What is Credential-Stuffing?  And How Bad Actors Use it to Attack You

Author(s):

Karen Austin, CEO, United States Cybersecurity Magazine

What is credential-stuffing

Hackers have increasingly been using a type of cybersecurity attack called credential-stuffing to gain access to your online accounts and steal your personal information.  Credential-stuffing is a form of automated attack that involves hackers using stolen usernames and passwords to gain access to user accounts.  By leveraging large collections of stolen credentials, hackers can quickly … Read more

Blockchain Smart Contracts and Supply Chain Security

Author(s):

Miles Oliver, Author,

Blockchain Smart Contracts

With the ignominious demise of FTX in recent months, cryptocurrency has been much in the news of late for all the wrong reasons. The reality, however, is that blockchain technologies, through which the various cryptocurrencies operate, offer significant promise in spurring efficiency and security across industries. This is particularly true of the supply chain. In … Read more

How Cybercriminals Use Vehicle Identification Numbers (VINs) to Hack Cars

Author(s):

Oscar Collins, Editor-in-Chief, Modded

Use VINs to Hack Cars

During the COVID-19 pandemic, cyber theft increased dramatically. Cybercriminals use malware and ransomware attacks to exploit vulnerable people on the internet. These thieves have become more intelligent and can go past computers and cell phones by taking advantage of people’s cars through the Vehicle Identification Number (VIN). So, how are these cybercriminals using VINs to … Read more

Revelations From CISA Proves Phishing is a Public Menace

Author(s):

Stu Sjouwerman, Founder and CEO, KnowBe4

Phishing Attacks

A cyber threat that’s nearly three decades old continues to be the most prolific and potent form of cybercrime on the planet. Phishing attacks are growing in volume and sophistication. An estimated 255 million phishing attacks were observed in 2022, a 61% increase over 2021. There’s also a steep increase in spear-phishing attacks, smishing attacks, … Read more

Beyond IT: A Holistic Approach to Cybersecurity

Author(s):

Lauren Beward, Senior Cybersecurity Specialist/ Business Development Manager, ArCybr

Stephen Edwards, Cybersecurity Consultant, Alluvionic

A Holistic Approach to Cybersecurity

Cybersecurity is one of the most critical issues facing organizations today. In 2021, data breaches cost companies an average of $4.24 million1, and the number of ransomware-related data leaks increased by 82%2. As the digital age progresses, the risk of cybercrime increases, making it essential for businesses to take cybersecurity seriously. Implementing strong technology measures … Read more