Computing power is growing due to reduced costs and AI. Learn how it has impacted bcrypt password cracking times.| Specops Software
Two-factor authentication for Virtual Private Networks (2FA for VPN) keeps your Active Directory access even more secure. Low costs, big effect.| Specops Software
Find out how a forgotten admin account with the weak password “123456” exposed McDonald’s AI hiring chatbot for putting user data at risk.| Specops Software
Learn the most common types of password attacks, how credential-based attacks work, and where you should be bolstering your defenses.| Specops Software
Understand the cracking techniques hackers use the most, as well as some tips keeping your passwords secure.| Specops Software
Learn about password expiration best practices, the reality of password attacks and the alternatives available to IT teams.| Specops Software
Specops explains what decision makers need to consider before going passwordless.| Specops Software
New research shows how long it takes to crack passwords encrypted with the bcrypt hashing algorithm – plus how bcrypt get cracked.| Specops Software
Learn how password mask attacks work, the risks they pose to cybersecurity, and how to protect systems from this threat.| Specops Software
Get the key lessons and takeaways from the M&S ransomware attack to help strengthen your Service Desk and Active Directory security.| Specops Software
Two-factor authentication for Remote Desk Protocol (2FA for RDP) keeps your Active Directory access even more secure. Low costs, big effect.| Specops Software
New Specops research looks into the data around longer passwords. Learn how they boost cybersecurity and where hackers can get around them.| Specops Software
Learn how the attack played out and get expert advice on staying secure from password spraying attacks.| Specops Software
Learn all about Hybrid Password Attacks: Attack methods and matching defense mechanisms to make hybrid threats less likely to succeed.| Specops Software
In this blog, we'll explore password dictionary attacks: a brute-force hacking method used to break into a password-protected computer/server.| Specops Software
Our research team found over two million malware-stolen VPN passwords. Find out which VPN providers were most affected and the most common breached passwords.| Specops Software
Getting a password to a new user comes with risk. Learn which passwords are the most commonly compromised plus a more secure method for onboarding.| Specops Software
Passwords are an area where password security and user experience clash. Here’s how to make both work. A safe and user-friendly way.| Specops Software
A recent password spraying hack on software giant Microsoft exploited an unused test account. Here’s everything you need to know.| Specops Software