Five Critical Password Security Rules Your Employees Are Ignoring
According to Keeper Security’s Workplace Password Malpractice Report, many remote workers aren’t following best practices for password security.
Password security was a problem even before the advent of widespread remote work.
Strong passwords are at least eight characters long and consist of random strings of letters, numerals, and special characters.
Some things should never be recycled — like passwords. When employees reuse passwords across accounts, they greatly increase the risk that their employer will be breached.
Using a strong, unique password for every account is only a starting point. Employees also need to store their passwords securely. Keeper’s survey demonstrated that they’re not doing that:
57% of respondents write down their passwords on sticky notes, and 62% write down their passwords in a notebook or journal, which anyone else living in or visiting the home can access.
Work passwords are confidential business information that employees should never share with anyone outside the organization, not even their spouses.
Shared passwords in the workplace can be done safely if employees share passwords using a secure method, and the passwords are shared only with authorized parties.
Keeper’s enterprise-grade password security and encryption platform helps organizations prevent password malpractice — and password-related cyberattacks — by giving IT administrators complete visibility into employee password practices, as well as the ability to enforce password security rules company-wide.
Seamlessly integrates into any IAM tech stack. Keeper integrates with Azure, AD, LDAP, and SSO, making it a critical part of any modern IAM strategy.
Automatically generates strong, unique passwords. Keeper automatically generates strong, random, unique passwords for every account and app.
Securely stores passwords in an encrypted digital vault. Each employee gets an encrypted digital vault that they can access from any device, running any operating system.
Turns Out That Low-Risk iOS Wi-Fi Naming Bug Can Hack iPhones Remotely
The denial-of-service vulnerability, which came to light last month, stemmed from the way iOS handled string formats associated with the SSID input, triggering a crash on any up-to-date iPhone that connected to any wireless access points with percent symbols in their names such as
Stack Overflow Teams
ZecOps nicknamed the issue «WiFiDemon.» It’s also a zero-click vulnerability in that it allows the threat actor to infect a device without requiring any user interaction, although it requires that the setting to automatically join Wi-Fi networks is enabled . «If the user is connected to an existing Wi-Fi network, an attacker can launch another attack to disconnect/de-associate the device and then launch this zero-click attack».
Prevent Ransomware Attacks
«After turning off the malicious access point, the user’s Wi-Fi function will be normal. A user could hardly notice if they have been attacked». Given the exploitable nature of the bug, it’s highly recommended that iPhone and iPad users update their devices to the latest iOS version to mitigate the risk associated with the vulnerability.
Researchers Warn of Linux Cryptojacking Attackers Operating from Romania
A threat group likely based in Romania and active since at least 2020 has been behind an active cryptojacking campaign targeting Linux-based machines with a previously undocumented SSH brute-forcer written in Golang.
Stack Overflow Teams
While the goal of the campaign is to deploy Monero mining malware by remotely compromising the devices via brute-force attacks, the researchers connected the gang to at least two DDoS botnets, including a Demonbot variant called chernobyl and a Perl IRC bot, with the XMRig mining payload hosted on a domain named mexalz us since February 2021.
Linux Cryptojacking Attackers
The Romanian cybersecurity technology company said it began its investigation into the group’s cyber activities in May 2021, leading to the subsequent discovery of the adversary’s attack infrastructure and toolkit.
The group is also known for relying on a bag of obfuscation tricks that enable them to slip under the radar.
Prevent Data Breaches
Using Discord as a data exfiltration platform also absolves the need for threat actors to host their own command-and-control server, not to mention enabling support for creating communities centered around buying and selling malware source code and services.
«Hackers going after weak SSH credentials is not uncommon,» the researchers said.
Stay Focused. Stay Vigilant.
Cyber Threat Incident Management Team — Cyber Security Community @ SLIIT