credentials
European Cyber Units Dismantle InfinityBlack Hacking Group in Poland
InfinityBlack, a hacking group based in Poland and Switzerland, was taken down by Polish and Swiss law enforcement after the arrest of five alleged active members. InfinityBlack has a very specific operating ...
The Linux Foundation Takes on Digital Trust With ToIP Foundation
The Linux Foundation announced it will host the Trust over IP (ToIP) Foundation, an independent project to enable trustworthy exchange and verification of data between any two parties on the internet in ...
Zoom Phishing Campaign Tricks People into Revealing Login Credentials
A new Zoom phishing campaign preys on people’s fears related to job security, tricking them into revealing credentials that criminals can abuse in a variety of ways. The practice of Zoom-bombing is ...
Emotet Malware Causes Physical Damage
Microsoft is reporting that an Emotet malware infection shut down a network by causing computers to overheat and then crash. The Emotet payload was delivered and executed on the systems of Fabrikam ...
Why Most Are Leaving LDAP With WPA2-Enterprise Behind
For years, the credential-based network authentication standard was the Lightweight Directory Access Protocol (LDAP). The security and efficiency offered by LDAP provided the necessary protection levels for everyday WPA2-Enterprise operations. But as ...
Stronger Multi-Factor Authentication With Certificates
It’s widely held knowledge that using a single factor for authentication to wireless networks is less than secure and easily exploited by hackers. Many organizations recognize this and utilize Multi-Factor Authentication (MFA) ...
Extracting Kerberos Credentials from PCAP
NetworkMiner is one of the best tools around for extracting credentials, such as usernames and passwords, from PCAP files. The credential extraction feature is primarily designed for defenders, in order to analyze ...
Spear Phishing 101: What It Is and How to Stop It
Spear phishing: It’s a term we hear a great deal when it comes to cybersecurity—or rather, lack thereof. But what is it, really? And why has it been so successful? The majority ...
Addressing Theft Threats From All Angles
The post Addressing Theft Threats From All Angles appeared first on SecureW2 ...
How To Trust Your Cybersecurity
The post How To Trust Your Cybersecurity appeared first on SecureW2 ...
