Discover how to secure your Active Directory and prevent privilege escalation. Learn essential password security tips to protect your organization.| Specops Software
When it comes to the Active Directory password hash, beware of the LM Hash and passwords that are less than 15 characters.| Specops Software
Two-factor authentication for Virtual Private Networks (2FA for VPN) keeps your Active Directory access even more secure. Low costs, big effect.| Specops Software
Good news for cloud-first organizations: we’re pleased to announce Specops uReset is now joining Specops Secure Service Desk as being supported for customers who have fully migrated to the Entra ID cloud. Specops uReset is now available for cloud-only environments, bringing enterprise-grade self-service password reset capabilities directly to your cloud infrastructure. Whether your team is... The post Specops expands cloud offering to self-service password resets appeared first on Specops S...| Specops Software
As more organizations adopt cloud-first or hybrid IT strategies, identity and access management (IAM) has taken on a new level of complexity. According to a recent report from Flexera, 89% of enterprises now use a multi-cloud strategy, with many maintaining a combination of public cloud, private cloud, and on-premises environments. As well as changing where... The post How to secure hybrid cloud environments: Best practices for cloud password security appeared first on Specops Software.| Specops Software
Find out how a forgotten admin account with the weak password “123456” exposed McDonald’s AI hiring chatbot for putting user data at risk.| Specops Software
The "User must change password at next logon" setting can be flagged in different scenarios in Active Directory, find out when and how.| Specops Software
HIBP expended their database: Learn what this latest credentials tells us about Telegram, infostealers, and the threat actor ALIEN TXTBASE.| Specops Software
2025 has been a summer of high-profile breaches. This post will focus on four notable and high-profile victims: Chanel, Google, Air France, and KLM. Although the companies and exact data sets differ, these breaches share a clear pattern: attackers compromised third-party CRM / customer-service platforms as part of a wider Salesforce-focused vishing/social engineering campaign. From... The post Third-party risk: Behind the Google, Chanel, & Air France-KLM breaches appeared first on Specops Sof...| Specops Software
On February 25th, 2024, a sophisticated ransomware attack struck the City of Hamilton, crippling roughly 80 percent of its network. This included business licensing, property-tax processing, and transit-planning systems. Cybercriminals proceeded to demand an $18.5 million ransom that the city refused to pay. In April 2025, a new and interesting facet to this story emerged.... The post MFA failure costs Hamilton $18m in cyber insurance payout appeared first on Specops Software.| Specops Software
Businesses fail all the time, for all sorts of reasons. Especially startups and fledgling ventures. So when a business like Knights of Old (trading as KNP Logistics Group) survives a century and a half, through enough recessions, wars, government changes, and technological advances to fill many history books, it would be fair to say it’s... The post How one weak password destroyed KNP: A sad lesson in the cost of password neglect appeared first on Specops Software.| Specops Software
The phrase ‘spray and pray’ likely came from the military, used to describe inaccurately firing automatic weapons in the hope that one shot eventually found its mark. It’s now used to describe any scenario where a strategy relies on the sheer number of attempts overcoming any flaws in accuracy or skill. When it comes to... The post Password spraying: Attack guide and prevention tips appeared first on Specops Software.| Specops Software
Learn how human error led to a serious ransomware attack against Clorox, and the steps your business can take to avoid the same.| Specops Software
What is an AD password? Learn how to create and manage a secure Active Directory password policy to protect your organization from breaches.| Specops Software
Discover the risks of unencrypted biometrics in our latest article, "Unencrypted Biometrics: A Massive Security Risk." Learn how to protect your data today!| Specops Software
Discover how Specops uReset enhances password security and ensures GDPR compliance. Strengthen your defenses today with our expert insights!| Specops Software
Biometrics can’t be shared or easily forged, but increase the accuracy of authentication. More about password resets with biometrics.| Specops Software
What you need to know about the latest HIPAA cybersecurity regulations and how to keep your organization compliant.| Specops Software
Learn the most common types of password attacks, how credential-based attacks work, and where you should be bolstering your defenses.| Specops Software
The Specops research team has analyzed 10 million random passwords from the 1 billion+ breached password list used by Specops Password Auditor. These are all real compromised passwords that have been captured by Specops, which you can scan your own Active Directory against right now. Our team have mapped out the most common length and... The post [New research] Heatmap of 10 million breached passwords: 98.5% are weak appeared first on Specops Software.| Specops Software
Understand the cracking techniques hackers use the most, as well as some tips keeping your passwords secure.| Specops Software
Default passwords are pre-set credentials assigned by manufacturers. Learn about the threats they pose and how to prevent them.| Specops Software
