Posts Tagged With

compromised credentials monitoring

Cyber Threat Intelligence
WT1SHOP: Authorities Seize Online Marketplace Selling Stolen Login Credentials and Other PII
The United States Department of Justice released a notice on Tuesday detailing the seizure of an online ...
Read post
Fraud
Your Data, Their Gain: How Threat Actors Leverage Tax Season to Commit Fraud
In 2020, the IRS identified over US$2.3 billion in tax fraud schemes, including tax return fraud. And in 2021, we ...
Read post
Cyber Threat Intelligence
Brute Force and Credential Stuffing Attacks: How Cyber Threat Actors Gain Access to Accounts—Plus Best Practices for Detection and Prevention
Brute force and credential stuffing attacks are constant threats to organizations across the private and public ...
Read post
Cyber Threat Intelligence
OCR, Cybersecurity, and Threat Intelligence: Using Optical Character Recognition and Machine Learning to Identify Risk
Optical character recognition (OCR) can immediately help security and fraud teams augment their data collections ...
Read post
Cyber Threat Intelligence
Flashpoint and Silobreaker Expand Integration Partnership With Compromised Credential Monitoring—Enterprise
The Flashpoint and Silobreaker integration empowers users to collect, analyze, and monitor data from the surface ...
Read post
Cyber threat intelligence
Preventing and Combating Online Recruitment Fraud
Last week, I was asked again about an online recruitment fraud scheme. Threat actors are reaching out to job ...
Read post
Cyber Threat Intelligence
The Vulnerability of Passwords: a Glimpse into 35 Billion Credentials
How can organizations protect themselves and their customers from dictionary, replay, and password spraying ...
Read post
Cyber threat intelligence
Potential Link of Compromised Zoom Accounts to Previously Compromised Credentials
Flashpoint analysts are aware of recent claims that a few thousand compromised Zoom accounts have been made ...
Read post