Beth Grayson author photo

Beth Grayson

Beth is a cybersecurity writer based in the UK, with 3+ years’ experience writing about B2B and technology topics.

Articles written by Beth Grayson

  • HMRC phishing attack: How stolen credentials enabled tax fraud

    His Majesty’s Revenue and Customs (HMRC) recently announced that it has been hit by a sophisticated phishing scam, which resulted in the theft of approximately £47 million ($63.76 million) from over 100,000 taxpayer accounts. The attack took place in 2024,…

    Read More
  • Image of a padlock on a computer keyboard

    Password encryption: What is it and how does it work?

    As companies rapidly shift towards cloud-based environments, employees find themselves juggling multiple accounts across a variety of platforms, each one most likely safeguarded by a password. These digital keys are often the first (and sometimes only) line of defense against…

    Read More
  • Image of login page

    Credential harvesting: How it works & tips for prevention

    Credential harvesting represents a serious threat to organizations of all kinds – particularly in today’s digital landscape, where virtually every enterprise depends on user credentials for access and security.   According to IBM’s 2025 Threat Intelligence Index, nearly a third (30%)…

    Read More
  • ransomware attacker with hood

    Password mask attacks explained: What are they & how do they work?

    Credential-based attacks remain one of the most effective techniques used by cybercriminals to breach enterprise networks. In 2024 alone, 88% of web application attacks involved the use of stolen credentials, according to Verizon’s 2025 Data Breach Investigations Report. Among these…

    Read More