Account Takeover Prevention

Detect exposed employee credentials before attackers do.

  • The Account Takeover Kill Chain: A Five Step Analysis

    The Account Takeover Kill Chain: A Five Step Analysis

    Here, we review account takeover from the perspective of the cybercriminal: why and how do cybercriminals perform ATO?

    Read Post
  • ×

    Interactive Threat Hunting on the Dark Web Webinar

    - Nov 6th -

    First Name
    Last Name
    Company
    Job Title
    Country
    State
    2019 November - Interactive Dark Web
    Thank you!
    Error - something went wrong!
  • Account Takeover: Protect Your Customer and Employee Accounts

    Account Takeover: Protect Your Customer and Employee Accounts

    Cybercriminals are increasingly turning to credential stuffing tools to automate attempts at account takeover, making these leaked credentials very useful for them.

    Read Report
  • Account Takeover Prevention

    Account Takeover Prevention

    Detect exposed employee credentials before attackers do.

    Read Report
  • 7 Tips for Protecting Against Account Takeovers

    7 Tips for Protecting Against Account Takeovers

    In May 2017, an amalgamation of over 1 billion credentials was uploaded to the Have I Been Pwned database. One ...

    Read Post
  • Weekly Intelligence Summary 03 Oct - 10 Oct 2019

    Weekly Intelligence Summary 03 Oct - 10 Oct 2019

    In the spotlight this week is the Iran-linked threat group “APT35”, which took aim at the email accounts of political entities in the United States and prominent Iranians living outside Iran.

    Read Report
  • Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence

    Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence

    We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories. - APT35 Targets Email of US political figures & prominent Iranians -...

    Read Post
  • Detecting Exposed Credentials | Case Study

    Detecting Exposed Credentials | Case Study

    See how one large bank detected more than 50,000 exposed credentials in 1 year.

    Read Report
  • Data Loss Detection Overview

    Data Loss Detection Overview

    SearchLight enables you to detect Employee Credentials, Sensitive Documents and Technical Information, Intellectual Property, and Customer Data

    Read Report
  • Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar42:41

    Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar

    Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circula

    Watch Video
  • Industries Most Likely to be Targeted by Credential Stuffing Attempts

    Industries Most Likely to be Targeted by Credential Stuffing Attempts

    Discover which industries are most likely to be targeted by cybercriminals with credential stuffing attempts.

    Read Report
  • Episode 39: Credential Hygiene

    Episode 39: Credential Hygiene

    Dr. Richard Gold and Simon Hall join Rafael Amado to discuss the age-old problem of credential hygiene. We’ve all heard of not reusing passwords, employing two factor authentication and using...

    Read Post
  • 33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    Last week, I wrote about how cybercriminals are looking to trade corporate emails in their pursuit of conducting Business Email ...

    Read Post
  • loading
    Loading More...