Techday Asia - Asia's technology news network

Asia
Search

Credential abuse stories

Story image
Sophos report reveals stark reality of cybercrime-as-a-service
Last month
#
malware
#
ransomware
#
cybersecurity
The report addresses how ransomware remains one of the greatest cyber crime threats to organisations with operators innovating their extortion tactics.
Story image
A third of cyberattacks in the cloud leverage credential access
Last month
#
cloud security
#
cybersecurity
#
credential abuse
A new report has revealed adversary success in identity theft indicates default cloud security controls are ineffective at preventing attacks.
Story image
Vectra Protect team finds Microsoft Teams vulnerability
Fri 23 Sep 2022
#
uc
#
microsoft
#
phishing
The Vectra Protect team identified a post-exploitation opportunity in August, allowing malicious actors to steal valid user credentials from Microsoft Teams.
Story image
Asia’s data privacy landscape is ‘coming of age’ – how can businesses cope?
Wed 14 Sep 2022
#
breach prevention
#
cybersecurity
#
online fraud
Identity theft and online fraud are becoming more prevalent than ever. A recent IBM study revealed that stolen or compromised credentials were responsible for 19% of data breaches this year.
Story image
What every CISO must answer to enable a best-in-class security operations program
Thu 26 May 2022
#
bi
#
big data
#
data analytics
It has been widely reported recently that South Australian government employees have been the victims of a cyberattack.
Story image
How credentials became an attacker’s easiest target
Wed 10 Nov 2021
#
cybersecurity
#
cybersafety
#
digital credentials
Even with education and phishing tests, users continue to hand over legitimate logins to attackers, who in turn exploit them with a high degree of success.
Story image
Lack of security controls continues to put organisations at risk
Fri 5 Nov 2021
#
cybersecurity
#
cyberark
#
insider threats
Organisations still operate with limited visibility of user activity associated with web applications, despite the risk of insider threats and credential theft.
Story image
Countering the rise of credential-based attacks
Tue 12 Oct 2021
#
cybersecurity
#
cybersafety
#
digital credentials
By implementing behavioural analytics and smart password practices, security teams can thwart credential-based attacks across the organisation.
Story image
Attivo Networks launches credential-cloaking tool to deter data thieves
Thu 9 Sep 2021
#
cybersecurity
#
cybersafety
#
digital credentials
The tool is part of Attivo’s Endpoint Detection Net suite, and is aimed at enabling organisations to hide credentials from would-be attackers and their tools.
Story image
How a vantage point sees threats before they impact
Wed 25 Nov 2020
#
cybersecurity
#
casb
#
cybersafety
When the focus has been on adversaries that develop increasingly complex and sophisticated attacks, tried and true techniques such as compromised credentials continue to be amongst the most potent weapons.
Story image
Thycotic rolls out SCIM Connector for expanded user access integration
Thu 16 Jul 2020
#
pam
#
cybersecurity
#
thycotic
SCIM Connector 2.0 allows organisations to set up workflows to synchronise, provision or modify entitlements in Secret Server directly within their IGA platform. 
Story image
Online users giving out social media details too freely - Kaspersky
Mon 23 Sep 2019
#
social media
#
kaspersky
#
awareness
The survey revealed that online users in Asia Pacific appear to be willing to share their private information in exchange for various personal gains from social media.
Story image
Gaming industry a rising target of cyber-attacks – Akamai
Fri 26 Jul 2019
#
gaming
#
cybersecurity
#
technology gifts
“Gamers are a niche demographic known for spending money, so their financial status is also a tempting target.”
Story image
CERT NZ report: Unauthorised account access a growing problem
Wed 10 Jul 2019
#
phishing
#
cybersecurity
#
email security
New Zealanders reported direct financial losses of $1.7 million. While that is still a substantial loss, the figure is a 71% drop from the previous quarter.
Story image
Cyber criminals targeting the gaming industry at an alarming rate
Fri 14 Jun 2019
#
gaming
#
technology gifts
#
hackers
New research from Akamai shows the gaming community is quickly becoming one of the most highly targeted industries for cyber attacks, with hackers largely driven by gaining consumer credentials.
Story image
SIM swapping: What is it and should you be worried?
Mon 29 Apr 2019
#
contact centre
#
cybersecurity
#
iam
Due to the growing reliance on mobile phones, SIM swapping is increasingly targeted as a way to take over a victim’s online accounts.
Story image
Google's new Chrome feature warns about compromised logins
Fri 8 Feb 2019
#
cybersecurity
#
google
#
chrome
This week Google released extra measures in a bid to provide better security for its users’ data.
Story image
Expert comment: What the Collection #2-5 data dump means for credential abuse
Mon 4 Feb 2019
#
phishing
#
email security
#
dlp
Techday spoke to experts and executives in the security industry about the data leak and the implications on phishing and credential stuffing.
Story image
Massive 2.2bil-username data dump leaked on dark web
Fri 1 Feb 2019
#
dark web
#
data leak
#
mfa
This makes the second leak three times bigger than the Collection #1 dump leaked last month.
Story image
Credential theft industry booming in US, declining in Asia & EU
Wed 10 Oct 2018
#
cybersecurity
#
cybercrime
#
digital credentials
New research reveals the US is ripe for harvest, but Blueliv says the declines in EU and Asia are almost definitely only temporary.
Story image
Mega users affected by credential stuffing attack; 15,000 affected
Thu 19 Jul 2018
#
cybersecurity
#
breach prevention
#
akamai
Users of file sharing website Mega have been tripped up in a credential stuffing attack.
Story image
Online businesses under siege from botnet DDoS attacks and credential abuse – report
Wed 4 Jul 2018
#
ddos
#
phishing
#
email security
Attack traffic origination against from China and Russia combined was three times the number of attacks from the US.
© 2022 Techday, All rights reserved. Hosted on Plan B's Cloud Services. DMARC protection by PowerDMARC.