Exploring Leaked Credentials: Practical Guide To Account Takeovers Prevention – June 2020 Podcast
Stream the podcast now! About the Podcast: As the workplace has moved online and an increasing number of employees begin to work from home, the challenges to our data security have increased exponentially. Digitalization, cloud based-services, and the rise of online marketplaces and services have increased the number of entry points for malicious actors […]
Breaking up the Phishing Attack Chain
Phishing remains a popular attack method for malicious actors. This attack method is made possible by the wealth of services phishers can purchase on illicit markets: mass mailers, email lists, fake websites etc. Phishing attacks have been on the rise, registering a 250% growth between 2018 and 2019 according to a Microsoft report. In this […]
How To Identify The Next Major Cyber Threats through Job Postings
A significant challenge for security teams is to extract intelligence from open-source information. Malicious actors routinely post advertisements like the one below. This actor is offering up a method, but provides little to no clues as to how that method works, and how to protect against it. This is just an example of how challenging […]
Dorking: Preventing Leaks From Hurting Your Firm
While readily available, malware is far from being the only tool that malicious actors use to steal data and illegally access computer networks. Malicious actors indeed threaten firms’ security using far more mundane and everyday techniques. Case in point: taking advantage of Google, the world’s most popular search engine, to find confidential information and vulnerabilities […]
The Risks of Using Corporate Emails for Personal Services
Everyday, Flare Systems collects leaked usernames and passwords on the internet and the darkweb. Our customers use our extensive leaked credentials database to prevent credential stuffing attacks. Credential stuffing happens when malicious actors take a database of leaked usernames and passwords and test these credentials on a different website. If the victims reused the […]