Home Search

brute force attacks - search results

If you're not happy with the results, please do another search
Brute-force attacks

Russia-based APT28 Linked to Mass Brute-force Attacks Against Cloud Networks

State-sponsored actors from Russia have a long history of cyberattacks across the world. There are numerous cyberespionage campaigns linked to Russian hackers. Recently, the...
paying ransom, Conti Ransomware Attacks

Conti Ransomware Attacks on Rise – CISA, FBI, NSA Issue Joint Alert

Increased use of Conti ransomware in more than 400 attacks on the U.S. and international organizations has been observed by the Cybersecurity and Infrastructure...
Common IoT Attacks

3 Common IoT Attacks that Compromise Security

The explosion of IoT technologies incited users and organizations to swiftly adopt IoT devices to enhance process control and boost productivity. The rise of...
Credential stuffing attacks

What are Credential Stuffing Attacks and How to Prevent Them

Thwarting cyberattacks has become highly complicated today. Unauthorized intrusions have seen a surge despite security measures implemented by internet users and corporates to safeguard...
Email Attacks

Email Threats Continue to be Gateway of Major Cyberattacks

Cyberattacks via unsolicited emails remain an effective attack vector as threat actors continue to evolve their phishing techniques. Adversaries are quick to adopt new...
User Verification Policy

Everything You Need to Know About Dictionary Attacks

Cybercriminals leverage several ways to illicitly obtain users’ login credentials and break into their systems. At the same time, poor password practices of users...
Misconfigured Cloud Storage Services Led to Over 200 Breaches in Past Two Years

Strengthen Your Cloud! CISA Warns Organizations Amid Rising Attacks

The Cybersecurity and Infrastructure Security Agency (CISA) has advised users and organizations to strengthen their cloud security configurations after detecting multiple attacks targeting cloud...
Vulnerabilities, risk-based vulnerability management

Old Unpatched Vulnerabilities Could Invoke Cyberattacks and Malware

The “new normal” business operations left most organizations vulnerable to new attack vectors. From database misconfigurations to unpatched vulnerabilities, organizations suffered several challenges in...
Password Protection, password spray attacks, Microsoft accounts passwords

Microsoft’s Shield Against Password Spray Attacks Just Went a Notch Higher

It is observed that threat actors popularly use the password spray attack, not because of its high success rate (as per Microsoft, only 1%...
PII for social engineering attacks

“AI has done a good job in securing the dynamic workforce”

EC-Council is conducting its 2020 Global CISO Forum virtual event, October 5 – 7. The Global CISO Forum (GCF) is an annual event that...