<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>hacking Archives - Threat Potential</title>
	<atom:link href="https://threatpotential.com/category/hacking/feed/" rel="self" type="application/rss+xml" />
	<link>https://threatpotential.com/category/hacking/</link>
	<description></description>
	<lastBuildDate>Wed, 21 Dec 2022 21:15:53 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9</generator>
	<item>
		<title>Ransomware &#8211; Why You Need Offline Backups</title>
		<link>https://threatpotential.com/ransomware-why-you-need-offline-backups/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=ransomware-why-you-need-offline-backups</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Thu, 29 Dec 2022 21:11:51 +0000</pubDate>
				<category><![CDATA[awareness]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[ransomware]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3616</guid>

					<description><![CDATA[<p>At Threat Potential, we see firsthand the devastating effects of ransomware attacks on businesses and individuals. Ransomware is a type of malware that encrypts a victim&#8217;s files, demanding a ransom from the victim to restore access to the data. Unfortunately, paying the ransom does not guarantee that the victim will regain access to their data....</p>
<p>The post <a href="https://threatpotential.com/ransomware-why-you-need-offline-backups/">Ransomware &#8211; Why You Need Offline Backups</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>At Threat Potential, we see firsthand the devastating effects of ransomware attacks on businesses and individuals. Ransomware is a type of malware that encrypts a victim&#8217;s files, demanding a ransom from the victim to restore access to the data. Unfortunately, paying the ransom does not guarantee that the victim will regain access to their data.</p>



<p>Imagine your business or personal files being locked away and held for ransom. The sense of panic and desperation that sets in is unimaginable. This is why it&#8217;s crucial to have an offline backup plan in place.</p>



<p>Think of an offline backup as an insurance policy for your data. Just like you have insurance for your home or car, you should have a backup plan in case of a digital disaster. Offline backups allow you to store copies of your data on a separate device that is not connected to the internet, making it immune to ransomware attacks.</p>



<p>But why is it so important to have an offline backup specifically? Online backups, while convenient, can also be vulnerable to ransomware attacks. If an attacker gains access to your online backup account, they can encrypt those files as well. With an offline backup, your data is safe and secure, even if an attacker gains access to your online accounts.</p>



<p>So, how do you create an offline backup plan? There are several options available, including external hard drives, USB drives, and even physical copies on CD or DVD. It&#8217;s important to regularly update your offline backups, as well as store them in a secure location, such as a safe deposit box or fireproof safe.</p>



<p>Don&#8217;t wait until it&#8217;s too late to implement an offline backup plan. Protect your business and personal data from the devastating effects of ransomware attacks. Take the necessary precautions and invest in an offline backup solution today. It&#8217;s better to be safe than sorry in the digital world.</p>
<p>The post <a href="https://threatpotential.com/ransomware-why-you-need-offline-backups/">Ransomware &#8211; Why You Need Offline Backups</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Tips To Improve Employee Security Awareness</title>
		<link>https://threatpotential.com/tips-to-improve-employee-security-awareness/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=tips-to-improve-employee-security-awareness</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Wed, 21 Dec 2022 20:23:46 +0000</pubDate>
				<category><![CDATA[awareness]]></category>
		<category><![CDATA[hacking]]></category>
		<category><![CDATA[phishing]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3592</guid>

					<description><![CDATA[<p>At Threat Potential, we understand the importance of employee security awareness in protecting against cyberattacks. With the increasing number of phishing scams and malware attacks, it&#8217;s crucial for employees to be knowledgeable about online security best practices. Just as you would wear a helmet to protect your head from physical threats, employees need to be...</p>
<p>The post <a href="https://threatpotential.com/tips-to-improve-employee-security-awareness/">Tips To Improve Employee Security Awareness</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>At Threat Potential, we understand the importance of employee security awareness in protecting against cyberattacks. With the increasing number of phishing scams and malware attacks, it&#8217;s crucial for employees to be knowledgeable about online security best practices.</p>



