Credential-based Attacks

hacker with hat

Hybrid password attacks: How they work and how to stop them

Cybersecurity measures force threat actors to get creative and come up with new and inventive ways to compromise user credentials. As the name suggests, hybrid password attacks involve combining two or more attack methods to carry out password cracking.... Read More

ransomware attacker with hood

Brute force attacks: How they work & how to prevent them

Compromising login credentials is the goal of many modern cyber-attacks. According to Verizon’s 2025 Data Breach Investigations Report, 88% of web application attacks over the past year involved the use of stolen credentials, demonstrating how vulnerable password-based systems remain without... Read More

verification stars and checks

Kerberoasting attacks: How to keep your Active Directory safe

A domain administrator account is the holy grail of privileged accounts in a Microsoft Active Directory environment. If an attacker can get their hands on a Domain Administrator account in the domain, they’ll have access to basically everything. Kerberoasting... Read More

hacker behind desktop screen

MFA prompt bombing: How it works and how to stop it

User credentials are golden prizes for attackers. Weak or breached credentials provide an easy target for attackers looking to log in to a network instead of breaking in. Most businesses have caught on to the fact that multi-factor authentication... Read More

hacker with hat

Microsoft adds phishing protection to Windows 11

With the recent release of Windows 11 version 22H2, Microsoft has introduced some new capabilities that are designed to protect users against phishing attacks. These phishing protection features are designed to prevent users from making some of the mistakes... Read More