Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Hacking

Why Hackers Love Credentials: Parsing Verizon's 2022 Breach Report

The 2022 Verizon Data Breach Investigations Report (DBIR), the fifteenth such report in as many years, leads off with a startling statistic: Credentials are the number one overall attack vector hackers use in data breaches. Use of stolen credentials accounts for nearly half the breaches studied by Verizon, far ahead of phishing and exploit vulnerabilities, which account for 19% and 8% of attacks, respectively. Botnets, the fourth most common entry path for hackers, represent a mere 1% of attacks.

This Valentine's Day, Swipe Left on Hackers

Online dating is one of the fastest-growing industries in the tech world. Online dating has quickly become a sustainable way to remain social and have a relationship with someone other than your cat. But what are the chances that you’ll be swiping right on a hacker? Mobile analytics platform, Adjust, reports that in 2021, 300 million adults used dating apps worldwide with 20 million users paying for premium features.

How The "No Fly List" Hack Highlights the Need for Cloud Security

The names of over 1.5 million individuals were published on the dark web in January after ahacker gained access to the TSA’s “No Fly List.” That’s a lot of names (including aliases and birth dates), so why wasn’t the list secure, and how did it get leaked? The entire breach came down to one small business with one misconfigured server.

Download Your 12+ Ways to Hack Multi-Factor Authentication

All multi-factor authentication (MFA) mechanisms can be compromised, and in some cases, it's as simple as sending a traditional phishing email. Want to know how to defend against MFA hacks? This eBook covers over a dozen different ways to hack various types of MFA and how to defend against those attacks.

Kevin Mitnick Password Manager Hack Demo

Kevin Mitnick, KnowBe4's Chief Hacking Officer, reveal the real risks of weak passwords. Attack assumes the hacker is already on network with victim’s IP address and password, and is trying to access passwords on the victim’s locked password manager remotely. We strongly recommend that you use a password manager to reduce password reuse and improve complexity, but you may be wondering if it’s really worth the risk. Is it safe to store all of your passwords in one place? Can cybercriminals hack them? Are password managers a single point of failure?

ShinyHunters suspect extradited to United States from Morocco, could face 116 years in jail if convicted

A 22-year-old suspected of being "Seyzo", a member of the ShinyHunters cybercrime gang, has been extradited from Morocco to the United States, where - if convicted - he could face up to 116 years in prison. Sebastien Raoult, a French national, was arrested at Rabat international airport in Morocco on May 31 2022, while trying to take a flight to Brussels.

Predicting which hackers will become persistent threats

Websites are central to business operations but are also the target of various cyber-attacks. Malicious hackers have found several ways to compromise websites, with the most common attack vector being SQL injection: the act of injecting malicious SQL code to gain unauthorized access to the server hosting the website. Once on the server, the hacker can compromise the target organization's website, and vandalize it by replacing the original content with content of their own choosing.