Posts

Showing posts from February, 2021

Is AI a Double-Edged Sword In Cybersecurity?

Image
Whether you consider it good or bad, Artificial Intelligence (AI) is the next stage of our technical evolution. Like major technological advances before (electricity, computers, the internet), AI will usher new changes and impact almost every facet of our everyday life. In fact, we can already see AI's impact on social media marketing, search engines like Google that keep on learning from our search patterns and behaviours, and in   improved healthcare . It’s safe to say that AI’s intervention in   our societies  and our lives will be more far-reaching than we now realize, and cybersecurity is no exception. AI and Cybersecurity Right now, AI’s overlap with cybersecurity is fairly limited. It’s used by both cybersecurity and information security professionals to improve their security systems and prepare for the next generation of cyberattacks. The attack surface of enterprises, i.e., all the avenues where a cyberattack can come from, is expanding quite rapidly. The more a...

Neutralizing the Latest Cyber Attack: A Guide to Credential Stuffing Prevention

Image
  If you have watched any spy movies or movies where thieves are portrayed as heroes (there is no shortage of them, unfortunately), you might be familiar with the concept of a "master key." A master key is supposed to open a wide variety of locks, each of which has its own unique key. The less glamorous and more practical application of master keys can be found in hotels and large residential buildings. The hotel or building manager has a master key that they can use to open any door if the original key is lost or they need to get in when the original key-holder isn’t available. And even though physical locks and keys are being replaced by electronic door locks and keycards, the concept of master keys is still there. This concept of a master key can be used to explain credential stuffing. 1.       What Is Credential Stuffing? 2.       Credential Stuffing vs Brute Force vs Password Spraying 3. The Scope Of T...