Perkiler is now using SMB brute force attacks to spread. Which is not a new concept, but why attack SMB instead of RDP?
CISA has issued a warning about several recent successful cyberattacks against various organizations’ cloud services
The number of RDP ports exposed to the Internet grew from about three million in January 2020 to over four and a half million in March. So how do you protect yourself?
More open ports are inviting attackers to try and gain entry by using brute force attacks. Why is this happening and what can we do?
The effectiveness of passwords to protect data has long been debated. Many have called for the death of passwords, instead pushing for biometrics to secure their most precious information. But is biometrics really a better, safer option?
Phobos, which many believe was named after the Greek god of fear, isn’t as widespread as it was before nor is it more novel than your average ransomware. Yet, it remains a threat to consumers and businesses alike. We dive into Phobos ransomware and show users how to face their fears and protect against it.
A look at the not-so-hacking hacker techniques attackers are using to compromise user accounts via weak passwords and gain access to enterprise networks.
The Simple Authentication and Security Layer (SASL) is an essential element of online authentication. But are you aware of all the known vulnerabilities? And, more importantly, have you patched them?
Two factor authentication (2fa) was introduced to enhance login security, but does it always work as advertised? Or can it be bypassed?