Our analysts have looked into the recent data breach of 16 billion leaked passwords to see how concerned you should be.| Specops Software
Hear advice from Mikael Svall, Outpost24 OffSec expert, on securing your service desk against social engineering.| Specops Software
Specops Secure Access adds an important MFA layer to Windows logon, RDP and VPN connections. Download Datasheet with all details.| Specops Software
What does NIS2 advise about password security and MFA? Learn what the framework advises and how to stay compliant.| Specops Software
NIST MFA guidelines require strong authentication for online security. Learn how to comply with best practices.| Specops Software
Specops Secure Access is enhancing existing password protections with MFA for Windows at logon, RDP and VPN.| Specops Software
Learn about password expiration best practices, the reality of password attacks and the alternatives available to IT teams.| Specops Software
Specops explains what decision makers need to consider before going passwordless.| Specops Software
New research shows how long it takes to crack passwords encrypted with the bcrypt hashing algorithm – plus how bcrypt get cracked.| Specops Software
Learn how password mask attacks work, the risks they pose to cybersecurity, and how to protect systems from this threat.| Specops Software
MFA prompt bombing tricks users into approving access. Learn how to stop this attack with risk-based authentication.| Specops Software
You can find your current AD password policy either by navigating through the management console or by using the PowerShell command. See how.| Specops Software
Learn how RaaS providers DragonForce operate and how to avoid the initial breaches that lead to ransomware deployment.| Specops Software
Learn how Scattered Spider use social engineering to attack service desks and how you can stay protected. Practical defense tips.| Specops Software
Get the key lessons and takeaways from the M&S ransomware attack to help strengthen your Active Directory and Service Desk security.| Specops Software
Learn why so many believed the Iberian blackout in Spain and Portugal to have been caused by a cyber-attack.| Specops Software
Learn how behavioral biometrics continuously verifies identity and add extra authentication security.| Specops Software
Uncover the truth about AI vishing: how cybercriminals exploit technology to execute convincing scams - incl. risk evaluation.| Specops Software
Learn how post-quantum cryptography computing could change the way we encrypt passwords and what you should be doing to prepare.| Specops Software
Find what Specops researchers learned from analyzing the ALIEN TXTBASE data dump of leaked credentials. Who serious is it?| Specops Software
Learn the top ten passwords being used against RDP ports from real attack data and how to keep your connections secure.| Specops Software
Protect your user accounts with MFA for Windows Logon, RDP, VPN. Specops Secure Access increases your defenses against AD password attacks.| Specops Software
Find out why multi-factor authentication (MFA) for windows logon is essential. All about benefits, implementation and compliance aspects.| Specops Software
Two-factor authentication for Remote Desk Protocol (2FA for RDP) keeps your Active Directory access even more secure. Low costs, big effect.| Specops Software
New Specops research looks into the data around longer passwords. Learn how they boost cybersecurity and where hackers can get around them.| Specops Software
Learn how the attack played out and get expert advice on staying secure from password spraying attacks.| Specops Software
Learn more about SHA256 and how long its takes to crack passwords protected by the SHA256 hashing algorithm.| Specops Software
Learn all about Hybrid Password Attacks: Attack methods and matching defense mechanisms to make hybrid threats less likely to succeed.| Specops Software
Learn how to use ChatGPT prompts to help build a custom dictionary with AI. Screenshots and walkthrough included.| Specops Software
Preparing for Cyber Essentials? Ensure your password policy meets certification requirements. Start with a free compliance audit.| Specops Software
Read our team’s analysis of the Rockyou2024 password list to learn whether it’s truly a record password breach or mostly garbage data.| Specops Software
Read how Active Directory honeypot accounts can spot unusual account activities and collect valuable threat intelligence to shape your future security defenses.| Specops Software
Get unique analysis into over one billion malware-stolen credentials and learn how to mitigate password risk.| Specops Software
Specops Breached Password Protection expands with a new source of compromised password data powered by Outpost24's threat intelligence unit.| Specops Software
What makes a strong password policy? Learn key guidelines and best practices for securing credentials. Full password policy list included.| Specops Software
Specops Software released the latest update, live attack data, to its Breach Password Protection list. Click to learn more.| Specops Software
Passwords are a key component of PCI-DSS requirements. Learn how to build a PCI-compliant password policy in 2025.| Specops Software
Find support documentation for the Specops Password Auditor tool installation.| specopssoft.com
Read about the latest release of the Specops Password Auditor, a read-only program that can help IT admins identify password vulnerabilities.| Specops Software
Identify weak passwords in your network with Specops Password Auditor. Strengthen security and prevent breaches now.| Specops Software
Address security vulnerabilities with our free Active Directory Auditing Tool. Find security weaknesses related to user accounts and passwords.| Specops Software
