Discover how to secure your Active Directory and prevent privilege escalation. Learn essential password security tips to protect your organization.| Specops Software
When it comes to the Active Directory password hash, beware of the LM Hash and passwords that are less than 15 characters.| Specops Software
Find out how a forgotten admin account with the weak password “123456” exposed McDonald’s AI hiring chatbot for putting user data at risk.| Specops Software
HIBP expended their database: Learn what this latest credentials tells us about Telegram, infostealers, and the threat actor ALIEN TXTBASE.| Specops Software
What you need to know about the latest HIPAA cybersecurity regulations and how to keep your organization compliant.| Specops Software
Learn the most common types of password attacks, how credential-based attacks work, and where you should be bolstering your defenses.| Specops Software
Default passwords are pre-set credentials assigned by manufacturers. Learn about the threats they pose and how to prevent them.| Specops Software
Our analysts have looked into the recent data breach of 16 billion leaked passwords to see how concerned you should be.| Specops Software
What does NIS2 advise about password security and MFA? Learn what the framework advises and how to stay compliant.| Specops Software
New research shows how long it takes to crack passwords encrypted with the bcrypt hashing algorithm – plus how bcrypt get cracked.| Specops Software
You can find your current AD password policy either by navigating through the management console or by using the PowerShell command. See how.| Specops Software
Get the key lessons and takeaways from the M&S ransomware attack to help strengthen your Active Directory and Service Desk security.| Specops Software
Learn why so many believed the Iberian blackout in Spain and Portugal to have been caused by a cyber-attack.| Specops Software
Uncover the truth about AI vishing: how cybercriminals exploit technology to execute convincing scams - incl. risk evaluation.| Specops Software
Learn how post-quantum cryptography computing could change the way we encrypt passwords and what you should be doing to prepare.| Specops Software
Learn the top ten passwords being used against RDP ports from real attack data and how to keep your connections secure.| Specops Software
New Specops research looks into the data around longer passwords. Learn how they boost cybersecurity and where hackers can get around them.| Specops Software
Learn how the attack played out and get expert advice on staying secure from password spraying attacks.| Specops Software
Learn more about SHA256 and how long its takes to crack passwords protected by the SHA256 hashing algorithm.| Specops Software
Learn all about Hybrid Password Attacks: Attack methods and matching defense mechanisms to make hybrid threats less likely to succeed.| Specops Software
Learn how to use ChatGPT prompts to help build a custom dictionary with AI. Screenshots and walkthrough included.| Specops Software
Preparing for Cyber Essentials? Ensure your password policy meets certification requirements. Start with a free compliance audit.| Specops Software
Read how Active Directory honeypot accounts can spot unusual account activities and collect valuable threat intelligence to shape your future security defenses.| Specops Software
Get unique analysis into over one billion malware-stolen credentials and learn how to mitigate password risk.| Specops Software
Specops Breached Password Protection expands with a new source of compromised password data powered by Outpost24's threat intelligence unit.| Specops Software
Specops Software released the latest update, live attack data, to its Breach Password Protection list. Click to learn more.| Specops Software
Find support documentation for the Specops Password Auditor tool installation.| specopssoft.com
Identify weak passwords in your network with Specops Password Auditor. Strengthen security and prevent breaches now.| Specops Software
Address security vulnerabilities with our free Active Directory Auditing Tool. Find security weaknesses related to user accounts and passwords.| Specops Software
Find out what ransomware attacks are and what types of ransomware attacks exist: Locker, Crypto, RaaS, Wannacry, SamSam, Darkside, Ryuk etc.| Specops Software
Specops uReset support material to manage password reset settings in Active Directory, and reduce password-related calls to the service desk.| specopssoft.com
Guide for letting different groups of end users know the key details of your password policy deployment - with email template.| Specops Software
New NIST password guidelines explained - including hhecklist for aligning with NIST’s new password guidance. Check your compliance now!| Specops Software
Protect your Active Directory with new insights into breached password data and how hackers exploit common weaknesses in 2025.| Specops Software
The latest guidance provided by NIST on the different components to recommended password policy.| Specops Software
How to find pwned passwords in Active Directory. Check passwords against the HIBP list, and ban vulnerable passwords in your environment.| Specops Software
Specops dedicated product specialist are here to provide help and support for your Specops products and tools.| specopssoft.com
Boost your organization's password security with our 5 recommendations for creating a password policy strategy.| Specops Software
Our research team found over two million malware-stolen VPN passwords. Find out which VPN providers were most affected and the most common breached passwords.| Specops Software
Compromising login credentials is the goal of many modern cyber-attacks. If successful, they can result in the worst types of data breaches, especially...| Specops Software
MFA is advised with good reason – but hackers can breach it. We’ll walk through nine MFA breach tactics and show why passwords still matter.| Specops Software
Today, the Specops research team is publishing new data on how long it takes modern attackers to brute force guess user passwords with the help of newer...| Specops Software
Getting a password to a new user comes with risk. Learn which passwords are the most commonly compromised plus a more secure method for onboarding.| Specops Software
A recent password spraying hack on software giant Microsoft exploited an unused test account. Here’s everything you need to know.| Specops Software