Sunday, December 20, 2020
  • DEF CON 28 Safe Mode Blockchain Village – Peiyu Wang’s ‘Exploit Insecure Crypto Wallet’
  • Robert M. Lee’s & Jeff Haas’ Little Bobby Comics – ‘WEEK 308’
  • DEF CON 28 Safe Mode Hack The Seas Village – Grant Romundt’s ‘Hacking The SeaPod’
  • The Top 21 Security Predictions for 2021
  • CKS Certification Study Guide: System Hardening in Kubernetes

Security Boulevard

The Home of the Security Bloggers Network

Community Chats Webinars Library
  • Home
    • Cybersecurity News
    • Features
    • Industry Spotlight
    • News Releases
  • Security Bloggers Network
    • Latest Posts
    • Contributors
    • Syndicate Your Blog
    • Write for Security Boulevard
  • Webinars
    • Upcoming
    • On-Demand
  • Chat
    • Security Boulevard Chat
    • Marketing InSecurity Podcast
  • Library
  • Related Sites
    • MediaOps Inc.
    • DevOps.com
    • Container Journal
    • Digital Anarchist
    • SweetCode.io
  • Media Kit

  • Analytics
  • AppSec
  • CISO
  • Cloud
  • DevOps
  • GRC
  • Identity
  • Incident Response
  • IoT / ICS
  • Threats / Breaches
  • More
    • Blockchain / Digital Currencies
    • Careers
    • Cyberlaw
    • Mobile
    • Social Engineering
  • Humor

credential stuffing

Nintendo Confirms Additional 140,000 Accounts Compromised in April Data Breach

Nintendo Confirms Additional 140,000 Accounts Compromised in April Data Breach

Alina Bizga | June 10, 2020 | account takeover, credential stuffing, Data breach, Digital Privacy, Fraud, Industry News, nintendo, nintendo data breach, Security Incident
Yesterday, Nintendo released a new statement confirming that an additional 140,000 user accounts were exposed after the Nintendo Network ID (NNID) system was compromised in April 2020. Before confirmation of the security ...
HOTforSecurity

Zoom Hacked Accounts, North Korean Hackers, Facebook Senior Pictures

Tom Eston | April 20, 2020 | 0day, credential stuffing, Cybersecurity, Data breach, Data Privacy, DHS, DPRK, facebook, Hackers, Hacking, homeland security, North Korea, Podcast, Podcast Episodes, Privacy, Weekly Blaze Podcast, zero-day, Zoom
In episode 117 for April 20th 2020: More problems for Zoom with tens of thousands of compromised credentials and zero-day exploits, the $5 million dollar reward for information on North Korean hackers, ...
Shared Security Podcast
Data breach: U.S. retailer J.Crew reveals 2019 security incident to customers

Data breach: U.S. retailer J.Crew reveals 2019 security incident to customers

Alina Bizga | March 6, 2020 | credential stuffing, Data breach, Financial Data, Industry News, J.crew, passwords, Security Incident
J.Crew suffered a credential stuffing attack that may have compromised the personal data of customers, the U.S. clothing retailer disclosed earlier this week. Fraudulent activity was apparently noticed last spring, but the ...
HOTforSecurity
Loyalty program fraud targets 600,000 Tesco shopper accounts

Loyalty program fraud targets 600,000 Tesco shopper accounts

Alina Bizga | March 5, 2020 | credential stuffing, Fraud, Industry News, loyalty program, Security Incident, Tesco
U.K. supermarket giant Tesco has recently warned its loyalty program members of a security incident that may have affected over 600,000 Clubcard holders. “We are aware of some fraudulent activity around the ...
HOTforSecurity
FC Barcelona Twitter Account Hacked, Again, By the Same Group

FC Barcelona Twitter Account Hacked, Again, By the Same Group

Silviu STAHIE | February 19, 2020 | credential stuffing, FC Barcelona, Industry News, Ourmine, Twitter
The Twitter account of FC Barcelona has been hacked by the OurMine group, who had time enough to post sensitive information, seemingly taken from private messages. After OurMine took control of the ...
HOTforSecurity

The Password Reuse Problem, US Government IoT Recommendations, Smart Lock Security Disaster

Tom Eston | December 16, 2019 | credential stuffing, Cybersecurity, FBI, FTC, Holiday Shopping, Internet of things, iot, passwords, Podcast, Podcast Episodes, Privacy, Smart Lock, US government, Weekly Blaze Podcast
In episode 99: Password reuse is still a very large problem, US government recommendations for securing Internet of Things devices, and yet another smart lock device security disaster. ** Show notes and ...
Shared Security Podcast
Hacking Ring Security Cameras: Amazon Makes it Easy

Hacking Ring Security Cameras: Amazon Makes it Easy

Richi Jennings | December 13, 2019 | Cloud Security, credential stuffing, Cybersecurity, education, Information Security, Nest, Ring, SB Blogwatch, security, Security News
A bunch of childish script kiddies have been making the lives of Ring camera owners miserable ...
Security Boulevard

Disney+ Hacked Accounts, Black Friday Scams, Android Camera Exploits

Tom Eston | November 25, 2019 | android, black friday, credential stuffing, cyber monday, Cybersecurity, Disney, Hacking, passwords, Podcast, Podcast Episodes, Privacy, Samsung, Video Streaming, Weekly Blaze Podcast
In episode 96: Thousands of Disney+ accounts have been hacked, Black Friday and Cyber Monday scams to watch out for, and the latest on new Android camera exploits affecting Google and Samsung ...
Shared Security Podcast
fake news

Media Under Cyberattack: The Real Fake News Threat

Sue Poremba | September 24, 2019 | credential stuffing, Cybersecurity, fake news, Media, Trust
The term “fake news” is one that we hear often lately, a phrase uttered when someone doesn’t like or agree with media coverage. But fake news has a more sinister side, one ...
Security Boulevard

8 Ways to Mitigate Credential Stuffing

Enzoic | September 18, 2019 | account takeover, all posts, credential screening, credential stuffing
We all know that data breaches have leaked billions of user credentials (usernames and passwords) on the public internet and dark web. The 2018 Global Password Security Report shows an alarming 50% ...
Enzoic
Load more Loading...

