This website uses cookies to ensure you get the best experience on our website. Learn more
Articles written by Beth Grayson
-
Jun
06
HMRC phishing attack: How stolen credentials enabled tax fraud
His Majesty’s Revenue and Customs (HMRC) recently announced that it has been hit by a sophisticated phishing scam, which resulted in the theft of approximately £47 million ($63.76 million) from over 100,000 taxpayer accounts. The attack took place in 2024,…
Read More -
May
29
Password encryption: What is it and how does it work?
As companies rapidly shift towards cloud-based environments, employees find themselves juggling multiple accounts across a variety of platforms, each one most likely safeguarded by a password. These digital keys are often the first (and sometimes only) line of defense against…
Read More -
May
19
Credential harvesting: How it works & tips for prevention
Credential harvesting represents a serious threat to organizations of all kinds – particularly in today’s digital landscape, where virtually every enterprise depends on user credentials for access and security. According to IBM’s 2025 Threat Intelligence Index, nearly a third (30%)…
Read More -
Jan
16
Password mask attacks explained: What are they & how do they work?
Credential-based attacks remain one of the most effective techniques used by cybercriminals to breach enterprise networks. In 2024 alone, 88% of web application attacks involved the use of stolen credentials, according to Verizon’s 2025 Data Breach Investigations Report. Among these…
Read More