Tag

Credential Theft

Posts exploring how attackers steal usernames, passwords, and authentication tokens through phishing, keylogging, brute force attacks, and credential stuffing. Includes actionable guidance on multi-factor authentication, password managers, and monitoring for compromised credentials.

posts

Ransomware

How Ransomware Spreads: 7 Paths Into Your Network

In May 2021, a single compromised VPN password shut down the largest fuel pipeline in the United States. The Colonial Pipeline attack didn't start with some exotic zero-day exploit. It started with a stolen credential. That's the reality of how ransomware spreads — and it's

Carl B. Johnson Nov 30, 2019 6 min read
Data Breach Prevention

Data Breach Prevention: 9 Steps That Actually Work

The Breach That Cost Change Healthcare Everything In February 2024, a threat actor used stolen credentials to access Change Healthcare's systems — systems that lacked multi-factor authentication on a critical remote access portal. The result? A ransomware attack that disrupted pharmacy operations across the United States for weeks and

Carl B. Johnson Nov 26, 2019 6 min read
Data Breach Examples

Data Breach Examples 2026: Lessons from This Year

2026 Has Already Been Brutal for Data Security We're barely halfway through the year, and the data breach examples from 2026 already paint a grim picture. Healthcare systems, school districts, financial platforms, and major retailers have all made headlines — not for innovation, but for failing to protect customer

Carl B. Johnson Nov 26, 2019 6 min read
Strong Passwords

How to Create a Strong Password That Actually Stops Hackers

In 2023, a single reused password gave threat actors access to 23andMe's credential-stuffing attack, exposing the genetic data of nearly 7 million users. The attackers didn't exploit some exotic zero-day vulnerability. They just tried stolen username-password pairs from other breaches — and millions of them worked. If

Carl B. Johnson Nov 26, 2019 6 min read
Password Manager

Why Use a Password Manager: The Case Is Settled

The 24 Billion Stolen Passwords Sitting on the Dark Web Researchers at Digital Shadows found over 24 billion username-and-password combinations circulating on dark web marketplaces. That number keeps climbing. If you're still asking why use a password manager, the stolen credential economy already answered for you — your reused

Carl B. Johnson Nov 02, 2019 6 min read
Password Hygiene Tips

Password Hygiene Tips That Actually Stop Breaches

The 80% Problem Nobody Wants to Talk About The 2024 Verizon Data Breach Investigations Report found that stolen credentials were involved in roughly 31% of all breaches over the past decade — and that human-element breaches, including credential theft and phishing, accounted for nearly 68% of incidents in their latest dataset.

Carl B. Johnson Nov 02, 2019 6 min read
Insider Threat Examples

Insider Threat Examples: Real Breaches That Cost Millions

The Threat Already Inside Your Building In 2022, a former employee at Cash App's parent company, Block, downloaded reports containing the personal information of 8.2 million customers — months after leaving the company. Block disclosed the breach in an SEC filing, and lawsuits followed. The attacker didn'

Carl B. Johnson Oct 01, 2019 7 min read
Insider Threats

How to Prevent Insider Threats Before They Cost Millions

In 2022, a former employee at Cash App's parent company, Block Inc., downloaded reports containing the personal information of over 8 million customers — months after they'd left the company. The access was never revoked. No alarm was triggered. The breach wasn't discovered until the

Carl B. Johnson Oct 01, 2019 7 min read
Insider Threats

Malicious Insider vs Negligent Insider: Real Threat Guide

One Employee Stole Data for Profit. The Other Just Clicked the Wrong Link. In 2022, a former employee of a major healthcare organization was sentenced to federal prison for stealing patient records and selling them. That same year, the Verizon Data Breach Investigations Report found that 82% of breaches involved

Carl B. Johnson Oct 01, 2019 7 min read