logo
  • About
  • Contact
  • Instant Response
  • Hall of fame
  • COVID-19

Categories

  • Alerts and warnings
  • BU Safe
  • Hit by ransomware?
  • Incident handling
  • News

Noticed a problem?

Report an Incident
–or–

Recent Posts

  • Inside the Mind of a Cyber Attacker: from Malware creation to Data Exfiltration (Part 1)
  • How the combination of XDR and SIEM can improve SOC operations
  • MOVEit Transfer zero-day was exploited by Cl0p gang (CVE-2023-34362)
  • Cybercriminals Exploit Legitimate Websites for Credit Card Theft
  • Microsoft Makes SMB Signing Default Requirement in Windows 11 to Boost Security

Video

https://www.youtube.com/watch?v=wMsHDH67eb4

RSS NVD Data Feed

  • CVE-2023-33642 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33641 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33640 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33643 (magic_r300-2100m_firmware) 31 May 2023
  • CVE-2023-33628 (magic_r300-2100m_firmware) 31 May 2023

RSS CERT-EU News Feed

Information

  • Privacy & Cookies Policy

Rampant password reuse puts companies and customers at risk

Posted on 15 February 2021

From helpnetsecurity.com

password reuse risk

25.9 million business account credentials and over 543 million breach assets tied to employees in the Fortune 1000 are readily available on the criminal underground, SpyCloud reveals.

Read more…

Posted in News

Post navigation

Previous post: Microsoft says it found 1,000-plus developers’ fingerprints on the SolarWinds attack
Next post: Well-known car rental company victim of DarkSide ransomware
BU CERT
Authorized to use CERT(TM) - CERT is a mark owned by Carnegie
Mellon University

Other CERTs

  • National Cyber Security Centre
  • US-CERT
  • FORTHcert
Proudly powered by WordPress | Theme: bu-cert by Nan Jiang.