<p>Just as you would wear a helmet to protect your head from physical threats, employees need to be aware of potential cyber threats to protect their company&#8217;s data and assets.</p>



<p>So, how can you improve employee security awareness? Here are a few tips:</p>



<ol class="wp-block-list" type="1">
<li>Conduct regular training sessions on online security best practices. This can include information on phishing scams, strong password creation, and how to identify and report potential threats.</li>



<li>Implement two-factor authentication for all online accounts. This adds an extra layer of security by requiring a second form of verification, such as a code sent to a phone, before logging in.</li>



<li>Create a security awareness policy and make it easily accessible to all employees. This should outline expected behaviors and protocols for handling potential threats.</li>



<li>Regularly remind employees of the importance of security awareness. This can be through email reminders or in-person reminders during meetings.</li>



<li>Encourage employees to report any suspicious activity or potential threats. A company-wide reporting system can help identify and address potential threats before they become a bigger issue.</li>
</ol>



<p>Improving employee security awareness is a continuous process, and it&#8217;s important to regularly review and update policies and training as needed. Don&#8217;t let your company&#8217;s data and assets fall victim to a cyberattack – invest in employee security awareness today.</p>
<p>The post <a href="https://threatpotential.com/tips-to-improve-employee-security-awareness/">Tips To Improve Employee Security Awareness</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>The Dangers of Password Spraying Attacks</title>
		<link>https://threatpotential.com/dangers-of-password-spraying-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=dangers-of-password-spraying-attacks</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Sat, 08 Oct 2022 16:02:19 +0000</pubDate>
				<category><![CDATA[hacking]]></category>
		<category><![CDATA[password attacks]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3443</guid>

					<description><![CDATA[<p>What are password spraying attacks? Traditional password attacks focus on a single account with multiple password guesses. However, password spraying attacks flip this on its axis by attempting a small set of passwords against a large amount of accounts. This tactic seeks to avoid detection and lockouts, while remaining effective by using common or weak...</p>
<p>The post <a href="https://threatpotential.com/dangers-of-password-spraying-attacks/">The Dangers of Password Spraying Attacks</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<h3 class="wp-block-heading">What are password spraying attacks?</h3>



<p>Traditional password attacks focus on a single account with multiple password guesses. However, password spraying attacks flip this on its axis by attempting a small set of passwords against a large amount of accounts. This tactic seeks to avoid detection and lockouts, while remaining effective by using common or weak passwords. These attacks are favorable in organizations with large user bases but can go on for long periods of time. </p>



<h3 class="wp-block-heading">How do they work?</h3>



<p>Below we’ll show a typical password spraying attack, but
keep in mind different scenarios call for different methods.</p>



<ul class="wp-block-list"><li><strong>Identify login portals</strong> – During a penetration test its trivial finding login portals but for a malicious actor it may take a little digging. Hackers use various intelligence techniques such as search engine discovery or simply navigating your website. Commonly adversaries will attempt these attacks on ADFS/O365 applications since they go against internal credentials and the configurations are widely publicized. As an example, if you want to check if an organization uses O365, it couldn’t be easier. Simply use the following URL and replace user@domain with that of your choosing. <a href="https://login.microsoftonline.com/getuserrealm.srf?login=user@domain.com&amp;xml=1">https://login.microsoftonline.com/getuserrealm.srf?login=user@domain.com&amp;xml=1</a>. If the “NameSpaceType” returns “Managed” then O365 is in use, if it’s “Federated” then it uses an ADFS, and if “Unknown” then it doesn’t exist.</li></ul>



<figure class="wp-block-image size-large"><img decoding="async" src="https://threatpotential.com/wp-content/uploads/2020/02/o365.png" alt="Check if O365 is in use" class="wp-image-3439"/></figure>



