SecurityBrief Asia - Technology news for CISOs & cybersecurity decision-makers

Credential abuse stories

Story image
Delinea introduces MFA enforcement in its Secret Server offering
Last week
#
pam
#
cybersecurity
#
breach prevention
Delinea Secret Server introduces MFA enforcement at depth to meet increasingly stringent cyber insurance requirements.
Story image
Keeper Security introduces major password manager update for iOS
Last month
#
cybersecurity
#
software update
#
ios
The updates include performance boosts for large vaults, advanced search, accessibility and workflow improvements for iOS users.
Story image
In-house intelligence teams not fit-for-purpose – report
Tue, 11th Jul 2023
#
bi
#
cyber threats
#
credential abuse
Most in-house intelligence teams lack the in-country experience and access to quality intelligence necessary for avoiding costly and embarrassing mistakes. 
Story image
Malicious HTML attachments a popular cyber threat: Barracuda
Fri, 5th May 2023
#
malware
#
phishing
#
cybersecurity
Barracuda Networks has highlighted how cybercriminals leverage HTML as an attack technique in phishing, credential theft, and malware delivery.
Story image
Darktrace notes health, retail and energy cyberattack trends
Fri, 13th Jan 2023
#
network security
#
cybersecurity
#
it in healthcare
The most observed 2022 cyber incident in Australia’s healthcare was suspicious network scan activity and multiple lateral movement model breaches in 2021.
Story image
Sophos report reveals stark reality of cybercrime-as-a-service
Wed, 23rd Nov 2022
#
malware
#
ransomware
#
cybersecurity
The report addresses how ransomware remains one of the greatest cyber crime threats to organisations with operators innovating their extortion tactics.
Story image
A third of cyberattacks in the cloud leverage credential access
Tue, 22nd Nov 2022
#
cloud security
#
cybersecurity
#
credential abuse
A new report has revealed adversary success in identity theft indicates default cloud security controls are ineffective at preventing attacks.
Story image
Vectra Protect team finds Microsoft Teams vulnerability
Fri, 23rd Sep 2022
#
uc
#
microsoft
#
phishing
The Vectra Protect team identified a post-exploitation opportunity in August, allowing malicious actors to steal valid user credentials from Microsoft Teams.
Story image
Asia’s data privacy landscape is ‘coming of age’ – how can businesses cope?
Wed, 14th Sep 2022
#
cybersecurity
#
breach prevention
#
data breach
Identity theft and online fraud are becoming more prevalent than ever. A recent IBM study revealed that stolen or compromised credentials were responsible for 19% of data breaches this year.
Story image
What every CISO must answer to enable a best-in-class security operations program
Thu, 26th May 2022
#
bi
#
big data
#
data analytics
It has been widely reported recently that South Australian government employees have been the victims of a cyberattack.
Story image
How credentials became an attacker’s easiest target
Wed, 10th Nov 2021
#
cybersecurity
#
cybersafety
#
digital credentials
Even with education and phishing tests, users continue to hand over legitimate logins to attackers, who in turn exploit them with a high degree of success.
Story image
Lack of security controls continues to put organisations at risk
Fri, 5th Nov 2021
#
cybersecurity
#
cyberark
#
insider threats
Organisations still operate with limited visibility of user activity associated with web applications, despite the risk of insider threats and credential theft.
Story image
Countering the rise of credential-based attacks
Tue, 12th Oct 2021
#
cybersecurity
#
cybersafety
#
digital credentials
By implementing behavioural analytics and smart password practices, security teams can thwart credential-based attacks across the organisation.
Story image
Attivo Networks launches credential-cloaking tool to deter data thieves
Thu, 9th Sep 2021
#
cybersecurity
#
cybersafety
#
digital credentials
The tool is part of Attivo’s Endpoint Detection Net suite, and is aimed at enabling organisations to hide credentials from would-be attackers and their tools.
Story image
How a vantage point sees threats before they impact
Wed, 25th Nov 2020
#
cybersecurity
#
casb
#
cybersafety
When the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons.
Story image
Thycotic rolls out SCIM Connector for expanded user access integration
Thu, 16th Jul 2020
#
pam
#
cybersecurity
#
thycotic
SCIM Connector 2.0 allows organisations to set up workflows to synchronise, provision or modify entitlements in Secret Server directly within their IGA platform. 
Story image
Online users giving out social media details too freely - Kaspersky
Mon, 23rd Sep 2019
#
social media
#
kaspersky
#
awareness
The survey revealed that online users in Asia Pacific appear to be willing to share their private information in exchange for various personal gains from social media.
Story image
Gaming industry a rising target of cyber-attacks – Akamai
Fri, 26th Jul 2019
#
gaming
#
cybersecurity
#
technology gifts
“Gamers are a niche demographic known for spending money, so their financial status is also a tempting target.”
Story image
CERT NZ report: Unauthorised account access a growing problem
Wed, 10th Jul 2019
#
phishing
#
cybersecurity
#
email security
New Zealanders reported direct financial losses of $1.7 million. While that is still a substantial loss, the figure is a 71% drop from the previous quarter.
Story image
Cyber criminals targeting the gaming industry at an alarming rate
Fri, 14th Jun 2019
#
gaming
#
technology gifts
#
hackers
New research from Akamai shows the gaming community is quickly becoming one of the most highly targeted industries for cyber attacks, with hackers largely driven by gaining consumer credentials.
Story image
SIM swapping: What is it and should you be worried?
Mon, 29th Apr 2019
#
contact centre
#
cybersecurity
#
iam
Due to the growing reliance on mobile phones, SIM swapping is increasingly targeted as a way to take over a victim’s online accounts.
Story image
Google's new Chrome feature warns about compromised logins
Fri, 8th Feb 2019
#
cybersecurity
#
google
#
chrome
This week Google released extra measures in a bid to provide better security for its users’ data.
Story image
Expert comment: What the Collection #2-5 data dump means for credential abuse
Mon, 4th Feb 2019
#
phishing
#
email security
#
dlp
TechDay spoke to experts and executives in the security industry about the data leak and the implications on phishing and credential stuffing.
Story image
Massive 2.2bil-username data dump leaked on dark web
Fri, 1st Feb 2019
#
dark web
#
mfa
#
data leak
This makes the second leak three times bigger than the Collection #1 dump leaked last month.
© 2023 TechDay, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.