Topic: credential-based attacks
-
Webinar: How Stolen Credentials Threaten Your Network Security
Cybercriminals increasingly use stolen credentials to bypass complex hacking methods, making identity security a top priority, as highlighted in an upcoming July 9th webinar by cybersecurity experts. The webinar will explore credential-based attacks, including infostealer malware and tactics like...
Read More » -
Stellar Cyber Boosts Identity Security with ITDR Features
Stellar Cyber is launching Identity Threat Detection & Response (ITDR) at Black Hat USA 2025, integrating it into its AI-driven SecOps platform to combat credential-based attacks. Identity threats are now the primary attack vector, with 70% of breaches starting with compromised credentials; Stell...
Read More » -
SonicWall firewalls targeted in rising Akira ransomware attacks
SonicWall firewalls are being targeted in Akira ransomware attacks, potentially exploiting an undisclosed security flaw, with attackers using compromised SSL VPN connections for initial access. Akira ransomware has extorted over $42 million from 250+ victims, employing tactics like routing authen...
Read More »