<ul class="wp-block-list"><li><strong>Generate potential usernames</strong> – Discovering employees of a company is usually a Google or LinkedIn search away. Organizations are proud of their employee’s and are intentionally not trying to hide this information. However, username format can vary between organization to organization. This is where a little research can go along way into the success or failure of password spraying attacks. There are multiple avenues for reconnaissance such as, utilizing search engines, navigating company website, reviewing metadata in documents, and many more but you get the idea. Another important  note is that there are ways of determining a valid/non-valid user by response times in services such as O365, which unfortunately they fail to consider a vulnerability.</li><li><strong>Generate potential passwords</strong> – You would think that this would be difficult but its probably the easiest part. Almost all organizations fall victim to users that have a “relaxed” stance on password security. In other words, human nature suggests that they pick something easy for them to remember and to type. These passwords include things like “Spring2020” or “Password123!” or “&lt;CompanyName&gt;1”. Publicly disclosed breach data is also a wealth of password knowledge.</li><li><strong>Conduct password spray</strong> – Now it&#8217;s time to try all the combinations! There are multiple toolsets to choose from but an application testing tool such as BurpSuite works well. What these tools will do is automatically try multiple combinations as set forth by the attacker and return information back letting them know if the credential works or not.</li></ul>



<h3 class="wp-block-heading">Why are they so successful?</h3>



<p>Password spraying attacks go up against the likelihood that users fail to choose strong passwords and a company’s reluctance to use multi-factor authentication. Additionally, this style of attack avoids many deterrence such as account lockouts, blacklisting, and alerting.</p>



<h3 class="wp-block-heading">What you can do about it?</h3>



<p>The good news is that you can help reduce your risk to this
attack vector relatively easily.</p>



<ul class="wp-block-list"><li>Utilize <a href="https://threatpotential.com/mfa-and-your-small-business/">multi-factor authentication</a>.</li><li>Reduce external facing login portals by forcing users through a VPN first.</li><li>Reduce the lockout threshold for login failures.</li><li>Enforce a strong password policy by enforcing lengthy, complex, and unique passwords. Additionally, implement a password blacklist to avoid common and easily guessed passwords.</li><li>Utilize security awareness training and password audits.</li><li>Configure SIEM alerts to pick up  login behavior anomalies and audit logs regularly.</li></ul>


<p><!--EndFragment--></p><p>The post <a href="https://threatpotential.com/dangers-of-password-spraying-attacks/">The Dangers of Password Spraying Attacks</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Attackers Find You</title>
		<link>https://threatpotential.com/how-attackers-find-you/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-attackers-find-you</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Mon, 03 Oct 2022 14:17:00 +0000</pubDate>
				<category><![CDATA[hacking]]></category>
		<category><![CDATA[threats]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3465</guid>

					<description><![CDATA[<p>While creating a defensive plan against cyber-attacks, knowing your adversary is paramount. Often after the shock has wore off from a breach, the effected company will ask themselves “Why us?”. It’s a valid question and one that organizations should ask before an incident occurs to better prepare themselves. There are a multitude of reasons why...</p>
<p>The post <a href="https://threatpotential.com/how-attackers-find-you/">How Attackers Find You</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>While creating a defensive plan against cyber-attacks,
knowing your adversary is paramount. Often after the shock has wore off from a
breach, the effected company will ask themselves “Why us?”. It’s a valid
question and one that organizations should ask before an incident occurs to
better prepare themselves. There are a multitude of reasons why an attacker
chose your organization and below I’ve captured some of the more common reasons.
</p>



<h4 class="wp-block-heading">Opportunity</h4>



<p>These attacks are typically based on a unique opportunity
that makes your organization an easier target than others. Usually these items
are in an organization’s circle of influence and can take steps to reduce.</p>



