poker credential stuffing attack

Poker Credential Stuffing Attack

by Mark Rudio | April 25, 2022 | Cyber Crime, Cyberattacks, Data & Cybersecurity, Hacking

Automated brute force attacks, also known as automated threats, are growing increasingly sophisticated. The Open Web Application Security Project (OWASP) currently lists 21 different methods of automated threats used by cybercriminals to hack into user accounts, ranging from CAPTCHA Defeat, which us ....

T-Mobile hack

Anatomy of an Attack: T-Mobile Hack Takeaways

by Eric Krell | August 25, 2021 | Data & Cybersecurity, Hacking

As far as digital heists go, last week’s T-Mobile hack was about as complicated as a convenience store smash-and-grab, albeit one that exposed the personal data of 40 million-plus customers. In lieu of any ransom schemes, the stolen records of 30 million of those consumers quickly wound up for sal ....

SIM Swap

SIM Swap Scams + Consumerization = TPRM Risk

by Sabine Zimmer | December 12, 2019 | Data & Cybersecurity, Hacking

SIM swap scams can be extremely expensive to individual consumers -- one investor lost more than $23.8 million worth of cryptocurrency to a SIM card hijacking in 2018. These hacks also represent a growing third party risk as the use of cell phones and related consumer technologies continue to increa ....

Shared Assessments Program Addresses Recommendations of Russian Hack Report for Improved Security

January 13, 2017 | Cyber Crime, Cyberattacks, Cybersecurity, Data & Cybersecurity, Hacking, Program Tools, Security, Third Party Risk Management, Tools & Templates

The Threat Horizon The December 29th joint analysis report (JAR) GRIZZLY STEPPE – Russian Malicious Cyber Activity, contains specific indicators of cyberattacks and steps organizations can take to mitigate the “the tools and infrastructure used by the Russian civilian and military intelligence S ....

At the Heart of the Cyber Security Skills Shortage

September 7, 2016 | Cyberattacks, Cybersecurity, Data & Cybersecurity, Hacking

Three recent studies demonstrate that organizational and IT department leadership sit squarely at odds with several important challenges to improving IT-related risk postures: Predictions that organizations do not plan to increase the level on hand security expertise; A well-documented and loomin ....

Visual Hacking: Who’s Looking Over Your Shoulder?

November 24, 2014 | Cybersecurity, Data & Cybersecurity, Data Breach, Hacking, Privacy

I recently attended the Ponemon Institute’s Responsible Information Management (RIM) Renaissance Privacy Event. While headlines and discussion continue to focus on cybersecurity; privacy professionals also had good conversations about the basics of visual privacy. Protecting confidential informati ....