Blog

Insights on ATO, Consumer Fraud, Ransomware, the criminal underground and more

RSA Event Featured Image

5 Key Takeaways from RSAC 2023

RSAC’s 2023 theme of Stronger Together rang true throughout the event, with discussions on how to tackle and safely evolve AI’s impact on cybersecurity, third-party risk management, and the path forward for the industry.

Read More
2022 Year In Review

2022 in Review: The Year of Ransomware

Ransomware has been a growing cyber threat for several years but with increased sophistication and methods it seems like 2022 was really the year it took off. Here we break down the trends and ways organizations can better prepare in 2023 and beyond!

Read More
Strong Password Tips

Tips for Strong Passwords

With stolen credentials being the #1 entry point for cybercriminals, password security has never been more critical. We offer five tips for stronger passwords for users and enterprises alike.

Read More
mfa-bypass-blog-hero

Trends in MFA in a WFH World

Increased adoption of MFA is a good thing for cybersecurity, especially as remote work grows in popularity – and preference – but humans remain the weakest link.

Read More
Breach or Credential Stuffing

Was It a Breach or Credential Stuffing?

We’ve noticed a trend where media headlines equate data breaches & credential stuffing. The difference is critical for companies like Zoom, Nintendo, and Spotify, who made headlines in 2020 for the wrong reasons & suffered brand damage as a result.

Read More
Understanding the SolarWinds Supply Chain Attack

Breaking Down the SolarWinds Supply Chain Attack

It will be years – maybe decades – before we know the true extent of the fallout from the SolarWinds Orion software supply chain compromise. Based on what we know so far, SpyCloud has broken down the stages of this targeted, identity-based attack.

Read More
Unemployment Fraud - Recommendations for agencies, fraud teams, employers and individuals

Unemployment Fraud: Who is Using Your Identity to Collect?

Criminals are using stolen credentials and PII to impersonate unemployed workers, diverting the funds from benefit claims into their own pockets. With $26 billion at risk, we provide recommendations for government agencies, fraud teams, employers and individuals on how to stop the bleed.

Read More
Discord Dark Web - SpyCloud Blog

Discord’s Dark (Web) Side

Displaced darknet communities have found a new home on Discord. See what’s being sold and traded – and learn what to do if you happen to come across these activities.

Read More
How long would it take to crack your password?

How long would it take to crack your password?

Our survey of IT security leaders found organizations are investing in layers of defense against authentication-based attacks, but it still isn’t enough. Here we discuss the issues with passwords, passkeys, and MFA + additional steps beyond these measures security teams can take to close the gaps in their defenses.

Read More
CISO Recipe for Peaceful Sleep

CISO Recipe for Peaceful Sleep

As CISO, your job may keep you up at night worrying about your employees’ and customers’ leaked credentials. There’s plenty to worry about, but you can take proactive steps to find more restful sleep.

Read More

Transforming recaptured data to protect your business.