<ul class="wp-block-list"><li><strong>Technology stack</strong><ul><li>Attackers use tools such as search engines (Google, Shodan.io) and job boards to map specific technology use that have experienced recent vulnerability disclosures or are frequently misconfigured. This also provides attackers an opportunity to try weak or default credentials to gain additional access.</li></ul></li><li><strong>Public information disclosures</strong><ul><li>Credential disclosures are commonly shared on the internet and within hacker communities. Employees often times reuse their work passwords on outside services that experience a breach which make for easy credential stuffing attacks. Services such as haveibeenpwned.com allow for organizations to effortlessly discover when a credential containing their domain has been disclosed.</li></ul></li><li><strong>Phishing</strong><ul><li>Many phishing campaigns permutate domains from lists or crawled from the internet in some fashion. If an employee falls victim to a phishing attack then they take advantage of this newly gained access, if not then they continue on to the next potential target.</li></ul></li></ul>



<h4 class="wp-block-heading">Targeted</h4>



<p>These attacks are directed at the organization itself and
often include detailed research and recognizance. Traditionally attackers will
utilize opportunistic attacks for quick access but dive much deeper.</p>



<ul class="wp-block-list"><li><strong>Industry Type</strong><ul><li>Often the type of industry that the organization is apart of will draw specific attention such as financial institutions, government entities, and industrial companies. The attacker is looking for a specific asset that the entity possesses or perhaps there’s a controversial issue which spawn hacktivism.</li></ul></li><li><strong>Target by proxy</strong><ul><li>Some organizations that experienced a breach learn that they were simply a stepping stone to leverage a relationship to attack their partner, supplier, or customer. </li></ul></li><li><strong>Insider Threat</strong><ul><li>While not historically thought of as a way of targeting an organization, insider threats such as disgruntled employees or fraud are commonplace and need to be accounted for.</li></ul></li></ul>



<p>Each organization should be having a conversation on why and
how they may be targeted in the future. In many cases, a quick and easy change
could have prevented a drastic and costly security incident.</p>
<p>The post <a href="https://threatpotential.com/how-attackers-find-you/">How Attackers Find You</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>How Often to Test</title>
		<link>https://threatpotential.com/how-often-to-test/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=how-often-to-test</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Sun, 14 Aug 2022 14:45:00 +0000</pubDate>
				<category><![CDATA[hacking]]></category>
		<category><![CDATA[penetration testing]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3470</guid>

					<description><![CDATA[<p>In today’s world, massive data breaches and sophisticated malware litter news headlines. So much that it feels as though it’s more of when your organization will fall victim rather than if. Still, many organizations choose to only meet baseline compliance requirements and seldom perform penetration testing. Sometimes just being “good”, isn’t “good enough”. Not conducting...</p>
<p>The post <a href="https://threatpotential.com/how-often-to-test/">How Often to Test</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>In today’s world, massive data breaches and sophisticated
malware litter news headlines. So much that it feels as though it’s more of
when your organization will fall victim rather than if. Still, many
organizations choose to only meet baseline compliance requirements and seldom
perform penetration testing. Sometimes just being “good”, isn’t “good enough”.
Not conducting preemptive security assessments is a recipe for disaster, but
how often is enough?</p>



<p>Most authorities will say that you should test before placing
a system or software into production and after any major change. We all agree
those are key milestones that should trigger security testing in any IT risk
management program but there’s more to it than that. It’s less about how often
you should test but more about a continuous conversation about the
ever-changing attacker landscape, your organizations risk appetite, and general
forward thinking.</p>



<h4 class="wp-block-heading"><strong>Attacker Landscape</strong> </h4>



<p>You understand what’s valuable in your organization, unfortunately attackers do too. Attackers can range from rogue employees to criminal empires, so understanding the threats against you is a critical component to your testing regimen and pace. Researching current security trends and the associated threat actor’s behavior can give you a clue as to the depth and frequency of testing required.</p>



<h4 class="wp-block-heading"><strong>Risk Appetite</strong></h4>



<p>As the saying goes, “just enough security is the right amount of security”. It doesn’t make good business sense to spend more on a security control than what you are securing. Strive to put controls in places that give you the most bang for your buck. Keep in mind that risk in general can never be completely eliminated but you can take measures to drastically reduce the impact or likelihood of an attack. Taking a defense in depth approach to protect your most valuable assets is a great starting point and a best practice.</p>



