Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

What Is an Exploit Kit?

An exploit kit is a toolkit that cybercriminals use to attack the security vulnerabilities of a system or device to distribute malware. An exploit is a bit of code that takes advantage of security vulnerabilities found within software and hardware. Cybercriminals collect these bits of code and compile them into a kit that can target multiple security vulnerabilities at once, and secretly install malware on devices.

How To Secure Remote Desktop Protocol

Remote work has increased the usage of Remote Desktop Protocol. However, Remote Desktop Protocol connections can have many vulnerabilities if not properly secured. The best way to secure Remote Desktop Protocol connections is by creating strong login credentials and using a secure network. This will help protect your company from cyberattacks that could compromise sensitive data.

Secure Software Supply Chain by Signing Git Commits With Keeper

The modern threat landscape is constantly changing and the software supply chain has become a common target for cybercriminals. Cyberthreats have become a headache for overworked developers and DevOps teams as they face tight deadlines, limited staffing resources and the added burden of ensuring that their code does only what it is intended to do and is free of bugs and malware.

Can You Get Hacked by Replying to a Scam Text?

No, you cannot get hacked by replying to a scam text, but you can get hacked from a scam text if you click on a malicious link the scammer sends you. According to the Federal Trade Commission (FTC), Americans lost a total of $330 million from scam texts in 2022, making scam texts a serious threat to your online security. Continue reading to learn how to spot scam texts and the common scam text tactics that scammers use.

Considering Passwordless? Here's How to Do It

When creating a new password, you know the drill – it must be at least eight characters long, contain special characters and avoid sequential characters or be based on dictionary words. Although these requirements can be a pain in the neck and seriously hamper end user experience, they are not a sign of officious IT security teams.

Passkey vs Password: What's the Difference?

There are several ways in which passkeys are different from passwords in terms of how they are created, how they are filled into websites and how they are secured. Passwords are user-generated whereas passkeys are automatically generated using public key cryptography. Unlike passwords, passkeys are a new type of digital credential that is phishing-resistant and can’t be easily compromised. However, only a few websites currently support passkeys.

Secure Password and File Sharing for Federal and State Courts

U.S. court employees need to access dozens of systems and applications in order to complete their duties. These employees may also have access to Personally Identifiable Information (PII), which must be securely stored and managed with strict access controls. Court systems need a way for employees to easily and securely access systems, and share passwords and files among teams.

Random but Memorable - Episode 11.6: Private Electronic Graffiti Tags with Graham Cluley

How has the cybersecurity landscape changed since the days of the floppy-disc? 💾 This week, we sit down with Smashing Security's Graham Cluley, to reflect on how threats have evolved. Graham also dishes his top security tips and explains why celebrating infamous hackers angers him. 🤬 Tune in for our favorite ways to use tags with 1Password in Did You Know? Plus, Roo hosts HackerNoHacker for a Matt vs Sara showdown. 🥊💥