What Are Push Attacks?
Organizations frequently implement multi-factor authentication (2FA, MFA) that uses push notification to protect their employees and customers. The process is simple: you type in your password, receive a notification that is “pushed” ...
Remote Work Pushes Brute-Force Attacks Higher
The widespread switch to work-from-home arrangements around the globe means employees are working offsite at unprecedented levels. It’s also prompted cybercriminals to find additional targets to exploit. We have heard for months ...
Roku: Credential Stuffing Attacks Affect 591,000 Accounts
Almost 600,000 Roku customers had their accounts hacked through two credential stuffing attacks several weeks apart, illustrating the ongoing risks to people who reuse passwords for multiple online accounts. The streaming service ...
How to prevent ransomware attacks
Proactive prevention is the best strategy against ransomware attacks. That’s why we compiled the best practices to prevent this malicious act ...
SCCM Exploitation: Account Compromise Through Automatic Client Push & AD System Discovery
Author: Marshall Price, Senior Security Consultant TL;DR: The following conditions can lead to compromise of the SCCM client push account […] ...
CISA, FBI Push Software Developers to Eliminate SQL Injection Flaws
The federal government is putting pressure on software makers to ensure that their products don’t include SQL injection vulnerabilities, a longtime and ongoing threat that was put in the spotlight with last ...
The First Ever Real-Time Defense Against Social Engineering Attacks
Appdome The First Ever Real-Time Defense Against Social Engineering Attacks This post will discuss Appdome’s new social engineering prevention solution. In an era where mobile applications have become an integral part of ...
Using Deterministic Security Controls To Stop Generative AI Attacks
Deepfake cyberattacks, phishing, and social engineering have all received a turbo boost in recent months due to the proliferation of easily accessed AI tools. Cybercriminals are some of the most creative individuals ...
Identity-Based Attacks Grow While Ransomware Declines: IBM X-Force
Cybercriminals increasingly are using stolen identities to compromise enterprise systems rather than trying to hack into them, a trend that promises to increase in the coming years, according to IBM’s X-Force threat ...
Modern Cyber Warfare: Crowdsourced DDoS Attacks
Over the past few years, politically motivated threat actors have increasingly gone online to find allies for their causes. While ten years ago most hactivism like this was anonymous, modern actors favoring ...