Sunday, February 17, 2019
  • Google +
  • Linkedin
  • Twitter
  • Email
  • Where I work
  • Advertise here
  • Free SIEM solution

Security Newsfeeds

Cyber Security Newsfeeds from around the world

  • Home
  • Hacktivism
  • Strategic Threats
  • Cyber Crime
  • Security Blogs
  • Economic Threats
  • Free Security Analytics

Category: Passwords

With ⅓ of Enterprises Suffering from Weak or Exposed Passwords, Is Hollywood Part of the Problem?

January 18, 2019 Auto Bot

What password would you use for a bank account soon to be worth $120 million?

Continue Reading

Enterprises continue to suffer from poor password hygiene and a lack of visibility & control over privileged users

December 19, 2018 Auto Bot

It has been more than a year since I last shared Preempt Inspector statistics. Last time we shared Preempt Inspector statistics we found some alarming numbers. With the end of 2018 approaching, I would like to share with you key findings fr…

Continue Reading

Is Your Organization at Risk Because a Local Administrator Has a Weak Password?

December 18, 2018 Auto Bot

In July, media reported that SingHealth, Singapore’s largest health organization, was breached with 1.5 million medical records stolen. The stolen records included those of Singapore’s prime minister Lee Hsien Loong. Consequently, a special…

Continue Reading

Simplifying PCI DSS 3.2 Compliance with Preempt

February 9, 2018 Auto Bot

If your organization handles credit cards, you are no doubt familiar with  Payment Card Industry Data Security Standard (PCI DSS) compliance. PCI DSS is a set of requirements and procedures that have been established in order to streng…

Continue Reading

Fixing Account Lockouts With Adaptive Policies

January 4, 2018 Auto Bot

Dealing with account lockouts is one of the unhappy facts of life for many IT teams. And while  resolving lockouts isn’t particularly difficult, it is the sheer volume of incidents that often weighs down IT teams. In fact a recent surv…

Continue Reading

Study Finds Employee Security Habits Reveal Risky Imbalance

November 16, 2017 Auto Bot

Human nature motivates us to enhance productivity, make things easy, find workarounds and to crave information that is being kept from us. How do these motivations change the way people work? Do their actions put their company at risk? Do I…

Continue Reading

Preempt Inspector Discovers Stealthy Admins to Help Organizations Reduce Risk

November 10, 2017 Auto Bot

This past March we announced Preempt Inspector, a free app for password strength assessment. The App provided administrators with a better understanding of their AD configuration, especially difficult to estimate parameters, such as duplica…

Continue Reading

Defending Against Credential Compromise (VIDEO)

September 29, 2017 Auto Bot

Credential Compromise has been a leading attack vector for the last five years. There are a variety of ways that attackers can do this. It could be by guessing passwords, phishing emails, spyware,  or even pulling credentials out of me…

Continue Reading

Password Policy Gets a Reset

September 22, 2017 Auto Bot

In a recent blog, we discussed how attackers typically follow the path of least resistance. In enterprises, this almost always involves seeking out weak passwords. Data from Verizon’s Data Breach investigation Report certainly bears this ou…

Continue Reading

Recent Articles

  • Bomber, handlers used peer-to-peer service? February 17, 2019
  • UK concludes it can mitigate risk from Huawei equipment use in 5G: FT February 17, 2019
  • China, US head for cybersecurity showdown in Europe – Business Day February 17, 2019
  • Pakistan Army, Foreign Ministry Websites Hacked; Neighbour Blames India for Cyber Attack – News18 February 17, 2019
  • Cross-site Scripting (XSS) in mobius1-selectr (npm) with medium severity https://snyk.io/vuln/SNYK-JS-MOBIUS1SELECTR-173698 February 17, 2019
  • Cross-site Scripting (XSS) in bootstrap (npm) with medium severity https://snyk.io/vuln/SNYK-JS-BOOTSTRAP-173700 February 17, 2019
  • NSO founders sell low then buy high – Globes February 17, 2019
  • End-of-year recap: 2018’s top stories around global espionage – ITProPortal February 17, 2019
  • JPMorgan’s Cryptocurrency JPM Coin Is Not A Cryptocurrency February 17, 2019
  • Vigil@nce – Node.js cordova-plugin-ionic-webview: directory traversal, analyzed on 17/12/2018 February 17, 2019

About This Site

This site is provided free, as is, without support and without ads. It is useful for Security teams who need to keep up to date with Infosec news. Information is automatically fetched and there is no guarantee of accuracy on any content on this site.

Ken Gilmour | Theme: News Portal by Mystery Themes.