Credential Compromise
Huge DNA PII Leak: 23andMe Must Share the Blame
DNA: Do Not Agree. 23andMe says it’s not a breach—just credential stuffing. I’m not so sure ...
CrowdStrike Adds Honeytokens to Deceive Cybercriminals
CrowdStrike has extended the capabilities of its Falcon Identity Protection to make it simpler to employ honeytokens to identify compromised credentials that could be used to launch a cyberattack and the tools ...
LayerX Platform Secures Browsers Using Machine Learning
LayerX this week emerged from stealth to launch a modern browser extension that leverages machine learning algorithms to ensure connections made to applications are secure. LayerX CEO Or Eshed said an approach ...
INKY Finds New Phishing Attack Technique Spoofing Netflix
A report published this week by INKY Technology, a provider of an email security platform, suggested cybercriminals have found yet another way to impersonate the web pages of a popular brand to ...
Disneyland Instagram, Facebook Accounts Defaced
Late last week, Disneyland found itself the victim of a self-styled “super hacker.” The attacker took over and defaced Facebook and Instagram accounts belonging to the ‘happiest place on earth.’” One thing’s ...
Fraud Shifts to Travel, Gaming Sites as Economies Reopen
The prevalence of digital fraud attempts on businesses and consumers continues to rise as malicious actors are shifting their focus in 2021 from financial services to travel and leisure and other industries ...
Why Insider Threat Denial is Everyone’s Problem
People don’t like to admit when they’re wrong. And really, who can blame them? Being wrong is uncomfortable, anxiety-inducing, and embarrassing. These are all feelings that people try their best to avoid ...
Red Flag Alert: Service Accounts Performing Interactive Logins
In the world of account security, we often focus on end user accounts as the weak vector vulnerable to attackers. On the contrary, we at Preempt see something that happens just as ...
Empowering Employees to Reduce Security Incidents
In the hustle and bustle of our modern world, we can all get easily lost in the noise. One kind of noise is most frustrating for security teams: the noise of security ...
Disrupting an Attacker from Exploiting Domain Credentials
Security professionals often feel they don’t have enough time to keep up with modern threats. In fact, Crowdstrike researchers have found that top threat actors can go in and out of networks ...