In this blog, we'll explore password dictionary attacks: a brute-force hacking method used to break into a password-protected computer/server.| Specops Software
A help desk identity verification tool to confirm callers' identity before unlocking accounts & resetting passwords. Verify identities now.| Specops Software
Learn how hacker group Scattered Spider used social engineering to trick a service desk agent into offering initial access for a ransomware attack.| Specops Software
Find out what ransomware attacks are and what types of ransomware attacks exist: Locker, Crypto, RaaS, Wannacry, SamSam, Darkside, Ryuk etc.| Specops Software
Specops uReset support material to manage password reset settings in Active Directory, and reduce password-related calls to the service desk.| specopssoft.com
The Specops Software blog helps you keep up with the latest industry news and provides tips on securing your corporate infrastructure against data breaches.| Specops Software
Guide for letting different groups of end users know the key details of your password policy deployment - with email template.| Specops Software
New NIST password guidelines explained - including hhecklist for aligning with NIST’s new password guidance. Check your compliance now!| Specops Software
Our partners have extensive experience in both implementing and supporting IT Service Management solutions to corporate, enterprise, public sector and academic customers.| Specops Software
Specops Password Policy Datasheet. Specops Password Policy helps you increase password security in your Microsoft Active Directory environment. You can use Specops Password Policy to enforce password rules, meet compliance requirements and help users select stronger passwords....| Specops Software
Protect your Active Directory with new insights into breached password data and how hackers exploit common weaknesses in 2025.| Specops Software
The latest guidance provided by NIST on the different components to recommended password policy.| Specops Software
We are often asked about the technical impact of using our solutions on Active Directory, and other services. In this blog post, we will look at the...| Specops Software
Create a fine-grained password policy in the Active Directory Administration Center. Full guide with screenshots.| Specops Software
How to find pwned passwords in Active Directory. Check passwords against the HIBP list, and ban vulnerable passwords in your environment.| Specops Software
Our Active Directory best practices address security vulnerabilities in your organization, and serve as barriers for attackers....| Specops Software
Specops dedicated product specialist are here to provide help and support for your Specops products and tools.| specopssoft.com
Guide for where to set your password policy key components both in your default Active Directory tools and Specops Password Policy.| Specops Software
Boost your organization's password security with our 5 recommendations for creating a password policy strategy.| Specops Software
Our research team found over two million malware-stolen VPN passwords. Find out which VPN providers were most affected and the most common breached passwords.| Specops Software
Follow our step-by-step guide (with detailed screenshots) on how to recover deleted objects in Active Directory.| Specops Software
Free Active Directory password audit tool helps you identify password-related vulnerabilities, including leaked passwords, and password expirations.| Specops Software
Compromising login credentials is the goal of many modern cyber-attacks. If successful, they can result in the worst types of data breaches, especially...| Specops Software
Learn how our Threat Intelligence team hunt down breached credentials to keep our customers’ Active Directories secure.| Specops Software
MFA is advised with good reason – but hackers can breach it. We’ll walk through nine MFA breach tactics and show why passwords still matter.| Specops Software
Continuous scans for the Specops Password Policy Breached Password Protection service finding breached passwords daily, instead of only at password change or reset.| Specops Software
Today, the Specops research team is publishing new data on how long it takes modern attackers to brute force guess user passwords with the help of newer...| Specops Software
Use our Active Directory (AD) self-service password reset tool to address AD password management tasks (forgotten passwords, lockouts, resets & more).| Specops Software
Most end users admit to using passwords – how concerned should you be? Understand the dangers of password reuse and how you can mitigate risk.| Specops Software
Use Active Directory GPOs to create granular password policies. Specops Password Policy strengthens passwords, and enforces password policy standards.| Specops Software
Contact our sales team to learn more about our software solutions, get pricing information, or schedule a free demo or trial. We’re here to help!| Specops Software
Self-service password resets can save your organization a lot of money. We pulled the data to bring dollars and sense into your password reset conversation.| Specops Software
Getting a password to a new user comes with risk. Learn which passwords are the most commonly compromised plus a more secure method for onboarding.| Specops Software
Secure the initial password for onboarding by sending employees an enrollment link to set their own password. Try First Day Password!| Specops Software
Learn why passphrases give you better Active Directory security and get best practice tips on how to create strong ones.| Specops Software
Passwords are an area where password security and user experience clash. Here’s how to make both work. A safe and user-friendly way.| Specops Software