<h4 class="wp-block-heading"><strong>Forward Thinking</strong></h4>



<p>Key business endeavors can often create new attack vectors and invite threat actors you didn’t anticipate. Does your organization plan to acquire another business, move into a new industry, or on the verge of an R&amp;D breakthrough? Knowing where your organization is headed can better prepare you by creating a solid foundation for your security program.</p>



<p>Regrettably risk management isn’t a set it and forget it
activity and testing cadence is made up of a culmination of decisions.
Continuous conversation and review may be what keeps your organization’s brand
out of the notorious section of the news tomorrow.</p>
<p>The post <a href="https://threatpotential.com/how-often-to-test/">How Often to Test</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Coronavirus on Cyber Attacks</title>
		<link>https://threatpotential.com/coronavirus-on-cyber-attacks/?utm_source=rss&#038;utm_medium=rss&#038;utm_campaign=coronavirus-on-cyber-attacks</link>
		
		<dc:creator><![CDATA[threatpotential]]></dc:creator>
		<pubDate>Fri, 10 Jun 2022 20:10:07 +0000</pubDate>
				<category><![CDATA[hacking]]></category>
		<category><![CDATA[password attacks]]></category>
		<guid isPermaLink="false">https://threatpotential.com/?p=3453</guid>

					<description><![CDATA[<p>Our sources have noted a severe uptick in cyber attacks with the outbreak of Coronavirus. This means that businesses and users should be extra diligent during these times not only in the real world for their personal health but on the Internet as well. Based on what we’re seeing there are a few items of...</p>
<p>The post <a href="https://threatpotential.com/coronavirus-on-cyber-attacks/">Coronavirus on Cyber Attacks</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Our sources have noted a severe uptick in cyber attacks with the outbreak of Coronavirus. This means that businesses and users should be extra diligent during these times not only in the real world for their personal health but on the Internet as well. Based on what we’re seeing there are a few items of note.</p>



<h4 class="wp-block-heading">Security teams working remote</h4>



<p>First, most non-outsourced SOC’s (Security Operation Centers) are strictly an onsite job. A lot of the tools, networks, and security procedures are built in such a way that this is a requirement. However, with the Coronavirus outbreak many organizations are choosing to have all their employee’s work from home. This has caused a disruption in security monitoring and response while team’s scramble to set up a remote work operation.</p>



<h4 class="wp-block-heading">Normal resources are restricted</h4>



<p>Secondly, many agencies are only coming out for violent or life-threatening calls. With the surge in healthcare attention and resources, malicious actors feel their actions will get lost in the fray. </p>



<h4 class="wp-block-heading">More Internet usage</h4>



<p>With social distancing and quarantine, people are online
more than ever before. This creates additional opportunities for contact with
attackers and they are taking full advantage. Boredom traditionally feeds exploration
or curiosity and many users find themselves opening emails or navigating to
parts of the web they don’t traditionally.</p>



<h4 class="wp-block-heading">Coronavirus stimulus checks</h4>



<p>Lastly, the Coronavirus stimulus checks have created a massive fraud target pool for attackers. The FTC has already released information to help <a href="https://www.consumer.ftc.gov/blog/2020/03/checks-government">fight against frauds</a> and they haven’t even cut the first check yet. We fully expect to see massive amounts of successful fraud attempts from this stimulus check campaign.</p>



<h4 class="wp-block-heading">Ways to help</h4>



<p>The important message is to ensure you are keeping your assets and your information as secure as possible from cyber attacks. We’re starting a new Dark Web Assessment to help those who are serious about their informational footprint online. We scour the dark web, private hacker forums, and public breach disclosures for your private information. We’ll show you what they have, where they got it, and how to best protect yourself going forward. So give us a call <a href="https://threatpotential.com/contact-us/">(888) 531-3011</a> today!</p>
<p>The post <a href="https://threatpotential.com/coronavirus-on-cyber-attacks/">Coronavirus on Cyber Attacks</a> appeared first on <a href="https://threatpotential.com">Threat Potential</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
