by Royce | Jun 5, 2023 | Blog, Data Breach, Ransomware
A popular file transfer tool has been compromised leaving its users at serious risk of attack and full blown compromise by Cl0p ransomware group. It’s critical that organizations audit their environments to determine if this tool has been used. And if so,...
by Royce | Jan 24, 2023 | Blog, Credential Stuffing, Dark Web, Data Breach, Password Leak
By using dark web monitoring services, you can help identify when your passwords have leaked online. If you use the same password for multiple websites and services, you risk falling victim to a credential stuffing attack. Which PayPal users need to be cognizant of...
by Royce | Dec 22, 2022 | Blog, Data Breach, Password Leak
Fortunately, the passwords were not stored in plain text. So the attackers only have encrypted passwords. However, they can attempt to use credential stuffing attacks against the password vaults. Read more about this severe data breach here:...
by Royce | Aug 19, 2022 | Blog, Data Breach
Software used by I.T. departments at government agencies and large organizations was compromised and used to launch attacks against these organizations. Hackers had access to the very software their I.T. departments would use to manage assets and distribute software...
by Royce | Jun 16, 2022 | Blog, Dark Web, Data Breach, Password Leak
Continuous dark web monitoring helps combat against new credentials being leaked online. When your password is found on the dark web, hackers can attempt to use the credentials against other platforms in hopes that the victims use the same passwords in other places (a...