News

Latest news about B2B cyber security >>> PR agencies: add us to your mailing list - see contact! >>> Book an exclusive PartnerChannel for your news!

One-third of login attempts with stolen login credentials
One-third of login attempts with stolen login credentials

In its latest State of Secure Identity Report, Okta, a provider of identity solutions, shows that attempts to log in with stolen credentials – the so-called “credential stuffing” – are the biggest threat to customer accounts. For the trends, examples, and observations presented in the report, Okta evaluated billions of authentications on its Auth0 platform. In credential stuffing, attackers exploit the habit of some users to use a single password for multiple logins. It begins by stealing the username and password, then using automated tools to access other accounts belonging to that user...

Read more

Apple iOS16 Feature: Passwordless Access with Passkeys
B2B Cyber ​​Security ShortNews

Apple introduced the new iOS16 and announced an exciting new feature: Passwordless Access with Passkeys. This is the first time that public keys have been introduced for security. An explanation of the technique with commentary from Okta. The industry has always known that public key encryption is a more secure alternative to passwords. However, no one has managed to make their use easy enough to achieve widespread adoption - until now. Passkeys use public-key cryptography and FIDO2 authentication, making them essentially phishing-proof while maintaining the same level of...

Read more

Pitfalls of Cloud Computing
Pitfalls of Cloud Computing

New report shows the pitfalls of cloud computing: Cloud computing has already become the standard in many areas in recent years. But as practical as using the cloud is, security should not be neglected. The use of cloud computing has accelerated significantly over the past two years and is likely to become the dominant model for hosting data and programs in the foreseeable future. Today it is already indispensable in many areas, for example when working together on documents and databases across different locations and...

Read more

24 billion usernames and passwords on the Dark Web
B2B Cyber ​​Security ShortNews

A new report by cyber threat intelligence provider Digital Shadows reveals the extent of login data leaked worldwide in connection with account takeovers (Account Take Over, or ATO for short). There are more than 24 billion user-password combinations in circulation on the dark web. In relation to the world population, this corresponds to four exposed accounts per Internet user. The number of stolen and disclosed credentials has thus increased by around 2020% since 65. Login data on the Dark Web: up 65 percent The majority of data exposed concerns individuals and consumers and includes usernames and passwords from various accounts –…

Read more

Stolen credentials are the biggest security risk

The Verizon Data Breach Investigations Report 2022 (DBIR) examined 23.896 security incidents and 5.212 confirmed data breaches. He comes to one conclusion: Leaked and stolen access data are still the greatest security risk for companies. From the analysis of the more than 100-page report, Patrick McBride, Chief Marketing Officer of Beyond Identity, has compiled the most important figures and offers tips on how companies can protect themselves from data leaks. Top 5 Statistics from the Verizon DBIR Stolen Passwords: The most popular method for attackers to steal a company's assets,…

Read more

Employees want an alternative to the password
Employees want an alternative to the password

A survey of 1.010 employees reveals common mistakes and problems related to passwords. 45 percent of employees in German companies would like an alternative to the password. Almost every fifth German uses the names of pets, children or their favorite football team as passwords. This is according to a study by Beyond Identity, the invisible multi-factor authentication (MFA) provider. More than 1.000 German employees were asked about password hygiene and the most common mistakes made when using passwords were made visible. The most important results at a glance 42 percent of those surveyed already have more…

Read more

Zero Trust: Firewalls and passwords are no longer relevant
Zero Trust: Firewalls and passwords are no longer relevant

Three theses for the future of Identity & Access Management. Zero Trust makes firewalls and passwords irrelevant. Multi-factor authentication is also a must for access. The protection of sensitive company networks and critical infrastructures is increasingly in focus in view of the tense security situation. Cyber ​​security concepts currently in use are often put to the test. It is becoming increasingly clear that classic firewall concepts alone are no longer able to offer sufficient resistance to hybrid attack patterns. A modern and centrally organized identity and access management is of particular importance. In this context, becom mentions three essential theses:…

Read more

Patching and good passwords reduce the risk of attack by 60 percent
Patching and good passwords reduce the risk of attack by 60 percent

Patch management plus robust password guidelines reduce the risk of cyber attack by up to 60 percent. Brute force is the most commonly used attack vector. More than half of the attacks are discovered within hours and days In six out of ten (63 percent) cyberattacks investigated by the Kaspersky Global Emergency Response Team, the attackers use brute force methods and exploit vulnerabilities to IT -Compromising a company's systems. The results of the latest Incident Response Analytics Report from Kaspersky show that simply implementing an appropriate patch management policy can reduce the risk of incidents being attacked by 30 percent ...

Read more

Insider risk: prevent misuse of access

The enemy inside: Insider threats through misuse of privileged authorizations. If there is a lack of measures to control and restrict the access rights of employees in a granular way, this represents a considerable risk for company security. The solution: the implementation of a least privilege approach. Cracking the code, defeating a boss, or discovering a lost key - these are all ways to level up in video games. Then players get access to new tools, powers or other components that will ultimately help them to victory. In many ways, the network infrastructure is similar to a video game. Employees have access to ...

Read more

Problem area: weak point access data

Credentials vulnerability: Identity and access management best practices. When it comes to passwords, their online presence offers companies a broad digital attack surface that cyberattackers can break through in various ways. If they succeed in stealing valid access data from an account, they can use the hijacked identity to steal valuable data or cause further damage in corporate environments. In a working world that is increasingly characterized by remote work, the security and credibility of digital identities are gaining new relevance. Similar to physical forms of identification, digital forms of identification must also be reliably protected against misuse, theft and fraud. The digital ...

Read more