article thumbnail

Data Breaches, Phishing, or Malware? Understanding the Risks of Stolen Credentials

Elie

billion usernames and passwords exposed via data breaches and traded on blackmarket forums. Drawing upon Google as a case study, we find 7–25% of exposed passwords match a victim’s Google account. million potential victims of phishing kits; and 1.9

article thumbnail

Security Affairs newsletter Round 258

Security Affairs

addresses two zero-days exploited in the wild Microsofts case study: Emotet took down an entire network in just 8 days New Coronavirus-themed campaign spread Lokibot worldwide. Copyright (C) 2014-2015 Media.net Advertising FZ-LLC All Rights Reserved -->. Copyright (C) 2014 Media.net Advertising FZ-LLC All Rights Reserved -->.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

5 best online cyber security training courses and certifications in 2020

IT Governance

This one-day course is designed and run by real-world practitioners, who help you gain an understanding of risks through practical exercises, group discussions and case studies. Although it’s no longer making as many headlines, the GDPR (General Data Protection Regulation) remains an essential part of organisations’ security practices.

article thumbnail

NEW TECH: This free tool can help gauge, manage third-party cyber risk; it’s called ‘VRMMM’

The Last Watchdog

Turn the corner into 2019 and we find Citigroup, CapitalOne, Wells Fargo and HSBC Life Insurance among a host of firms hitting the crisis button after their customers’ records turned up on a database of some 24 million financial and banking documents found parked on an Internet-accessible server — without so much as password protection.

Risk 117
article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

This framework guarantees that appropriate authentication measures, encryption techniques, data retention policies, and backup procedures are in place. Common threats include misconfigurations, cross-site scripting attacks, and data breaches. Security breaches have a lower impact when they are detected and responded to on time.

article thumbnail

What did you do for European Cyber Security Month?

IT Governance

Among its suggestions are to: Change default passwords when setting up an account; Turn on automatic security updates; and. Review where you store personal data and who has access to it. We wrote several blogs throughout the month, explaining some of the biggest mistakes that lead to data breaches. Security Summit North.