Topic: credential abuse

  • Stop These Common Security Breaches Before They Hit You

    Stop These Common Security Breaches Before They Hit You

    The most significant threats to organizational security come from three common methods: stolen credentials, phishing, and unpatched software vulnerabilities, which exploit human behavior and operational gaps. Stolen credentials are increasingly prevalent, with a 160% surge in leaks, and employees...

    Read More »
  • Identity: The Leading Cloud Security Threat

    Identity: The Leading Cloud Security Threat

    Identity-related weaknesses and outdated vulnerabilities are the main causes of the rise in cloud security incidents, with attackers exploiting these gaps to access sensitive systems and data. Excessive permissions and over-privileged cloud identities, affecting 99% of cases, allow attackers to m...

    Read More »
  • Industrial Ransomware Attacks Surge: A Critical Threat

    Industrial Ransomware Attacks Surge: A Critical Threat

    Ransomware groups are increasingly targeting industrial infrastructure, exploiting weaknesses in operational technology (OT) to disrupt physical processes in sectors like manufacturing, energy, and transportation. Attackers commonly gain initial access by abusing legitimate credentials through re...

    Read More »
  • AI Security Risks Demand Budget Priority Now

    AI Security Risks Demand Budget Priority Now

    The rapid integration of AI with sensitive business data is creating a unique and urgent need for dedicated security strategies and funding, moving beyond general cybersecurity budgets. Cloud platforms are the most frequent target for attacks, with risks exacerbated by credential theft, inconsist...

    Read More »
  • Neon Cyber Launches Workforce Cybersecurity Platform

    Neon Cyber Launches Workforce Cybersecurity Platform

    Neon Cyber has launched the industry's first Workforce Cybersecurity Platform (WCP), focusing on human-centric threats like phishing and credential misuse to protect users across browsers, SaaS, and enterprise systems. The platform offers AI-driven phishing protection, visibility into shadow IT, ...

    Read More »
  • ManageEngine Boosts Identity Threat Protection

    ManageEngine Boosts Identity Threat Protection

    ManageEngine's AD360 platform has introduced new risk exposure management and multi-factor authentication (MFA) features to address critical vulnerabilities like privilege escalation and unsecured local accounts. Credential abuse remains a top attack vector, with 22% of breaches linked to poorly ...

    Read More »
  • Morphisec's Enhanced Anti-Ransomware Blocks Evasive Attacks

    Morphisec's Enhanced Anti-Ransomware Blocks Evasive Attacks

    Morphisec's Anti-Ransomware Assurance Suite has been upgraded with new features, including Network Share Ransomware Protection, Identity Risk Visibility, and enhanced EDR Tamper Protection, to proactively address critical security gaps. The Network Share Protection blocks ransomware encryption at...

    Read More »
  • Nation-State Hackers Breach F5, Endangering Thousands of Customers

    Nation-State Hackers Breach F5, Endangering Thousands of Customers

    A nation-state hacking group infiltrated F5's networks, compromising thousands of organizations, including US government agencies and Fortune 500 companies, posing a severe global cybersecurity threat. The attackers maintained undetected access for years, enabling them to steal BIG-IP source code...

    Read More »