware attacker with hood

Brute force attacks: How they work & how to prevent them

Compromising login credentials is the goal of many modern cyber-attacks. According to Verizon’s 2025 Data Breach Investigations Report, 88% of web application attacks over the past year involved the use of stolen credentials, demonstrating how vulnerable password-based systems remain without... Read More