Tag

Credential Theft

Posts exploring how attackers steal usernames, passwords, and authentication tokens through phishing, keylogging, brute force attacks, and credential stuffing. Includes actionable guidance on multi-factor authentication, password managers, and monitoring for compromised credentials.

posts

Password Manager

Why Use a Password Manager: A Security Pro's Take

In December 2020, SolarWinds disclosed one of the most devastating supply chain compromises in history. But buried in the early reporting was a detail that made every security professional wince: a critical password — "solarwinds123" — had been publicly accessible on GitHub. One weak, reused, laughably simple password contributed to

Carl B. Johnson Jan 03, 2021 6 min read
Password Hygiene Tips

Password Hygiene Tips That Actually Stop Breaches

In December 2020, SolarWinds disclosed a supply chain compromise that shook the entire cybersecurity industry. But while the world was focused on nation-state threat actors, Verizon's 2020 Data Breach Investigations Report had already confirmed something far more common and just as devastating: over 80% of hacking-related breaches involved

Carl B. Johnson Jan 03, 2021 7 min read
Insider Threats

How to Prevent Insider Threats: A Practical Guide

In July 2020, a 17-year-old in Florida convinced a Twitter employee to hand over internal tool credentials. Within hours, threat actors had hijacked high-profile accounts — Barack Obama, Elon Musk, Apple — and ran a Bitcoin scam that netted over $100,000. The breach didn't start with a zero-day exploit

Carl B. Johnson Dec 20, 2020 7 min read
Remote Work Cybersecurity Tips

Remote Work Cybersecurity Tips That Actually Work

The Largest Unplanned Security Experiment in History In March 2020, roughly 16 million U.S. knowledge workers shifted to remote work within two weeks. That's not a migration. That's an evacuation. And like any evacuation, people grabbed what they could and ran — personal laptops, home Wi-Fi

Carl B. Johnson Nov 08, 2020 6 min read
VPN Best Practices

VPN Best Practices: What Actually Protects You in 2026

In early 2024, Ivanti disclosed critical vulnerabilities in its Connect Secure VPN that were already being actively exploited by threat actors — including nation-state groups. CISA issued an emergency directive ordering federal agencies to disconnect affected devices within 48 hours. It was a brutal reminder: a VPN isn't a

Carl B. Johnson Nov 08, 2020 7 min read
Remote Desktop Security Risks

Remote Desktop Security Risks That Lead to Breaches

A Single Exposed RDP Port Cost One Hospital Everything In 2023, a regional hospital in Illinois discovered that attackers had been inside their network for over three weeks. The entry point? A single Remote Desktop Protocol (RDP) port left open to the internet. The threat actors used brute-forced credentials to

Carl B. Johnson Nov 08, 2020 6 min read
Cloud Storage Security Risks

Cloud Storage Security Risks Your Team Is Ignoring

The Misconfigured Bucket That Exposed 540 Million Records In 2019, researchers at UpGuard discovered that Facebook app developers had stored hundreds of millions of user records in Amazon S3 buckets with public access enabled. No hacking. No zero-day exploit. Just a misconfiguration checkbox that nobody reviewed. That single oversight sits

Carl B. Johnson Oct 27, 2020 7 min read
Securing Cloud Applications

Securing Cloud Applications: A Practical Guide for 2026

The Misconfiguration That Exposed 100 Million Records In 2019, Capital One learned the hard way that a single misconfigured web application firewall in AWS could expose the personal data of over 100 million customers. The breach cost the company more than $270 million in fines and remediation. That incident wasn&

Carl B. Johnson Oct 27, 2020 7 min read
Mobile Phishing Attacks

Mobile Phishing Attacks: Why Your Phone Is Now Target #1

82% of Phishing Sites Now Target Mobile Devices In late 2024, a wave of toll-road smishing texts hit millions of Americans. The messages claimed unpaid tolls from agencies like E-ZPass and SunPass, directing victims to pixel-perfect payment pages optimized for mobile screens. The FBI's Internet Crime Complaint Center

Carl B. Johnson Oct 10, 2020 7 min read