The very common type of web attack today is credential stuffing. The attackers take stolen passwords from data breaches and use tools to automatically log in to every matching account on other websites to take over those accounts to steal money or the or data. Cybercrime has become a business, and for any growing business, it is all about scale…
Tag: Automation
From Cybersecurity Sisyphus to Cybersecurity Alchemist
Greek civilization was the most influential civilization in the history of the world. Although people of all countries, eras, and stages of civilization have developed myths that explain the existence and workings of natural phenomena, recount the deeds of gods or heroes, or seek to justify social or political institutions, the myths of the Greeks have remained unrivaled in the…
Artificial Intelligence and Changing Face of Cybersecurity
The cybersecurity attacks are evolved from wild predator-prey chase to well-designed targeted attacks which are creating significant financial and reputational damages to businesses and government. Identification of these attacks is becoming very difficult for the cybersecurity defense teams as the signs of these attacks are very subtle. Hacker are using disruptive technologies like Artificial Intelligence (AI) and machine learning to…