Account Takeover Prevention

Detect exposed employee credentials before attackers do.

  • Account takeover: Are you opening the door for cyber threat actors?

    Account takeover: Are you opening the door for cyber threat actors?

    In 2020, our research report on account takeover (ATO) highlighted the risk of using credentials in an unsafe manner, which ...

    Read Post
  • Initial Access Brokers: A Deep Dive

    On-demand Webinar

    Watch Here
  • The role of Non-Fungible Tokens (NFTs) in facilitating cybercrime

    The role of Non-Fungible Tokens (NFTs) in facilitating cybercrime

    You’d have to have been living under a rock to have avoided the excitement surrounding Non-Fungible-Tokens (NFTs) in the last ...

    Read Post
  • Exposed Credentials Solutions Guide

    Exposed Credentials Solutions Guide

    This guide draws from best practices suggested in SearchLight’s playbooks, so security professionals can improve their tools and processes to prevent employee account takeover.

    Read Report
  • From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    From Exposure to Takeover: The 15 billion stolen credentials allowing account takeover

    Over the past 2.5 years, we have been analyzing how cybercriminals conspire to prey upon users of online services by “taking over” the accounts they all use...

    Read Report
  • Webinar: Account Takeover: Data Findings, Popular Tools, and Prevalent Actors0:00

    Webinar: Account Takeover: Data Findings, Popular Tools, and Prevalent Actors

    Join the Photon team to learn about our latest research on account takeover.

    Watch Video
  • The Account Takeover Kill Chain: A Five Step Analysis

    The Account Takeover Kill Chain: A Five Step Analysis

    Here, we review account takeover from the perspective of the cybercriminal: why and how do cybercriminals perform ATO?

    Read Post
  • Account Takeover Prevention

    Account Takeover Prevention

    Detect exposed employee credentials before attackers do.

    Read Report
  • How One Large Bank Detected More Than 50,000 Exposed Credentials in 1 Year | Case Study

    How One Large Bank Detected More Than 50,000 Exposed Credentials in 1 Year | Case Study

    See how one large bank detected more than 50,000 exposed credentials in 1 year.

    Read Report
  • Account Takeover: Protect Your Customer and Employee Accounts

    Account Takeover: Protect Your Customer and Employee Accounts

    Cybercriminals are increasingly turning to credential stuffing tools to automate attempts at account takeover, making these leaked credentials very useful for them.

    Read Report
  • 7 Tips for Protecting Against Account Takeovers

    7 Tips for Protecting Against Account Takeovers

    In May 2017, an amalgamation of over 1 billion credentials was uploaded to the Have I Been Pwned database. One ...

    Read Post
  • Industries Most Likely to be Targeted by Credential Stuffing Attempts

    Industries Most Likely to be Targeted by Credential Stuffing Attempts

    Discover which industries are most likely to be targeted by cybercriminals with credential stuffing attempts.

    Read Report
  • 7.5M Adobe Creative Cloud User Records Exposed, City Of Joburg Ransomware Attack, and APT28 Updates

    7.5M Adobe Creative Cloud User Records Exposed, City Of Joburg Ransomware Attack, and APT28 Updates

    Adam Cook, Philip Doherty, and Viktoria Austin host this week’s ShadowTalk update around an unsecured Elasticsearch database exposing account information of aboutt 7.5 million Adobe Creative Cloud...

    Read Post
  • Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

    Honeypots: Tracking Attacks Against Misconfigured or Exposed Services

    Honeypots can be useful tools for gathering information on current attack techniques. Conversely, they can be an overwhelming source of ...

    Read Post
  • Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    Typosquatting and the 2020 U.S. Presidential election: Cyberspace as the new political battleground

    we detected over 550 typosquats for the 34 candidate- and election-related domains we gathered from open-source research. Not every single one was something interesting; most of the time the typosquat

    Read Post
  • Cybercriminal Forum Developments: Escrow Services

    Cybercriminal Forum Developments: Escrow Services

    On Russian- and English-language cybercriminal forums on the clear and dark web, vendors are increasingly asking interested buyers to place money in a forum escrow service before they will provide fur

    Read Post
  • Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence

    Iran-Linked APT35, Skimming By Magecart 4, Rancour, And Emotet Resurgence

    We’re back in London this week! Viktoria chats with Adam Cook, Philip Doherty, and Josh Poole on this week’s top stories. - APT35 Targets Email of US political figures & prominent Iranians -...

    Read Post
  • Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar42:41

    Harnessing Exposed Data to Enhance Cyber Intelligence - Recorded Webinar

    Attack methods repeat themselves, and so does how cybercriminals use breached data, such as PII, stolen account details and even compromised admin credentials. Once data is compromised, it can circula

    Watch Video
  • Episode 39: Credential Hygiene

    Episode 39: Credential Hygiene

    Dr. Richard Gold and Simon Hall join Rafael Amado to discuss the age-old problem of credential hygiene. We’ve all heard of not reusing passwords, employing two factor authentication and using...

    Read Post
  • 33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    33,000 Accounting Inbox Credentials Exposed Online: BEC Made Easy

    Last week, I wrote about how cybercriminals are looking to trade corporate emails in their pursuit of conducting Business Email ...

    Read Post
  • loading
    Loading More...