Search Results for: passwords Blog Post Even Fortune 500 Companies Are On the Wavelength of Poor Password Hygiene January 4, 2022 Even Fortune 500 companies do not use secure passwords when it is common knowledge that passwords are the first line... Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year... Blog Post Wardrivers Can Crack Wi-Fi Passwords In Alarming Experiment January 17, 2022 Recent research has ruled that an attacker equipped with a basic, affordable set of wardriver gears can enter almost three-quarters... Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a... Blog Post How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find... Blog Post Benefits and Drawbacks of Using LAPS in Active Directory February 22, 2021 What is LAPS in Active Directory? The term LAPS stands for Local Administrator Password Solution. LAPS acts as a password... Blog Post Unprecedented Amounts of Usernames and Passwords for Sale July 31, 2020 There has been a large increase of consumer credentials being sold on the dark web. A 300 percent increase in... Blog Post Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being... Knowledge Center LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former... Blog Post What Is Hash Function? What Is It Used For and Why Is It Important? February 5, 2021 In the world of information technology and cybersecurity the term “hash”, or “hash function” appears abundantly. Hundreds of hashing algorithms... Blog Post Growing requirement of Password Managers March 5, 2020 With a growing demand for Log-in feature before entering a website, has flooded people with user IDs and passwords. Be... Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers.... Knowledge Center Wi-Fi Network Penetration Testing with a Synopsis of Ontology to Enhance the Security March 2, 2022 Most use the internet to send messages or documents (data) from point (A) to point (B). This is mainly done... Blog Post Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The... Blog Post Do Not Use These 32 Passwords! November 7, 2019 A new research revealed the fact that spear-phishing and password re-use attacks are used by cybercriminals for accessing millions of...
Blog Post Even Fortune 500 Companies Are On the Wavelength of Poor Password Hygiene January 4, 2022 Even Fortune 500 companies do not use secure passwords when it is common knowledge that passwords are the first line...
Blog Post Why is Password Reuse One of The Weakest Points in Cybersecurity? October 14, 2021 The use of weak and stolen passwords has consistently been highlighted as the most prevalent hacking technique cybercriminals use year...
Blog Post Wardrivers Can Crack Wi-Fi Passwords In Alarming Experiment January 17, 2022 Recent research has ruled that an attacker equipped with a basic, affordable set of wardriver gears can enter almost three-quarters...
Blog Post Exchange/Outlook Autodiscover Bug Spills 100K+ Email Passwords October 20, 2021 A study conducted by Guardicore security researcher Amit Serper recently demonstrated the potential for large-scale credentials compromise owing to a...
Blog Post How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find...
Blog Post Benefits and Drawbacks of Using LAPS in Active Directory February 22, 2021 What is LAPS in Active Directory? The term LAPS stands for Local Administrator Password Solution. LAPS acts as a password...
Blog Post Unprecedented Amounts of Usernames and Passwords for Sale July 31, 2020 There has been a large increase of consumer credentials being sold on the dark web. A 300 percent increase in...
Blog Post Types of Password Attacks April 27, 2020 In the world of the internet, millions of User accounts are created every day and so are their passwords, being...
Knowledge Center LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former...
Blog Post What Is Hash Function? What Is It Used For and Why Is It Important? February 5, 2021 In the world of information technology and cybersecurity the term “hash”, or “hash function” appears abundantly. Hundreds of hashing algorithms...
Blog Post Growing requirement of Password Managers March 5, 2020 With a growing demand for Log-in feature before entering a website, has flooded people with user IDs and passwords. Be...
Blog Post WordPress Plugin Vulnerability Can Wipe Any Site Clean November 30, 2021 A new WordPress plugin vulnerability was identified in Hashthemes Demo Importer. Said plugin is a popular choice among web developers....
Knowledge Center Wi-Fi Network Penetration Testing with a Synopsis of Ontology to Enhance the Security March 2, 2022 Most use the internet to send messages or documents (data) from point (A) to point (B). This is mainly done...
Blog Post Verizon’s Visible Wireless Carrier Confirms Credential-Stuffing Attack November 23, 2021 In an official Reddit announcement made on October 13th, Visible confirmed that some of its user accounts were high-jacked. The...
Blog Post Do Not Use These 32 Passwords! November 7, 2019 A new research revealed the fact that spear-phishing and password re-use attacks are used by cybercriminals for accessing millions of...