Credential abuse stories
![Story image](../../../../../uploads/story/2024/02/12/preview_img-WzDc3wJiBeYvcPkLS7mHliOs.webp)
Tidal Cyber maps out 2024's election cyber threats worldwide
Tue, 13th Feb 2024
#
ransomware
#
application security
#
advanced persistent threat protection
Tidal Cyber unveils a study revealing high-risk countries and top offenders for election cyber interference threats in 2024, spotlighting the methods used and potential defences.
![Story image](../../../../../uploads/story/2024/02/12/preview_img-VjJJf2UJ6Kq3UNIPDWwgL99p.webp)
Google Cloud's 2024 report highlights key cyber threats & defences
Mon, 12th Feb 2024
#
ransomware
#
public cloud
#
cloud security
Google Cloud's 2024 Threat Horizons Report identifies credential misuse, cryptomining, ransomware, and data theft as the key cloud-related threats, citing the need for stringent defensive strategies.
![Story image](../../../../../uploads/story/2023/12/30/preview_img-0y7IisdjL0hv01MTK6pq09At.webp)
Okta set to acquire Spera Security in enhancement of identity threat detection
Sat, 30th Dec 2023
#
data analytics
#
hyperscale
#
public cloud
Identity security giant, Okta, gears up to acquire 2022-born Spera Security, set to boost its identity threat detection capabilities and enrich its customer base with advanced technology.
![Story image](../../../../../uploads/story/2023/09/28/preview_GettyImages-1421141229.webp)
Delinea introduces MFA enforcement in its Secret Server offering
Thu, 28th Sep 2023
#
pam
#
iam
#
breach prevention
Delinea Secret Server introduces MFA enforcement at depth to meet increasingly stringent cyber insurance requirements.
![Story image](../../../../../uploads/story/2023/09/13/preview_GettyImages-1279388417.webp)
Keeper Security introduces major password manager update for iOS
Wed, 13th Sep 2023
#
iam
#
cybersecurity
#
personal computing devices
The updates include performance boosts for large vaults, advanced search, accessibility and workflow improvements for iOS users.
![Story image](../../../../../uploads/story/2023/07/11/preview_GettyImages-1132789081.webp)
In-house intelligence teams not fit-for-purpose – report
Tue, 11th Jul 2023
#
advanced persistent threat protection
#
data analytics
#
iam
Most in-house intelligence teams lack the in-country experience and access to quality intelligence necessary for avoiding costly and embarrassing mistakes.
![Story image](../../../../../uploads/story/2023/05/05/preview_GettyImages-1322517295.webp)
Malicious HTML attachments a popular cyber threat: Barracuda
Fri, 5th May 2023
#
firewalls
#
malware
#
phishing
Barracuda Networks has highlighted how cybercriminals leverage HTML as an attack technique in phishing, credential theft, and malware delivery.
![Story image](../../../../../uploads/story/2023/01/13/preview_GettyImages-637950732.webp)
Darktrace notes health, retail and energy cyberattack trends
Fri, 13th Jan 2023
#
network security
#
firewalls
#
iam
The most observed 2022 cyber incident in Australia’s healthcare was suspicious network scan activity and multiple lateral movement model breaches in 2021.
![Story image](../../../../../uploads/story/2022/11/23/preview_GettyImages-1336414521.webp)
Sophos report reveals stark reality of cybercrime-as-a-service
Wed, 23rd Nov 2022
#
malware
#
firewalls
#
ransomware
The report addresses how ransomware remains one of the greatest cyber crime threats to organisations with operators innovating their extortion tactics.
![Story image](../../../../../uploads/story/2022/11/22/preview_GettyImages-1388013584__3_.webp)
A third of cyberattacks in the cloud leverage credential access
Tue, 22nd Nov 2022
#
cloud security
#
iam
#
cybersecurity
A new report has revealed adversary success in identity theft indicates default cloud security controls are ineffective at preventing attacks.
![Story image](../../../../../uploads/story/2022/09/23/preview_GettyImages-1279388417__1_.webp)
Vectra Protect team finds Microsoft Teams vulnerability
Fri, 23rd Sep 2022
#
uc
#
phishing
#
email security
The Vectra Protect team identified a post-exploitation opportunity in August, allowing malicious actors to steal valid user credentials from Microsoft Teams.
![Story image](../../../../../uploads/story/2022/09/14/preview_Anna-Russell_Micro-Focus-300x300.webp)
Asia’s data privacy landscape is ‘coming of age’ – how can businesses cope?
Wed, 14th Sep 2022
#
email security
#
iam
#
breach prevention
Identity theft and online fraud are on the rise, but data protection laws are evolving to combat them. Here are three key steps to address data privacy.
![Story image](../../../../../uploads/story/2022/05/26/preview_GettyImages-1320155542__1_.webp)
What every CISO must answer to enable a best-in-class security operations program
Thu, 26th May 2022
#
data analytics
#
martech
#
planning
It has been widely reported recently that South Australian government employees have been the victims of a cyberattack.
![Story image](../../../../../uploads/story/2021/11/09/preview_attivooo.webp)
How credentials became an attacker’s easiest target
Wed, 10th Nov 2021
#
iam
#
cybersecurity
#
micro-credentials
Even with education and phishing tests, users continue to hand over legitimate logins to attackers, who in turn exploit them with a high degree of success.
![Story image](../../../../../uploads/story/2021/11/05/preview_GettyImages-1065824694__2_.webp)
Lack of security controls continues to put organisations at risk
Fri, 5th Nov 2021
#
iam
#
cybersecurity
#
micro-credentials
Organisations still operate with limited visibility of user activity associated with web applications, despite the risk of insider threats and credential theft.
![Story image](../../../../../uploads/story/2021/10/11/preview_GettyImages-1303145712.webp)
Countering the rise of credential-based attacks
Tue, 12th Oct 2021
#
iam
#
cybersecurity
#
micro-credentials
By implementing behavioural analytics and smart password practices, security teams can thwart credential-based attacks across the organisation.
![Story image](../../../../../uploads/story/2021/09/09/preview_GettyImages-1058694620.webp)
Attivo Networks launches credential-cloaking tool to deter data thieves
Thu, 9th Sep 2021
#
iam
#
cybersecurity
#
micro-credentials
The tool is part of Attivo’s Endpoint Detection Net suite, and is aimed at enabling organisations to hide credentials from would-be attackers and their tools.
![Story image](../../../../../uploads/story/2020/11/24/preview_identity_and_access_management3.webp)
How a vantage point sees threats before they impact
Wed, 25th Nov 2020
#
casb
#
iam
#
cybersecurity
80% of data breaches involve compromised passwords, according to Verizon. Organisations must prioritize security measures. #CyberSecurity.
![Story image](../../../../../uploads/story/2020/07/16/preview_GettyImages-1145361636.webp)
Thycotic rolls out SCIM Connector for expanded user access integration
Thu, 16th Jul 2020
#
pam
#
iam
#
cybersecurity
Thycotic announces general availability of SCIM Connector 2.0, allowing expanded integrations between identity providers and Secret Server.
![Story image](../../../../../uploads/story/2019/09/23/preview_password3.webp)
Online users giving out social media details too freely - Kaspersky
Mon, 23rd Sep 2019
#
iam
#
awareness
#
kaspersky
Kaspersky's Global Privacy Report 2018 reveals that 39.2% of users trade private data for increased safety, with many freely sharing social media details.