by Royce | Aug 19, 2022 | Blog, Data Breach
Software used by I.T. departments at government agencies and large organizations was compromised and used to launch attacks against these organizations. Hackers had access to the very software their I.T. departments would use to manage assets and distribute software...
by Royce | Jun 16, 2022 | Blog, Dark Web, Data Breach, Password Leak
Continuous dark web monitoring helps combat against new credentials being leaked online. When your password is found on the dark web, hackers can attempt to use the credentials against other platforms in hopes that the victims use the same passwords in other places (a...
by Royce | Dec 11, 2021 | Blog, Data Breach, Ransomware
Millions of systems and applications around the world use a java library logging tool from Apache, known as Log4j, whose vulnerability is being used to compromise these computers and servers. It requires very little technical expertise to exploit and has potential to...
by Royce | Nov 24, 2021 | Blog, Data Breach, Password Leak
The popular hosting service has disclosed in a SEC filing that “unauthorized third party” infiltration was confirmed starting September 6th using STOLEN CREDENTIALS. With persistent access until November 17th. This led to unauthorized access to customer...
by Royce | Sep 22, 2021 | Blog, Dark Web, Data Breach, Password Leak, Ransomware
Passwords Sold for $1,000 on the Darkweb Result in Compromise at the UN! The United Nations suffered a significant breach that all began thanks to a password leaked to the darkweb and sold for just $1,000. Armed with valid user credentials, attackers were able to gain...
by Royce | Aug 31, 2021 | Blog, Credential Stuffing, Dark Web, Data Breach, Password Leak
A man received an unusual warning from someone through his webcam. Speaking to him was a security researcher from Canada informing him his commonly used credentials had been compromised and posted to the dark web. Putting him at high risk of a credential stuffing...