The Specops Breached Password Protection List Tops 3 Billion Unique Compromised Passwords from Live Attack Data and Leaked Lists Today, the Specops Software research team is sharing the results of our analysis on what passwords are being used to... Read More
News and Research
New Compliance Standards & More: See What’s New in Specops Password Auditor
Today, we’ve released the latest Specops Password Auditor — a read-only program that can help IT admins identify password vulnerabilities including number of accounts with compromised passwords and more. In this release, we’ve introduced a big update to our... Read More
School start reminds everyone to stop reusing passwords
Paper, pen, and school itself are the most common school-related words found among breached passwords, according to our latest research. To celebrate the end of summer and the start of another school year, Specops’ researchers analyzed more than 800... Read More
Understanding UK’s National Cyber Security Strategy to Achieve Cyber Resilience in 2022
UK government data shows that within the last year cyber-attacks against UK businesses are becoming more frequent. Today almost one in three businesses state they experience breaches or attacks at least once a week. In light of the increased... Read More
SolarWinds hack explained: Weak password “solarwinds123” cause of SolarWinds Hack
When you look at many of the high-profile breaches that have taken place in recent years, many of them had a common denominator – weak or compromised passwords. Weak passwords are easily compromised and can lead to significant breach... Read More
Common ransomware attack types: How they work & tips for prevention
Think of ransomware attacks as a form of digital kidnapping. Cybercriminals use encryption to lock you out of your files or devices, effectively holding them hostage until a ransom is paid. Like traditional kidnappers, their primary motive is financial... Read More
Popular work-related services fail to prevent leaked passwords
Preventing the use of weak and leaked password within an enterprise environment is a manageable task, but what about other services where employees share business-critical data in order to do their work? The researchers at Specops Software investigated the... Read More
Cyber risk management platform Outpost24 joins forces with international investment firm Vitruvian Partners for further global expansion
Stockholm – 13 July 2022: Outpost24 (“Outpost24” or the “Company”), a leading innovator in identifying and managing cybersecurity threats and vulnerabilities, today announced it has partnered with Vitruvian Partners (“Vitruvian”) to power the Company’s next phase of growth. The new... Read More
Ransomware Prevention Best Practices
A thriving industry of holding data hostage has emerged out of the malicious software known as ransomware. The FBI’s Internet Crime Complaint Center (IC3) states in its Internet Crime Report for 2020 that it received a record number of... Read More
A look at cybersecurity funding in the Infrastructure Investment and Jobs Act
President Joe Biden passed the Infrastructure Investment and Jobs Act (IIJA) in November 2021, allocating more than $1 trillion in federal capital to improve the nation’s infrastructure. The money from this bill will go toward a wide range of... Read More