article thumbnail

What the Email Security Landscape Looks Like in 2023

Security Affairs

What started as notes from Nigerian princes that needed large sums of money to help them get home has evolved into bad actors that use refined social engineering tactics to convince the receiver to unknowingly share important information. During that time, email-based threats have become increasingly sophisticated.

article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

Some 80% of data breaches continue to be caused by compromised, weak and reused passwords, while 29% of all breaches, regardless of attack type, involved the use of stolen credentials, according to the 2019 Verizon Data Breach Investigations Report (DBIR). million on average.

Passwords 164
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

What Is a SaaS Security Checklist? Tips & Free Template

eSecurity Planet

These checklists include security standards and best practices for SaaS and cloud applications, and B2B SaaS providers use them to guarantee that their solutions match customer security standards. Common threats include misconfigurations, cross-site scripting attacks, and data breaches.

Risk 105
article thumbnail

Top 5 Attack Vectors to Look Out For in 2022

Security Affairs

Phishing techniques use social engineering to trick victims into taking an action that helps an attacker compromise your network or access your sensitive information assets. A 2021 report on data breaches found that stolen credentials were the initial attack vector used in 61 percent of breaches.

IoT 113