The Art of a Credential Stuffing Attack

The Art of a Credential Stuffing Attack

Credential stuffing is a technique that hackers employ, to attack mostly websites, that use stolen e-mail addresses and passwords. In 2018, it is estimated that 30 billion attempts to break into user’s accounts were made. Attackers most often targeted retail sites,...
Lack of User Visibility Dooms Citrix in Latest Breach

Lack of User Visibility Dooms Citrix in Latest Breach

A new attack on Citrix, March 8, 2019, using a technique called password spraying places significance on a chief issue that passwords pose for companies; end-users that select weak passwords or use login credentials on different sites leave their organizations open to...
Familiar Implementation

Familiar Implementation

You might hear something like “Cymatic Security implements in a way that’s familiar to your user and your administrators.” It’s worth clarifying that, because it’s a really powerful statement. No one likes to be told that a solution to a problem is “simple.” Probably...
I Believe Many Use the Word “Threat” Incorrectly

I Believe Many Use the Word “Threat” Incorrectly

I feel that too many people conflate “threat” and “vulnerability” but couldn’t quite put my finger on a clear definition. I think I now can. I was listening to the estimable John Gruber’s Talk Show podcast, episode 243 with Rich Mogull, where he talked all about...
Credential Stuffing Solution

Credential Stuffing Solution

Credential stuffing is one of the most common account takeover attacks. It is a cyber attack where attackers use stolen credentials to gain authorized access to enterprise systems through large-scale automated login requests. Today’s solutions to deal with credential...