Search Results for: user password Blog Post How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find... Blog Post PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services... Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country.... Blog Post Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a... Blog Post Robinhood Experienced Massive Data Breach Stealing Millions of Customer Names December 3, 2021 More than five million user email addresses and two million customer names were stolen as trading platform Robinhood experienced a... Blog Post Preventive Security Controls November 18, 2020 In IT security, there are certain controls that one has to implement to maintain a certain security level, react to... Knowledge Center LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former... Knowledge Center Windows 10 Hardening-Non-Enterprise Environment February 25, 2020 A security guide on how to secure Windows 10 for non-enterprise environment. Hardening is performed using mostly native Windows tools... Blog Post Hacker Exposes High-Security Bug to PayPal January 17, 2020 Alex Birsan, a security researcher, found a high-security bug on PayPal’s login page, where users’ password information can get... Blog Post SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled... Blog Post Americans Fail Basic Cybersecurity Questionnaire October 10, 2019 Most Americans don’t know the basics of cybersecurity and privacy. In a study conducted by Pew Research Center, it was... Blog Post Security Through Obscurity November 13, 2020 Keeping an organization’s systems secure is the primary objective of its security team. Security teams implement various measures to achieve... Blog Post 29,000 U.S. Facebook Employees’ Payroll Info Was Compromised December 24, 2019 On November 17, Facebook Inc.’s finance officer’s car was robbed by breaking the car window. Several hard drives that contain... Blog Post Facebook Stored Passwords in Plaintext for Years March 23, 2019 The social media giant, Facebook, stated in a blog post Thursday notifying users that they kept passwords stored in plaintext... Blog Post Safe Browsing on Social Media March 31, 2020 Social Networking has become the heart and soul of today’s lifestyle. In this era of digitization and social community followers,...
Blog Post How To Lower The Risks Of Privileged Users Compromise? December 16, 2020 Whenever an attacker compromises an appliance, one of his first steps is to collect all the credentials he can find...
Blog Post PowerShell Remoting and WMI risks July 13, 2021 What is PowerShell Remoting? PowerShell Remoting uses Windows Remote Management (WinRM), which is the Microsoft implementation of the Web Services...
Blog Post Department of Interior Penetration Test October 2, 2020 IT systems of the governmental institutions are vital elements required to maintain smooth operations of a state or a country....
Blog Post Top Techniques Used by Attackers to Bypass MFA August 25, 2021 Many consider MFA (multi-factor authentication) as one of the critical security defenses against malicious cyberattacks, and rightly so. Even a...
Blog Post Robinhood Experienced Massive Data Breach Stealing Millions of Customer Names December 3, 2021 More than five million user email addresses and two million customer names were stolen as trading platform Robinhood experienced a...
Blog Post Preventive Security Controls November 18, 2020 In IT security, there are certain controls that one has to implement to maintain a certain security level, react to...
Knowledge Center LIFARS Password Cracking Case Study March 18, 2020 For this case study we extract used plaintext passwords from more than 1,500,000 cracked active directory hashes from LIFARS’ former...
Knowledge Center Windows 10 Hardening-Non-Enterprise Environment February 25, 2020 A security guide on how to secure Windows 10 for non-enterprise environment. Hardening is performed using mostly native Windows tools...
Blog Post Hacker Exposes High-Security Bug to PayPal January 17, 2020 Alex Birsan, a security researcher, found a high-security bug on PayPal’s login page, where users’ password information can get...
Blog Post SQLMAP – Authenticate via NTLM under Windows March 19, 2020 Sqlmap is a powerful open-source tool for automating the process of detecting and exploiting SQL injection flaws. It comes preinstalled...
Blog Post Americans Fail Basic Cybersecurity Questionnaire October 10, 2019 Most Americans don’t know the basics of cybersecurity and privacy. In a study conducted by Pew Research Center, it was...
Blog Post Security Through Obscurity November 13, 2020 Keeping an organization’s systems secure is the primary objective of its security team. Security teams implement various measures to achieve...
Blog Post 29,000 U.S. Facebook Employees’ Payroll Info Was Compromised December 24, 2019 On November 17, Facebook Inc.’s finance officer’s car was robbed by breaking the car window. Several hard drives that contain...
Blog Post Facebook Stored Passwords in Plaintext for Years March 23, 2019 The social media giant, Facebook, stated in a blog post Thursday notifying users that they kept passwords stored in plaintext...
Blog Post Safe Browsing on Social Media March 31, 2020 Social Networking has become the heart and soul of today’s lifestyle. In this era of digitization and social community followers,...