
What is a Credential Stuffing Attack?
If you’ve ever had an account on a website affected by a data breach, then chances are your credentials may be used in credential-stuffing attacks….
If you’ve ever had an account on a website affected by a data breach, then chances are your credentials may be used in credential-stuffing attacks….
Affected Systems: Microsoft Exchange Server 2013, Exchange Server 2016, and Exchange Server 2019 Description: Researchers at cybersecurity firm GTSC have discovered two new zero-day vulnerabilities affecting Microsoft Exchange Server 2013, 2016,…
A new IT security training workshop launched today will give organisations the tools to protect themselves against the reputational risk associated with data leaks. The…
Description: Ukraine’s Ministry of Defence has warned of Russian plans to conduct mass cyber attacks on critical infrastructure belonging to Ukraine and its allies. The article details…
Multi-Factor authentication provider Okta has identified a considerable increase in credential stuffing attacks on their users in their 2022 State of Secure Identity Report. In the first 90…
Description: Cyber security firm Proofpoint has identified a phishing campaign that uses the death of Queen Elizabeth II as a lure. Their threat insight team revealed that threat actors had created…
A zero-day (0-day) vulnerability refers to a security risk in a piece of software with no patches or mitigations to prevent cybercriminals from exploiting them….
Researchers at Mitiga, a cyber security incident response company, have uncovered threat actors targeting senior leaders, such as CEOs and CFOs, with specially crafted spear…
Description: The number of phishing attacks using legitimate software-as-a-service (SaaS) platforms has risen by 1100% since June 2021, according to a report published by Palo Alto Networks…