searchtwitterarrow rightmail strokearrow leftmail solidfacebooklinkedinplusangle upmagazine plus
Help Net Security - Daily information security news with a focus on enterprise security.
  • News
  • Features
  • Expert analysis
  • Videos
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Product showcase
  • Newsletters
  • (IN)SECURE Magazine

credentials

Get our top stories in your inbox

Cybercriminals are testing exposed credentials for future account takeover attacks

November 7, 2019

Fraud increased 30% overall in Q3 2019 and bot-driven account registration fraud is up 70% as cybercriminals test stolen credentials in advance of the holiday retail season, …

Impact and prevalence of cyberattacks that use stolen hashed administrator credentials

October 10, 2019

There’s a significant prevalence and impact of cyberattacks that use stolen hashed administrator credentials, also referred to as Pass the Hash (PtH) attacks, within …

94% of attacks hitting financial services use one of four methods

August 1, 2019

Newly released data from Akamai’s 2019 State of the Internet / Security Financial Services Attack Economy Report has found that 50% of all unique organizations impacted by …

Employees overestimate the efficacy of their workplace’s email security strategy

July 25, 2019

22 percent of businesses have experienced a data breach – defined as loss of confidential data or credentials, compromised account loss, or fraudulent financial transactions – …

4 years after data breach, Slack resets 100,000 users’ passwords

July 19, 2019

Roughly 100,000 Slack users are getting their password reset and will have to choose a new one. The reason? During the data breach the company suffered in 2015, the attackers …

Mobile ID schemes take the lead over digital identity cards

July 19, 2019

The number of people using government-issued digital identity credentials will grow by over 150% from an expected 1.7 billion in 2019 to over 5 billion in 2024, according to …

Insider attacks still far more difficult to detect and prevent than external cyber attacks

July 8, 2019

A recent survey conducted by Gurucul of more than 320 IT security experts, found that 15 percent of people said they would delete files or change passwords upon exiting a …

Cybercriminals leverage malicious Office docs, Mac malware, web app exploits

June 26, 2019

There’s been a 62% increase in overall malware detections in Q1 2019 compared to the previous quarter. A new WatchGuard report also found that cybercriminals are …

Insecure password memory aids: A passwordless future could be the solution

June 19, 2019

There is a readiness for passwordless security methods such as biometrics, with 70% workers believing biometrics would benefit the workplace, according to Okta. The …

The gaming community is a rising target for credential stuffing attacks

June 14, 2019

Hackers have targeted the gaming industry by carrying out 12 billion credential stuffing attacks against gaming websites within the 17-month period analyzed in the report …

Significant trends are beginning to develop in the Government ID market

June 14, 2019

The worldwide installed base of both smart and legacy credentials will grow from 9.8 billion in 2018 to 11.5 billion in 2023, according to ABI Research. With increased rates …

3 months, 1900 reported breaches, 1.9 billion records exposed

May 9, 2019

There were 1,903 publicly disclosed data compromise events in the first three months of the year, exposing over 1.9 billion records, according to Risk Based Security. No other …

Posts navigation

1 … 4 5 6 7 8 9 10 11

Featured news

  • How a cyber asset management strategy can help enterprises detect threats
  • Applying Shift Left principles to third party risk management
  • Malicious activities insiders perform in enterprise applications
CISA and NPower offer free entry-level cybersecurity training

What's new

NIST selects 4 quantum-resistant encryption algorithms

The connected nature of smart factories is exponentially increasing the risk of cyber attacks

CISA and NPower offer free entry-level cybersecurity training

Why your API gateway is not enough for API security?

Don't miss

CISA and NPower offer free entry-level cybersecurity training

NIST selects 4 quantum-resistant encryption algorithms

How a cyber asset management strategy can help enterprises detect threats

Why your API gateway is not enough for API security?

Attackers are using deepfakes to snag remote IT jobs

Help Net Security - Daily information security news with a focus on enterprise security.
Follow us
  • Features
  • News
  • Expert Analysis
  • Reviews
  • Events
  • Reports
  • Whitepapers
  • Industry news
  • Newsletters
  • Product showcase
  • Twitter

In case you’ve missed it

  • CISA and NPower offer free entry-level cybersecurity training
  • Attackers are using deepfakes to snag remote IT jobs
  • OT security: Helping under-resourced critical infrastructure organizations
  • How to keep your NFTs safe from scammers

(IN)SECURE Magazine ISSUE 71.5 (June 2022)

Several of the most pressing topics discussed during this year’s Conference included issues surrounding privacy and surveillance, the positive and negative impacts of machine learning and artificial intelligence, the nuances of risk and policy, and more.

Read online
© Copyright 1998-2022 by Help Net Security
Read our privacy policy | About us | Advertise