Tag

Credential Theft

Posts exploring how attackers steal usernames, passwords, and authentication tokens through phishing, keylogging, brute force attacks, and credential stuffing. Includes actionable guidance on multi-factor authentication, password managers, and monitoring for compromised credentials.

posts

Password Manager

Why Use a Password Manager: The Case Is Overwhelming

The Breach That Started With "Company123!" In 2024, the credential stuffing attack against Roku compromised over 576,000 accounts. The attackers didn't exploit some exotic zero-day vulnerability. They used passwords stolen from other breaches and tried them against Roku accounts — because people reuse passwords everywhere. That

Carl B. Johnson Apr 10, 2026 6 min read
Password Manager

Why Use a Password Manager: Stop Reusing Passwords

The Breach That Started With One Reused Password In 2022, a single employee at LastPass reused credentials across personal and work accounts. A threat actor exploited that overlap, eventually compromising encrypted password vaults for millions of users. The irony — a password management company breached because of poor password hygiene — should

Carl B. Johnson Apr 08, 2026 5 min read
Social Engineering Examples

Social Engineering Examples: 7 Real Attacks That Worked

In September 2022, a teenager allegedly convinced an Uber employee to hand over access credentials through a simple text message. No zero-day exploit. No sophisticated malware. Just a convincing story and a target who didn't verify the request. That single social engineering attack gave the threat actor access

Carl B. Johnson Apr 06, 2026 5 min read
Phishing

What Is Phishing? A Security Pro's Real-World Guide

A Single Email Cost This Company $100 Million In 2017, a Lithuanian man tricked Google and Facebook employees into wiring over $100 million to bank accounts he controlled. His weapon wasn't malware. It wasn't a zero-day exploit. It was email. He sent invoices that looked like

Carl B. Johnson Apr 05, 2026 5 min read
Cyber Hygiene

What Is Cyber Hygiene? The Daily Habits That Stop Breaches

A Single Unpatched Laptop Cost One Hospital $3 Million In 2023, the U.S. Department of Health and Human Services settled with a healthcare provider after a ransomware attack that started on one employee's unpatched workstation. The machine hadn't been updated in over 90 days. That

Carl B. Johnson Apr 02, 2026 5 min read
Trojan Horse Malware

Trojan Horse Malware: What It Really Does to You

In 2023, the FBI's Internet Crime Complaint Center received over 880,000 complaints with losses exceeding $12.5 billion — and a staggering number of those incidents started with a single file that looked perfectly legitimate. That file was trojan horse malware, disguised as an invoice, a software update,

Carl B. Johnson Apr 01, 2026 5 min read
Spoofing

Spoofing Attacks: How Hackers Impersonate Trust

In July 2020, a seventeen-year-old in Florida used phone-based spoofing and social engineering to compromise internal Twitter tools, hijacking the verified accounts of Barack Obama, Elon Musk, Jeff Bezos, and Apple. The attackers impersonated IT staff during phone calls to Twitter employees, spoofing caller IDs to appear legitimate. Within hours,

Carl B. Johnson Aug 25, 2021 8 min read
Spear Phishing

Spear Phishing: Why Targeted Attacks Beat Your Defenses

In July 2020, a teenager from Florida used spear phishing to compromise the internal tools at Twitter, hijacking 130 high-profile accounts — including those of Barack Obama, Elon Musk, and Apple — to run a Bitcoin scam. The attack didn't exploit some exotic zero-day vulnerability. It started with targeted messages

Carl B. Johnson Aug 24, 2021 7 min read
AI Phishing Attacks

FBI Warns Gmail Users: AI-Driven Phishing Attacks Rise

Earlier this year, the FBI's Internet Crime Complaint Center (IC3) reported that phishing schemes were the most reported cybercrime in 2020, with 241,342 complaints and adjusted losses exceeding $54 million. Now the threat is evolving fast. The FBI warns Gmail users of sophisticated AI-driven phishing attacks that

Carl B. Johnson Aug 24, 2021 7 min read