Credential Stuffing is an attack where credentials stolen from one or more sites is used at other sites, in the hope that the same credentials were used by users on multiple sites. This post discusses some of the steps consumers and services providers can take to prevent these attacks.
Tag Archive: Process
“Shift left” is the concept of implementing security from the very beginning and continuously validating that the product is secure. This article is about how to shift security left, based on my experience with very large commercial payment applications and how I helped secure them.
I have been asked multiple time about how to go about starting a security program. This is a short primer that lists some of the things you should do to jump start a security program.
If you are trying to find out how to handle a ransom attack after you have been attacked, you are already way too late. Your options are very limited. Either pay or pray that the attackers were really stupid and try to recover the data by engaging a specialized consulting company. What you need to do is plan for this before you are attacked.
Business Email Compromise (BEC) happens when someone receives an email supposedly from their companies’ CFO, CEO or even their manager asking them to make a payment to a vendor account. In this attack, the person making the payment is socially engineered to make a fraudulent payment.