TechDay New Zealand - Aotearoa's technology news network

Credential abuse stories

Story image
Tidal Cyber maps out 2024's election cyber threats worldwide
Tue, 13th Feb 2024
#
ransomware
#
application security
#
advanced persistent threat protection
Tidal Cyber unveils a study revealing high-risk countries and top offenders for election cyber interference threats in 2024, spotlighting the methods used and potential defences.
Story image
Google Cloud's 2024 report highlights key cyber threats & defences
Mon, 12th Feb 2024
#
ransomware
#
public cloud
#
cloud security
Google Cloud's 2024 Threat Horizons Report identifies credential misuse, cryptomining, ransomware, and data theft as the key cloud-related threats, citing the need for stringent defensive strategies.
Story image
Okta set to acquire Spera Security in enhancement of identity threat detection
Sat, 30th Dec 2023
#
data analytics
#
hyperscale
#
public cloud
Identity security giant, Okta, gears up to acquire 2022-born Spera Security, set to boost its identity threat detection capabilities and enrich its customer base with advanced technology.
Story image
Delinea introduces MFA enforcement in its Secret Server offering
Thu, 28th Sep 2023
#
pam
#
iam
#
breach prevention
Delinea Secret Server introduces MFA enforcement at depth to meet increasingly stringent cyber insurance requirements.
Story image
Keeper Security introduces major password manager update for iOS
Wed, 13th Sep 2023
#
iam
#
cybersecurity
#
personal computing devices
The updates include performance boosts for large vaults, advanced search, accessibility and workflow improvements for iOS users.
Story image
In-house intelligence teams not fit-for-purpose – report
Tue, 11th Jul 2023
#
advanced persistent threat protection
#
data analytics
#
iam
Most in-house intelligence teams lack the in-country experience and access to quality intelligence necessary for avoiding costly and embarrassing mistakes.
Story image
Malicious HTML attachments a popular cyber threat: Barracuda
Fri, 5th May 2023
#
firewalls
#
malware
#
phishing
Barracuda Networks has highlighted how cybercriminals leverage HTML as an attack technique in phishing, credential theft, and malware delivery.
Story image
Darktrace notes health, retail and energy cyberattack trends
Fri, 13th Jan 2023
#
network security
#
firewalls
#
iam
The most observed 2022 cyber incident in Australia’s healthcare was suspicious network scan activity and multiple lateral movement model breaches in 2021.
Story image
Sophos report reveals stark reality of cybercrime-as-a-service
Wed, 23rd Nov 2022
#
malware
#
firewalls
#
ransomware
The report addresses how ransomware remains one of the greatest cyber crime threats to organisations with operators innovating their extortion tactics.
Story image
A third of cyberattacks in the cloud leverage credential access
Tue, 22nd Nov 2022
#
cloud security
#
iam
#
cybersecurity
A new report has revealed adversary success in identity theft indicates default cloud security controls are ineffective at preventing attacks.
Story image
Vectra Protect team finds Microsoft Teams vulnerability
Fri, 23rd Sep 2022
#
uc
#
phishing
#
email security
The Vectra Protect team identified a post-exploitation opportunity in August, allowing malicious actors to steal valid user credentials from Microsoft Teams.
Story image
Asia’s data privacy landscape is ‘coming of age’ – how can businesses cope?
Wed, 14th Sep 2022
#
email security
#
iam
#
breach prevention
Identity theft and online fraud are on the rise, but data protection laws are evolving to combat them. Here are three key steps to address data privacy.
Story image
What every CISO must answer to enable a best-in-class security operations program
Thu, 26th May 2022
#
data analytics
#
martech
#
planning
It has been widely reported recently that South Australian government employees have been the victims of a cyberattack.
Story image
How credentials became an attacker’s easiest target
Wed, 10th Nov 2021
#
iam
#
cybersecurity
#
micro-credentials
Even with education and phishing tests, users continue to hand over legitimate logins to attackers, who in turn exploit them with a high degree of success.
Story image
Lack of security controls continues to put organisations at risk
Fri, 5th Nov 2021
#
iam
#
cybersecurity
#
micro-credentials
Organisations still operate with limited visibility of user activity associated with web applications, despite the risk of insider threats and credential theft.
Story image
Countering the rise of credential-based attacks
Tue, 12th Oct 2021
#
iam
#
cybersecurity
#
micro-credentials
By implementing behavioural analytics and smart password practices, security teams can thwart credential-based attacks across the organisation.
Story image
Attivo Networks launches credential-cloaking tool to deter data thieves
Thu, 9th Sep 2021
#
iam
#
cybersecurity
#
micro-credentials
The tool is part of Attivo’s Endpoint Detection Net suite, and is aimed at enabling organisations to hide credentials from would-be attackers and their tools.
Story image
How a vantage point sees threats before they impact
Wed, 25th Nov 2020
#
casb
#
iam
#
cybersecurity
80% of data breaches involve compromised passwords, according to Verizon. Organisations must prioritize security measures. #CyberSecurity.
Story image
Thycotic rolls out SCIM Connector for expanded user access integration
Thu, 16th Jul 2020
#
pam
#
iam
#
cybersecurity
Thycotic announces general availability of SCIM Connector 2.0, allowing expanded integrations between identity providers and Secret Server.
Story image
Online users giving out social media details too freely - Kaspersky
Mon, 23rd Sep 2019
#
iam
#
awareness
#
kaspersky
Kaspersky's Global Privacy Report 2018 reveals that 39.2% of users trade private data for increased safety, with many freely sharing social media details.