TechStrong TV – Live

Watch latest episodes and shows
Featured Blog

Eric Kedrosky

The Future of Multi-Cloud Security: A Look Ahead at Intelligent Cloud Security Posture Management Solutions

Sonrai Security Marketing

Lessons From CIO Virtual Summit

Eric Kedrosky

Why Your Cloud Security Team Ignores Security Alerts

Subscribe to our Newsletters

Get breaking news, free eBooks and upcoming events delivered to your inbox.
  • View Security Boulevard Privacy Policy

Most Read on the Boulevard

3 Million Chrome Users Infected via Extensions—Here We Go Again
The SolarWinds Supply Chain Hack: What You Need to Know
AT&T Cybersecurity Survey Surfaces Lots of 5G Security Confusion
XDR Has Promise – and a Fair Share of Risks
Identity Verification: Protecting Customer Data Across Borders
2020 Data Breaches in Review
10 Ways to Protect Against DDoS Attacks
Cyber Attack Briefing: The SolarWinds Compromise is a Wake-up Call
SolarWinds, GitHub Leaks and Securing the Software Supply Chain
2 New RubyGems laced with cryptocurrency stealing malware taken down

Upcoming Webinars

Mon 21

6 AppSec Lessons from the SolarWinds and FireEye Breach

December 21 @ 1:00 pm - 2:00 pm
Jan 12

Role Based Access Controls (RBAC) for SSH and Kubernetes Access with Teleport

January 12, 2021 @ 3:00 pm - 4:00 pm
Jan 19

A New Year’s Ransomware Resolution

January 19, 2021 @ 1:00 pm - 2:00 pm
Jan 20

Vulnerability Discovery in the Cloud

January 20, 2021 @ 3:00 pm - 4:00 pm
Jan 28

Protecting Cloud-Native Apps and APIs in Kubernetes Environments

January 28, 2021 @ 1:00 pm - 2:00 pm

More Webinars

Download Free eBook

7 Must-Read eBooks for Security Professionals

Recent Security Boulevard Chats

  • Cloud, DevSecOps and Network Security, All Together?
  • Security-as-Code with Tim Jefferson, Barracuda Networks
  • ASRTM with Rohit Sethi, Security Compass
  • Deception: Art or Science, Ofer Israeli, Illusive Networks
  • Tips to Secure IoT and Connected Systems w/ DigiCert

Industry Spotlight

Manufacturers Take the Initiative in Home IoT Security
Cybersecurity Industry Spotlight IoT & ICS Security Security Boulevard (Original) 

Manufacturers Take the Initiative in Home IoT Security

December 18, 2020 Mike Nelson | 2 days ago 0
Identity Verification: Protecting Customer Data Across Borders
Cybersecurity Identity & Access Industry Spotlight Security Boulevard (Original) 

Identity Verification: Protecting Customer Data Across Borders

December 17, 2020 Christina Luttrell | 3 days ago 0
XDR Has Promise – and a Fair Share of Risks
Cybersecurity Industry Spotlight Network Security Security Boulevard (Original) 

XDR Has Promise – and a Fair Share of Risks

December 16, 2020 Sri Sundaralingam | 4 days ago 0

Top Stories

Bugcrowd Report Shows Marked Increase in Crowdsourced Security
Cybersecurity Featured IoT & ICS Security Malware News Security Boulevard (Original) Spotlight Vulnerabilities 

Bugcrowd Report Shows Marked Increase in Crowdsourced Security

December 18, 2020 George V. Hulme | 2 days ago 0
3 Million Chrome Users Infected via Extensions—Here We Go Again
Analytics & Intelligence Application Security Cloud Security Cybersecurity Endpoint Featured Malware News Security Boulevard (Original) Spotlight Threat Intelligence 

3 Million Chrome Users Infected via Extensions—Here We Go Again

December 17, 2020 Richi Jennings | 3 days ago 0
AT&T Cybersecurity Survey Surfaces Lots of 5G Security Confusion
Cybersecurity Featured Network Security News Security Boulevard (Original) Spotlight 

AT&T Cybersecurity Survey Surfaces Lots of 5G Security Confusion

December 16, 2020 Michael Vizard | 4 days ago 0

Join the Community

  • Add your blog to Security Bloggers Network
  • Write for Security Boulevard
  • Bloggers Meetup and Awards
  • Ask a Question
  • Email: info@securityboulevard.com

Useful Links

  • About
  • Media Kit
  • Sponsors Info
  • Copyright
  • TOS
  • Privacy Policy
  • DMCA Compliance Statement

Other Mediaops Sites

  • Container Journal
  • DevOps.com
  • DevOps Connect
  • DevOps Institute
Copyright © 2020 MediaOps Inc. All rights reserved.
Our website uses cookies. By continuing to browse the website you are agreeing to our use of cookies. For more information on how we use cookies and how you can disable them, please read our Privacy Policy.