Identity management in 2025: 4 ways security teams can address gaps and risks
Published on December 6, 2024
via VentureBeat While 99% of businesses plan to invest more in security, only 52% have fully implemented multi-factor authentication (MFA), and only 41% adhere to the principle of least privilege in access management. Adversaries, including nation-states, state-funded attackers and cybercrime gangs, continue to sharpen their tradecraft using generative AI, machine learning (ML)…
Rapid Growth of Password Reset Attacks Boosts Fraud and Account Takeovers
Published on November 14, 2024
via InfoSecurity Magazine As many as one in four password reset attempts from desktop browsers are fraud, according to security researchers. The fraud attempts are part of a rapid growth in password reset attacks, according to the annual LexisNexis Risk Solutions Cybercrime Report. (LexisNexis Risk Solutions…
15 Encryption Statistics in 2024
Published on June 21, 2024
via Comparitech What is Encryption? Okay, the basics. Encryption involves sending information converted into secret code, known as cryptography. When information is encrypted in computing, the true meaning of the data is hidden until it reaches the recipient, with encrypted text known as ciphertext. Once it reaches the intended…
Over 225,000 Compromised ChatGPT Credentials Up for Sale on Dark Web Markets
Published on May 1, 2024
via HackerNews More than 225,000 logs containing compromised OpenAI ChatGPT credentials were made available for sale on underground markets between January and October 2023, new findings from Group-IB show. These credentials were found within information stealer logs associated with LummaC2, Raccoon, and RedLine stealer malware. "The number…
Seven Privacy Trends That Can Help Protect Your Business In 2024
Published on April 17, 2024
Via Forbes Data privacy laws in the U.S. have become a complex patchwork of local, state and national regulations. At the beginning of 2023, five states' privacy laws were set to go into effect, and another eight states established privacy laws that went and/or will…
The password attacks of 2023: Lessons learned and next steps
Published on April 12, 2024
Via BleepingComputer It should take more than eight characters to bring a business to a halt. However, the relentless onslaught of password-based cyber attacks underscores the alarming ease with which cybercriminals can exploit vulnerable credentials to inflict damage. Password attacks take many forms: from phishing…
Password Security Best Practices for 2024
Published on February 26, 2024
via Cyber Pandit As we approach the year 2024, technology continues to evolve at a rapid pace. Unfortunately, so do the cyber threats that come with it. It’s more important than ever to ensure that our online security is up to par and our passwords…
51% of users admit to resetting forgotten passwords once a month
Published on January 19, 2024
via Security Magazine New research from Entrust highlights current shifts in identity management. The Future of Identity report focused on passwordless authentication, hybrid identities and personally identifiable information (PII) ownership. Fifty-one percent of respondents admitted to resetting a password at least once a month because they can’t remember…
Advanced Software Products Group Announces the Release of ReACT v6.5, Packed with Enhanced Features and Developments
Published on January 16, 2024
Naples, FL - Advanced Software Products Group (ASPG, Inc.), a leading provider of innovative software solutions for almost 40 years, is pleased to announce the release of ReACT v6.5, the latest version of its powerful self-service password reset and authentication tool. This new release introduces…
Getting off the Attack Surface Hamster Wheel: Identity Can Help
Published on January 10, 2024
Via HackerNews IT professionals have developed a sophisticated understanding of the enterprise attack surface – what it is, how to quantify it and how to manage it. The process is simple: begin by thoroughly assessing the attack surface, encompassing the entire IT environment. Identify all…