• 5 Posts
  • 429 Comments
Joined 1 year ago
cake
Cake day: June 13th, 2023

help-circle









  • “And immediately after we had removed them from the environment, another attack set off, which we attributed to the same group trying to get back in through other means,” he added.

    This happened within 24 hours, with a credential-stuffing attack. “There was no opsec, no slow-and-low,” Dwyer said. “They put the persistent in APT. Once they identify a target as valuable to them and their goals and objectives, they will continue to try to get back in.”

    And this is from a company that seems to at least sort of take security seriously (ignoring the glaring error that got them in this situation). Responding to this threat seems like a challenge for most companies down the supply chain.







  • treadful@lemmy.ziptolinuxmemes@lemmy.worldAbout that...
    link
    fedilink
    English
    arrow-up
    2
    ·
    8 days ago

    Technically it reduces the window for a successful brute force.

    That said, it comes with serious drawbacks. Mainly making them impossible to memorize, so then users end up just writing them on post-its and putting them on their monitor. Or other equally dumb things.