News and Research

hacker behind desktop screen

MFA prompt bombing: How it works and how to stop it

User credentials are golden prizes for attackers. Weak or breached credentials provide an easy target for attackers looking to log in to a network instead of breaking in. Most businesses have caught on to the fact that multi-factor authentication... Read More

specops software logo

May The Force stay far far away from your AD #StarWarsDay

It’s back and better than ever! We’re celebrating #StarWarsDay with an updated list of the most used Star Wars themed passwords that top the Specops Breached Password Protection list. The Specops Breached Password Protection database includes the HaveIBeenPwned list,... Read More

specops software logo

Stale user accounts report in Active Directory

Stale (inactive) user accounts in Active Directory can provide attackers (and former employees) with an easy path into a corporate network. Even if the stale user account is not a privileged account, it can be used for privilege escalation... Read More