Credential-based Attacks

ransomware attacker with hood

What are password mask attacks?

Mask attacks are a targeted brute-force technique used by bad actors to crack passwords. Traditional brute-force attacks systematically try every possible combination of letters, numbers, and symbols to guess a target password. With mask attacks, the goal is to... Read More

hacker with hat

Microsoft adds phishing protection to Windows 11

With the recent release of Windows 11 version 22H2, Microsoft has introduced some new capabilities that are designed to protect users against phishing attacks. These phishing protection features are designed to prevent users from making some of the mistakes... Read More

Kalix municipality

Ransomware attacks continue to rage on government entities

Ransomware attacks are on the rise and target businesses across many industries and sectors. Government entities are also on the radar of ransomware gangs and have been the subject of many high-profile ransomware attacks. Governmental entities have been a... Read More

man with hood praying with ransomware word on top of him

How to recover from a ransomware attack

It is arguably one of the most dreaded words for any organization today – ransomware. Ransomware can bring a bustling, thriving, profitable business to its knees in hours. The aftermath can lead to a ripple effect of lost revenue,... Read More

orange circle with slash

Ransomware Prevention Best Practices

A thriving industry of holding data hostage has emerged out of the malicious software known as ransomware. The FBI’s Internet Crime Complaint Center (IC3) states in its Internet Crime Report for 2020 that it received a record number of... Read More

Specops Software

Nvidia leak shows weak passwords in use [new data]

Cyber-criminal group LAPSUS$ claimed GPU manufacturer Nvidia as one of its latest breach victims at the end of February. The news of the breach made headlines in the past few weeks, including details that employee passwords were leaked. The... Read More

data encrypted message on screen

How to prevent corporate account takeover attacks

Corporate Account Takeover (CATO) is a growing threat that allows cybercriminals to gain unauthorized access to business accounts, leading to financial fraud, data breaches, and operational disruptions. Attackers use tactics such as phishing, credential stuffing, and malware to compromise... Read More