A help desk identity verification tool to confirm callers' identity before unlocking accounts & resetting passwords. Verify identities now.| Specops Software
Learn how Scattered Spider use social engineering to attack service desks and how you can stay protected. Practical defense tips.| Specops Software
Learn how hacker group Scattered Spider used social engineering to trick a service desk agent into offering initial access for a ransomware attack.| Specops Software
Get the key lessons and takeaways from the M&S ransomware attack to help strengthen your Service Desk and Active Directory security.| Specops Software
Learn how RaaS providers DragonForce operate and how to avoid the initial breaches that lead to ransomware deployment.| Specops Software
Uncover the truth about AI vishing: how cybercriminals exploit technology to execute convincing scams - incl. risk evaluation.| Specops Software
The phrase ‘spray and pray’ likely came from the military, used to describe inaccurately firing automatic weapons in the hope that one shot eventually found its mark. It’s now used to describe any scenario where a strategy relies on the sheer number of attempts overcoming any flaws in accuracy or skill. When it comes to... The post Password spraying: Attack guide and prevention tips appeared first on Specops Software.| Specops Software - Password Security Tools for Active Directory
Last week, cleaning products giant Clorox took the unusual step of suing its IT services partner Cognizant for gross negligence. Clorox are alleging that the August 2023 ransomware attack they suffered came about thanks to an incredibly simple piece of human error. According to the complaint, hackers tied to the “Scattered Spider” group simply phoned... The post “Can you reset my password?” How a simple service desk attack cost Clorox $400 million appeared first on Specops Software.| Specops Software - Password Security Tools for Active Directory
The Specops research team has analyzed 10 million random passwords from the 1 billion+ breached password list used by Specops Password Auditor. These are all real compromised passwords that have been captured by Specops, which you can scan your own Active Directory against right now. Our team have mapped out the most common length and... The post [New research] Heatmap of 10 million breached passwords: 98.5% are weak appeared first on Specops Software.| Specops Software - Password Security Tools for Active Directory
Cyber-attacks come in many forms and continue to evolve, but there’s one tried and trusted unauthorized entry method that’s stood the test of time – cracking a user’s password. Despite this, too many organizations still rely on outdated advice and brittle password policies. We’ll run through the five top password cracking techniques hackers use the... The post Hackers’ 5 top password cracking techniques appeared first on Specops Software.| Specops Software - Password Security Tools for Active Directory
NHS organizations have a challenge on their hands when it comes to cybersecurity. They have to defend sprawling, heterogeneous IT environments against relentless cyber‑threats, all while keeping their number one priority in mind: patient care. On a recent Specops webinar, Darren James, Senior Product Manager at Specops, spoke to three NHS IT leaders with an... The post NHS cybersecurity experts talk passwords and Specops appeared first on Specops Software.| Specops Software - Password Security Tools for Active Directory
This new collaboration offers GuidePoint Security customers access to password management and authentication solutions, which protect business data by blocking weak and compromised passwords and securing user authentication. Philadelphia, United States Specops is excited to announce a strategic reseller partnership with GuidePoint Security, the leading cybersecurity solution provider that helps organizations make better decisions to... The post Specops Now Offered Through GuidePoint Sec...| Specops Software - Password Security Tools for Active Directory
Cyberattacks are evolving rapidly. As technology advances, so do the tools and techniques used by hackers, from AI-driven phishing schemes to highly targeted ransomware attacks. But despite this increasing sophistication, many successful breaches still rely on something shockingly simple: default passwords. According to a recent IBM report, 86% of people have never changed the admin... The post The risk of default passwords: What they are & how to stay safe appeared first on Specops Software.| Specops Software - Password Security Tools for Active Directory
Imagine you’re overseeing your organization’s network security when suddenly you notice an unusual traffic pattern: packets flowing through a server that shouldn’t be there. What you’re witnessing could be a Man-in-the-Middle (MITM) attack in action, where an adversary stealthily intercepts and manipulates data between trusted endpoints. We’ll explain what you need to know about MITM... The post Man-in-the-Middle (MITM) attack guide & defense tips appeared first on Specops Software.| Specops Software - Password Security Tools for Active Directory
Researchers recently uncovered a (seemingly) unprecedented aggregation of roughly 16 billion username–password pairs. However, there’s been some debate around how much of this is recycled data versus new. Similarly to the Rockyou2024 password list and ALIENTXTBASE data dump, our own analysts have found that this 16 billion passwords leak isn’t as concerning as initial headlines... The post [Analysis] 16 billion passwords leaked – how much is recycled data? appeared first on Specops ...| Specops Software - Password Security Tools for Active Directory
Hear advice from Mikael Svall, Outpost24 OffSec expert, on securing your service desk against social engineering.| Specops Software
Address security vulnerabilities with our free Active Directory Auditing Tool. Find security weaknesses related to user accounts and passwords.| Specops Software
Our partners have extensive experience in both implementing and supporting IT Service Management solutions to corporate, enterprise, public sector and academic customers.| Specops Software
We are often asked about the technical impact of using our solutions on Active Directory, and other services. In this blog post, we will look at the...| Specops Software
Create a fine-grained password policy in the Active Directory Administration Center. Full guide with screenshots.| Specops Software
How to find pwned passwords in Active Directory. Check passwords against the HIBP list, and ban vulnerable passwords in your environment.| Specops Software
When credentials are compromised, the risk of a breach is high. Learn practical tips on creating an effective incident response plan.| Specops Software
Use our Active Directory (AD) self-service password reset tool to address AD password management tasks (forgotten passwords, lockouts, resets & more).| Specops Software
Learn the most common types of password attacks, how credential-based attacks work, and where you should be bolstering your defenses.| Specops Software
Free Active Directory password audit tool helps you identify password-related vulnerabilities, including leaked passwords, and password expirations.| Specops Software
Use Active Directory GPOs to create granular password policies. Specops Password Policy strengthens passwords, and enforces password policy standards.| Specops Software
This article takes a look at the Password Entropy calculation in Specops Password Auditor. What is entropy? Entropy is a concept borrowed from information...| Specops Software