Nearly 10 billion stolen passwords were leaked on a hacker forum

Nearly 10 billion stolen passwords were leaked on a hacker forum

According to recent reports, nearly 10 billion stolen passwords were leaked onto a hacker forum. 9,948,575,739 unique, plaintext passwords were uploaded to the forum on July 4, 2024 with the file name rockyou2024.txt. It is believed that this compilation is building off of an earlier database of credentials, adding around 1.5 billion new passwords into the database.  With so many passwords exposed, individuals or organizations that frequently reuse passwords may be at risk. Chris Bates, CISO at…

Read More

Microsoft Says State-Sponsored Attackers Accessed Senior Leaders' Emails

Microsoft Says State-Sponsored Attackers Accessed Senior Leaders' Emails

Microsoft disclosed on Jan. 19 that a nation-state backed attack occurred beginning in November 2023 in which the Russian state-sponsored threat actor group Midnight Blizzard accessed some Microsoft corporate emails and documents through compromised email accounts. The attackers gained access in November 2023 using a legacy test tenant account. From there, they could use that account’s permissions to access a small number of Microsoft corporate email accounts – some of those accounts were for senior…

Read More

AI can crack your password

AI can crack your password

AI can crack your password | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

The growing multifactor authentication imperative

The growing multifactor authentication imperative

The growing multifactor authentication imperative | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses CookiesBy closing…

Read More

Financial sector has highest password reuse rate

Financial sector has highest password reuse rate

Financial sector has highest password reuse rate | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Mitigating security risks with an evolving workforce

Mitigating security risks with an evolving workforce

Mitigating security risks with an evolving workforce | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

LastPass breach affects Virginia Tech security posture

LastPass breach affects Virginia Tech security posture

LastPass breach affects Virginia Tech security posture | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This Website Uses…

Read More

Secrets in code make passwords vulnerable to hackers

Secrets in code make passwords vulnerable to hackers

<!– Secrets in code make passwords vulnerable to hackers | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More

Active directory cyber hygiene checklist: 11 steps to securing AD

Active directory cyber hygiene checklist: 11 steps to securing AD

Active directory cyber hygiene checklist: 11 steps to securing AD | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. …

Read More

Insurance digitalization spawns increase in identity fraud, report finds

Insurance digitalization spawns increase in identity fraud, report finds

Insurance digitalization spawns increase in identity fraud, report finds | Security Magazine This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more. This…

Read More
1 2