Learn the most common types of password attacks, how credential-based attacks work, and where you should be bolstering your defenses.| Specops Software
New research shows how long it takes to crack passwords encrypted with the bcrypt hashing algorithm – plus how bcrypt get cracked.| Specops Software
Learn how password mask attacks work, the risks they pose to cybersecurity, and how to protect systems from this threat.| Specops Software
New Specops research looks into the data around longer passwords. Learn how they boost cybersecurity and where hackers can get around them.| Specops Software
Learn how to use ChatGPT prompts to help build a custom dictionary with AI. Screenshots and walkthrough included.| Specops Software
In this blog, we'll explore password dictionary attacks: a brute-force hacking method used to break into a password-protected computer/server.| Specops Software
Learn why passphrases give you better Active Directory security and get best practice tips on how to create strong ones.| Specops Software