article thumbnail

"Pwned", the Book, is Finally Here!

Troy Hunt

which I've now included in this book 😊 These are the stories behind the stories and finally, the book about it all is here: I announced the book back in April last year after Rob, Charlotte and I had already invested a heap of effort before releasing a preview in October. This book has it all. Pat Phelan.

InfoSec 359
article thumbnail

Pokemon Company resets some users’ passwords

Security Affairs

The Pokemon Company resets some users’ passwords in response to hacking attempts against some of its users. The Pokemon Company announced it had reset the passwords for some accounts after it had detected hacking attempts, Techcrunch first reported. The company was likely the target of credential stuffing attacks.

Passwords 108
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Password Policy Manager for WordPress is now WPassword

Security Boulevard

Everything must evolve, or it risks being relegated to the history books. The post Password Policy Manager for WordPress is now WPassword appeared first on WP White Security. The post Password Policy Manager for WordPress is now WPassword appeared first on WP White Security. These two tenets help us ensure […].

Passwords 104
article thumbnail

Weekly Update 330

Troy Hunt

So big, in fact, that I rushed into this week's update less prepared and made it a very casual one, which is just fine 😊 It's mostly password books and kitchen equipment this week, both topics which had far more engagement than I expected but made them all the more interesting.

Passwords 182
article thumbnail

How 50% of telco Orange Spain’s traffic got hijacked?—?a weak password

DoublePulsar

How 50% of telco Orange Spain’s traffic got hijacked — a weak password So here’s a funny story. RIPE look after internet IP addresses, basically the phone book of the internet. Also, there is no sane password policy at RIPE — you can use borisjohnson as your password, in other words it is a powder keg.

article thumbnail

New Duo E-Book, Attack Vectors Decoded: Securing Organizations Against Identity-Based Threats

Duo's Security Blog

MFA is a common second line of defense against compromised passwords. Even if an attacker has access to a username and password, they still need access to the second authentication factor to break into the organization. the password) from the login process and instead uses “something you are” (e.g., a device).

article thumbnail

Medatixx Hit with Ransomware Attack, Customers Need to Change Passwords ASAP

Heimadal Security

Following a ransomware attack that crippled its whole operation, Medatixx, a medical software provider from Germany whose services are utilized in over 21,000 medical institutions, advises users to reset their application passwords.