Blogs

Blogs

What Is Credential Stuffing?

Credential stuffing relies primarily on the reuse of the same usernames or account IDs across different online services. It is one of the most common practices among cybercriminals. The hackers use previously acquired credentials from other 3rd party data breaches and run it against millions

Why Is Two-Factor Authentication (2FA) Important?

Two-Factor Authentication is an electronic verification method that requires a person to provide two forms of identity proof before accessing an application, network or web site. From simple phishing attacks to the constantly evolving sophisticated methods like spear-phishing, credential stuffing and social engineering, there are

How To Protect Children From Online Threats

The internet has become a fundamental part of our lives for quite some time now. With the positive results of easy access to interactive learning through digitization comes the risks like cyber threats and cyberbullying. According to 219 data on cyberbullying through Canadian Health Survey

Rising Concerns To Include Ransomware In Cyber Insurance?

According to BBC, The Association of British Insurers (ABI) has been accused of “funding” organized crime by including ransomware blackmail payments in cyber insurance policies. What Is The Argument Of Including Ransomware Payouts In Cyber Insurance Policies? Recently, Oxford University’s Prof. Ciaran Martin expressed his concerns

Thousands Of Spotify Account Hacked

Credential stuffing attack hits over 300,000 Spotify accounts With its increased popularity in 2008 (just 2 years after the launch), the audio streaming platform has been a cyberattack victim several times. A “credential stuffing” attack reportedly had hit Spotify in the summer of 2020. This

Categories: