<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Industry News Archives - Password RBL</title>
	<atom:link href="https://www.passwordrbl.com/blog/category/industry-news/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.passwordrbl.com/blog/category/industry-news/</link>
	<description>Real-time Password Blacklist</description>
	<lastBuildDate>Thu, 21 Dec 2023 04:14:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.passwordrbl.com/wp-content/uploads/2020/05/cropped-Special_SmallRes_White_Circle_cropped-32x32.png</url>
	<title>Industry News Archives - Password RBL</title>
	<link>https://www.passwordrbl.com/blog/category/industry-news/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Zero-Trust Before It Was Cool</title>
		<link>https://www.passwordrbl.com/blog/zero-trust-before-it-was-cool/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Tue, 07 Jun 2022 16:55:40 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80201</guid>

					<description><![CDATA[<p>Password RBL&#8217;s secure design has always been zero-trust.  In fact, Password RBL was zero-trust before zero-trust was even a phrase.  [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/zero-trust-before-it-was-cool/">Zero-Trust Before It Was Cool</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password RBL&#8217;s secure design has always been zero-trust.  In fact, Password RBL was zero-trust before zero-trust was even a phrase.  Nowadays it seems every product is scrambling for a way to claim it is zero-trust.  But Password RBL&#8217;s original focus was on security &#8211; even before there was a viable product.  Since the service would be screening customer&#8217;s passwords, it was assumed that there would never be any customers if the service was not &#8220;obviously secure&#8221; (the original phrase used to describe Password RBL).</p>
<p>So we set out to make a Password Blacklisting service that was &#8220;obviously secure.&#8221;  A password screening service that had no possibly of ever knowing the password choices involved.  Or the username associated with the password.  Or even the customer sending the query.  A service where customers did not have to extend any trust or sacrifice any security to use the service.  This is what we built at Password RBL.  But the industry came up with a concise way to describe such a service:  &#8220;zero-trust.&#8221;</p>
<p>For additional details, <a href="https://www.passwordrbl.com/about-security/">follow this link</a> to read about how Password RBL&#8217;s architecture truly is zero-trust.</p>
<p>TL;DR: Password RBL was &#8220;zero-trust&#8221; before it was cool.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/zero-trust-before-it-was-cool/">Zero-Trust Before It Was Cool</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password RBL Statement on Log4j Vulnerability</title>
		<link>https://www.passwordrbl.com/blog/statement-on-log4j-vulnerability/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Wed, 15 Dec 2021 13:55:36 +0000</pubDate>
				<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80126</guid>

					<description><![CDATA[<p>The internet is abuzz about the recent disclosure of a critical vulnerability in the popular the open-source logging library Log4j. [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/statement-on-log4j-vulnerability/">Password RBL Statement on Log4j Vulnerability</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The internet is abuzz about the recent disclosure of a <a href="https://logging.apache.org/log4j/2.x/security.html#cve-2021-44228" target="_blank" rel="noopener">critical vulnerability</a> in the popular the open-source logging library <a href="https://logging.apache.org/log4j/2.x/index.html" target="_blank" rel="noopener">Log4j</a>. Rightfully so, the worst of the vulnerabilities, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228" target="_blank" rel="noopener">CVE-2021-44228</a>, disclosed on Friday, December 10, 2021, is as bad as it gets, allowing an attacker to completely takeover a target system with minimal effort.  The vulnerability has earned a critical rating score of 10 out of 10 on the CVSS severity model.</p>
<p>&nbsp;</p>
<h2>Password RBL Unaffected by Log4j Vulnerability</h2>
<p>Password RBL is not impacted by this log4j vulnerability because Password RBL does not utilize this library in any systems.</p>
<p>This should not be surprising, since Password RBL has a <a href="https://www.passwordrbl.com/about-security/" target="_blank" rel="noopener">zero-logging policy</a>.  Thus, Password RBL has no need for a code library that provides advanced logging services.  But it is important for subscribers to know that Password RBL is unaffected by this recent vulnerability and continues to be a secure and easy way to prevent bad passwords before they happen.</p>
<p>&nbsp;</p>
<h2>Update on Additional Vulnerabilities</h2>
<p>Since the original positing of this statement, <a href="https://logging.apache.org/log4j/2.x/security.html" target="_blank" rel="noopener">additional vulnerabilities</a> in the log4j library have been disclosed.  Password RBL remains unaffected by these additional vulnerabilities as well, since Password RBL does not utilize the log4j library at all.</p>
<p>&nbsp;</p>
<h3>Not a customer?</h3>
<p>If you are not yet a customer of Password RBL but are interested in better passwords for your organization, then follow this link to <a href="https://www.passwordrbl.com/solutions/" target="_blank" rel="noopener">learn more</a> and read about why our zero-trust solution for better passwords <a href="https://www.passwordrbl.com/about-security/" target="_blank" rel="noopener">really is secure</a>.  Our solutions are easy to use and subscription costs are <a href="https://www.passwordrbl.com/packages/" target="_blank" rel="noopener">very reasonable</a>.  Subscribe today!</p>
<p>The post <a href="https://www.passwordrbl.com/blog/statement-on-log4j-vulnerability/">Password RBL Statement on Log4j Vulnerability</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Attitudes and Behaviors Report</title>
		<link>https://www.passwordrbl.com/blog/cybersecurity-attitudes-and-behaviors-report-2021/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sun, 17 Oct 2021 21:32:28 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[API Access]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80107</guid>

					<description><![CDATA[<p>The National Cybersecurity Alliance (NCSA) has released their Attitudes and Behaviors report for 2021, and, honestly, it&#8217;s not great.  Well, [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/cybersecurity-attitudes-and-behaviors-report-2021/">Cybersecurity Attitudes and Behaviors Report</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The <a href="https://staysafeonline.org/" target="_blank" rel="noopener">National Cybersecurity Alliance (NCSA)</a> has released their <a href="https://staysafeonline.org/resource/oh-behave-2021/" target="_blank" rel="noopener">Attitudes and Behaviors report for 2021</a>, and, honestly, it&#8217;s not great.  Well, the reporting is great, and it&#8217;s great that the NCSA conducts and releases this annual report.  But the content of the report contains some not-so-great behaviors among real users.</p>
<h2>MFA</h2>
<p>As we know, Multi-Factor Authentication (MFA) is a great way to combat potential account takeovers or just general bad password hygiene.  Even when MFA is used, <a href="https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/">Password Blacklisting still makes sense</a>.  But if MFA is not in use, then Password Blacklisting is an absolute must!   Unfortunately, the report found that 52% of people have never heard of MFA.  This makes enforcing strong passwords even more important.  But why is this?  Well, 64% say they have no access to MFA, and another 10% say they do have access MFA, but choose not to use it.</p>
<p>&nbsp;</p>
<h2>Responsibility</h2>
<p>Additionally, the data indicates a significant proportion of people simply do not see themselves as responsible for looking after their workplace’s sensitive information.  Over a third (40%) of the full-time and part-time employees participating in this report considered themselves to be the least responsible agency for their organization’s cybersecurity.  That means that nearly half of your employees don&#8217;t think it&#8217;s their responsibility to choose a strong password!  This statistic is alarming and makes the case for all businesses to deploy Password Blacklisting in order to prevent users from choosing poor passwords.</p>
<p>&nbsp;</p>
<h2>Passwords</h2>
<p>Speaking of passwords, the report also discovered some alarming, but simultaneously not surprising, statistics on real-life password behaviors.  Only 43% of participants reported creating long and unique passwords for their online accounts “very often” or “always”. However, almost a third (28%) stated that they didn’t do so.  A third of real-life users are knowingly choosing weak passwords!  That&#8217;s a big number!</p>
<p>But about the more middle-of-the-road, average password behavior.  It&#8217;s still not great.  A majority (58%) of the respondents say they only &#8220;sometimes&#8221; (30%), &#8220;rarely&#8221; (18%), or &#8220;never&#8221; (10%) create long (12 character) and unique passwords.  This is probably because use of a stand-alone password manager application, which would create these long unique passwords, was uncommon, with almost half (49%) of the participants noting they ‘never’ or ‘rarely’ used one.</p>
<p>&nbsp;</p>
<h2>Not Great.  But What To Do?</h2>
<p>The full Cybersecurity Attitudes and Behaviors report (<a href="https://staysafeonline.org/resource/oh-behave-2021/" target="_blank" rel="noopener">available here</a>) contains lots more information and statistics.  But even with just the few takeaways mentioned above, it&#8217;s clear that more work needs to be done.  Deployment of Multi-Factor Authentication would absolutely help, but by 2021, the reason MFA isn&#8217;t completely pervasive is because of many real-life problems, including end-user adoption woes, cost to the business, supportability, and definitely incomplete deployments since businesses commonly support legacy systems which have no concept of MFA &#8211; or anything other than usernames and passwords, really.</p>
<p>Enter Password Blacklisting &#8211; the incredibly affordable and easy to use solution to the bad password problem.  Password RBL has drop-in support for Microsoft Active Directory (and anything linked to AD) and a dead-simple API that can be incorporated into basically anything else.  The return on investment (ROI) of a subscription to Password RBL makes deployment an easy choice &#8211; for IT and decision makers.  See our <a href="https://www.passwordrbl.com/solutions/">solutions</a> in action and <a href="https://www.passwordrbl.com/request-a-quote/">request a free quote</a> today!</p>
<p>The post <a href="https://www.passwordrbl.com/blog/cybersecurity-attitudes-and-behaviors-report-2021/">Cybersecurity Attitudes and Behaviors Report</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password Attacks Continue to Cause Major Problems</title>
		<link>https://www.passwordrbl.com/blog/password-attacks-continue-to-cause-major-problems/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 14:39:33 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80113</guid>

					<description><![CDATA[<p>Password attacks continue to cause major problems.  These attacks are as old as passwords themselves, and seemingly will never go [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-attacks-continue-to-cause-major-problems/">Password Attacks Continue to Cause Major Problems</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password attacks continue to cause major problems.  These attacks are as old as passwords themselves, and seemingly will never go away.  Every year there are more and more high profile attacks or breaches get traced back to poor password hygiene.  Most critics lament that if only these companies had deployed Multi-Factor Authentication (MFA), this wouldn&#8217;t have happened.  But MFA doesn&#8217;t get deployed for a multitude of real-life reasons, including cost, incompatibility with older systems, end-user acceptance, etc.  And the incredibly cost-effective and simple solution of Password Blacklisting could have also stopped these attacks and without the negatives associated with MFA.</p>
<h2>Pipeline Problems</h2>
<p>In May 2021, a <a href="https://www.theverge.com/2021/6/5/22520297/compromised-password-reportedly-allowed-hackers-colonial-pipeline-cyberattack" target="_blank" rel="noopener">password-based hack of Colonial Pipeline Co</a>. took down the largest fuel pipeline in the U.S. which led to fuel shortages all across the East Coast.  It was a single compromised password that allowed the attackers to completely shutdown the company and cause devastating downstream affects, including a run on fuel, higher fuel prices, but also a data breach of customer information as well.  If the company had just implemented Password Blacklisting, the poor password choice would have been caught and prevented from use in the first place.  No MFA required.</p>
<p>&nbsp;</p>
<h2>Supply Chain Problems</h2>
<p>Of course we all remember the <a href="https://www.itpro.com/security/cyber-attacks/358738/intern-blamed-for-weak-password-that-may-have-sparked-solarwinds" target="_blank" rel="noopener">Solarwinds hack from late 2020</a>.  Again, a single compromised password, &#8220;solarwinds123&#8221;, was found in data breach data from 2019.  The company&#8217;s poor password hygiene allowed a user to choose such a terribly crafted password.  And it doesn&#8217;t matter if it was an intern, manager or leader.  A single compromised account spells disaster.  And in the case of Solarwinds, it was not only disasters for Solarwinds, but all of their downstream customers, too.  Once in the Solarwinds network, the attackers were able to change the code of their product, granting access to any Solarwinds customer who installed the latest version &#8211; and there were some big customers hit by this, including numerous departments of the US Government and many Fortune 500 companies.</p>
<p>&nbsp;</p>
<h2>A Simple Solution</h2>
<p>The easiest and most cost effective way to combat these types of attacks is to deploy Password Blacklisting.  It&#8217;s incredibly easy to do &#8211; much easier than deploying MFA.  There isn&#8217;t even a requirement to change end-user behavior or provide training.  A subscription to Password RBL is incredibly inexpensive and easy to deploy, adding another layer to your companies security stack.  Check out our <a href="https://www.passwordrbl.com/solutions/">solutions</a> and <a href="https://www.passwordrbl.com/request-a-quote/">request a quote</a> today!</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-attacks-continue-to-cause-major-problems/">Password Attacks Continue to Cause Major Problems</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Got MFA? Good. But You Still Need Password Blacklisting</title>
		<link>https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Tue, 26 Jan 2021 05:20:31 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80072</guid>

					<description><![CDATA[<p>Password Blacklisting is sometimes considered a bridge solution until organizations can finally implement Multifactor Authentication (MFA).  Password blacklisting may get [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/">Got MFA? Good. But You Still Need Password Blacklisting</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password Blacklisting is sometimes considered a bridge solution until organizations can finally implement Multifactor Authentication (MFA).  Password blacklisting may get deployed with plans to retire it once MFA is in place.  On the surface, this seems to make sense.  Once MFA has been implemented, it should not matter if end-user passwords are poor quality, because attacks on those poor passwords would still be thwarted by the extra authentication step of MFA.  However, we are here to inform you that you should not forgo Password Blacklisting if you have already implemented MFA.  In fact, the best, most secure solution is to use both!  Below are some real-world reasons why you should keep using password blacklisting even if you have MFA in place (or plan to soon).</p>
<h3>Reason 1 &#8211; Exceptions</h3>
<p>First off, it is very common that when MFA gets implemented, there will be exceptions for systems/services that just do not (yet) support MFA.  Each of these applications/services are holes in your organization&#8217;s security and attackers will find them.  Most MFA rollouts have at least one of these apps/services that still rely on classic username and password authentication.  As many organizations found out the hard way in the <a href="https://www.passwordrbl.com/blog/bad-password-plus-zerologon-equals-ransomware/">summer of 2020, MFA is great, but if your company VPN solution doesn&#8217;t use/support it</a>, then very bad things can happen.  Attackers can log into the company VPN, impersonating a real company user.  Once attackers have direct access to the interior of company networks, it is as if the bad guys are freely roaming the isles of the company datacenter.  Nothing good becomes of that!</p>
<p>&nbsp;</p>
<h3>Reason 2 &#8211; MFA Bypass</h3>
<p>Another great reason to keep password blacklisting around is that as the prevalence of MFA deployments increases, attackers are changing their ways and are figuring out how to bypass MFA altogether.  There have been numerous high-profile MFA-bypasses in the past year.  A quick <a href="https://www.google.com/search?q=mfa+bypass+attacks">google search</a> shows reports on many of them.  But the most disastrous MFA bypass has to be the Solarwinds supply-chain attack announced in late 2020.   In order for the attackers to gain access to the source-code of Solarwinds&#8217; popular Orion platform, they first had to bypass the MFA that Solarwinds had deployed.  Spoiler alert, the attackers were able to bypass Duo MFA and injected malicious code into the Solarwinds source.   The Cybersecurity and Infrastructure Security Agency (CISA) in the US <a href="https://threatpost.com/cloud-attacks-bypass-mfa-feds/163056/">issued an advisory</a> about attackers combining numerous different attack methods, but notably, MFA bypasses.</p>
<p>&nbsp;</p>
<h3>The Bottom Line</h3>
<p>The answer is clear: you should deploy both Password Blacklisting and Multifactor Authentication.  MFA deployments can stress the budget, but whereas the cost for a Password RBL subscription is quite reasonable.  If you do not have the budget for MFA, then Password RBL blacklisting is a perfect first step &#8211; providing an effective addition to your security makeup and fantastic ROI.  And if you do already have MFA deployed (or the budget to do so), then you can inexpensively add Password RBL blacklisting for a fraction of the total cost.  Either way, Password RBL is for you!  Check out our <a href="https://www.passwordrbl.com/packages/">Packages for Small &amp; Medium Business</a> or request a <a href="https://www.passwordrbl.com/request-a-quote/">free quote</a> if your organization is larger.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/">Got MFA? Good. But You Still Need Password Blacklisting</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bad Password + Zerologon = Ransomware</title>
		<link>https://www.passwordrbl.com/blog/bad-password-plus-zerologon-equals-ransomware/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 20:43:51 +0000</pubDate>
				<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80030</guid>

					<description><![CDATA[<p>In the August 2020 monthly patch rollup, Microsoft patched and also released extra guidance for a critical vulnerability in the [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/bad-password-plus-zerologon-equals-ransomware/">Bad Password + Zerologon = Ransomware</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the August 2020 monthly patch rollup, Microsoft patched and also released extra guidance for a <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472">critical vulnerability in the Netlogon service</a>.  This vulnerability allows for easy and complete takeover of an Active Directory Domain Controller.  And the only requirement to exploit this vulnerability is network connectivity to the Domain Controller.  This means that if ANY of your end-users have a poor password, your entire Windows network can be taken over.  And it is already happening.</p>
<p>The attack is quite simple.  A regular end-user has a bad password.  Attackers can figure this out in the typical manner &#8211; a password spray or credential stuffing attack.  Once they know the credentials for a user account, the attackers perform a scan of the companies public infrastructure to find the VPN device.  They log into the VPN with the compromised credentials and now have direct network connectivity. The attacker uses this recent <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">Netlogon vulnerability</a> to gain SYSTEM level permissions on the domain controller which means that can basically do anything they want after that, because they can create a new Domain Administrator account.</p>
<p>And now with a Domain Administrator account in hand, the attacker can trigger a very thorough crypto-malware attack across the entire organization.  Ransomware with the reduced privileges of a normal end-user account is bad enough.  But ransomware from a Domain Administrator can be debilitating.  Not only can it encrypt important company data, but also system files which can bring down every Windows systems.  Most companies have good backups of servers.  But most companies do not back up workstations.  It could take weeks or months to rebuild or replace all the workstations.</p>
<p>Obviously, organizations need to follow Microsoft&#8217;s guidance on patching this vulnerability as soon as possible.  But there has been similar vulnerabilities before, and there will surely be similar ones in the future.  So, organizations should also deploy <a href="https://www.passwordrbl.com/password-firewall/">Password Firewall for Windows</a> to prevent the use of bad passwords that lead to account takeover and much, much worse.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/bad-password-plus-zerologon-equals-ransomware/">Bad Password + Zerologon = Ransomware</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Billion Passwords Analyzed; Password Firewall Protects You</title>
		<link>https://www.passwordrbl.com/blog/a-billion-passwords-analyzed-password-firewall-protects-you/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Tue, 21 Jul 2020 04:28:05 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=79926</guid>

					<description><![CDATA[<p>A student studying in Cyprus recently released the results of an analysis of 1 billion leaked passwords.  This is one [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/a-billion-passwords-analyzed-password-firewall-protects-you/">A Billion Passwords Analyzed; Password Firewall Protects You</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A student studying in Cyprus recently <a href="https://github.com/FlameOfIgnis/Pwdb-Public">released the results</a> of an analysis of 1 billion leaked passwords.  This is one of the biggest leaked password data sets ever analyzed and can provide some insights to contemporary password use.  Unfortunately, the results show that the common bad password hygiene that has coinutually plagued the industry, continues to occur.  But, studying such a large dataset has also revealed some other interesting information.  We will go over some of these more interesting discoveries and show you how Password RBL and Password Firewall protect you from these types of problems.</p>
<p>&nbsp;</p>
<h2>Basic Findings</h2>
<p>Out of the 1 billion credentials analyzed, there were only 168.9 million unique passwords in the list.  This means there is a startling amount of password reuse &#8211; bad password reuse.  Password RBL specifically blocks these poor and reused passwords.  This prevents Account Takeover Events by preventing users from, knowingly or inadvertently, choosing the passwords that hackers already know and use in password-based attacks.</p>
<p>The most popular password was &#8220;123456&#8221; &#8211; a truly horrible password choice, as this password (or similar ascending numerical variants) has been in the top 10 worst password choices for years now.  In fact, it was so popular that it was 1 out of ever 142 passwords in this dataset!  This password has been blocked by Password RBL since the very beginning of our service.</p>
<h2>Password Complexity</h2>
<p>Of all the unique passwords in the list, 28.79% were comprised of letters only with 26.16% using lowercase letters only.  Sadly, 13.37% of the passwords used only numbers, which is terrible since there are only 10 characters in the numeric alphabet, making brute-force of numeric-only passwords far easier.  And finally, only 2.04% of the passwords used special characters.</p>
<p>Password Firewall for Windows, specifically addresses password complexity with the Minimum Character Sets Required option.  This allows administrators to choose how many character sets must be present in password choices.  It doesn&#8217;t require a specific number of characters from each character set, because it&#8217;s only important that the passwords have at least one character from the specified number of sets.</p>
<p>Interestingly, 34.41% of the passwords analyzed ended in a numeric digit (but only 4.52% began with a digit).  This is exactly why Password Firewall has the Password DoubleCheck feature.  It will drop any digits at the end of a password choice and then re-query the Password RBL database with the resulting (truncated) password to see if the end-user has chosen a bad password, but simply added a digit to the end.</p>
<h2>Password Reuse</h2>
<p>There is plenty more evidence of the bad password reuse happening.  Unique passwords, that are found only once in the dataset, make up only 8.83% of the dataset.  The top 1,000 most common unique passwords from made up 6.61% of all passwords in the dataset.  The top 1 million most common passwords comprised 36.28% of the dataset.  And the top 10 million most common passwords made up 54.00% of the entire dataset.  So an attacker cracking a password database (that did not use password blacklisting) with a wordlist of only the 10 million most common passwords, has a better than 50/50 chance at cracking each password.  This is why password blacklisting is so necessary.</p>
<p>There is diminishing returns in brute-forcing with a larger datasets.  Brute forcing attackers obviously don&#8217;t need to.  But, we go even farther at Password RBL.  Our highly curated database currently has over 75 million of the most commonly used bad passwords and is growing every year.  Additionally, we provide a conduit for our customers to simultaneously query the Pwned Passwords database as well.  There is a large overlap in our databases, especially at the top end of the most commonly used bad passwords.  But it is a fairly safe assumption to say that this provides protection from over 500 million bad password combinations, which is more than the total number of unique passwords from this latest analysis.</p>
<h2>Conclusion</h2>
<p>This analysis confirmed alot of what Password RBL has known for a long time.  People reuse passwords, alot!  And the passwords they are reusing are common and well-known at this time.  These are the passwords you do not want your users or customers using on your network or app/service.</p>
<p>Password RBL provides an easy way to block these bad passwords as well as any custom passwords you want banned, too.  We even provide statistics so you can know if your users are getting better at choosing passwords.  And best of all, <a href="https://www.passwordrbl.com/packages/">subscriptions are inexpensive</a> so organizations of any a size can afford this effective base-layer of security.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/a-billion-passwords-analyzed-password-firewall-protects-you/">A Billion Passwords Analyzed; Password Firewall Protects You</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password-based Hack of Citrix</title>
		<link>https://www.passwordrbl.com/blog/password-based-hack-of-citrix/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sun, 23 Feb 2020 18:36:53 +0000</pubDate>
				<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://pub-web.passwordrbl.com/?p=79638</guid>

					<description><![CDATA[<p>Citrix is a well-known company that sells remote-access software solutions worldwide.  Citrix is large.  They have hundreds of thousands of [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-based-hack-of-citrix/">Password-based Hack of Citrix</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Citrix is a well-known company that sells remote-access software solutions worldwide.  Citrix is large.  They have hundreds of thousands of customers.  They have the resources to deploy the best and most elaborate security.  Back in October 2018, the networking software company was hacked.  But the hack was nothing sexy.  They were compromised by a simple password-guessing scheme called &#8220;password spraying&#8221; and they didn&#8217;t even know it yet.</p>
<p>&nbsp;</p>
<p>Password spraying is when attackers simply guess the passwords of known accounts using a list of common passwords.  It is a crude, brute-force method, but can be incredibly effective when the target businesses don&#8217;t employ the necessary defenses.</p>
<p>&nbsp;</p>
<p>The worst part of a password-based attack is when it is successful.  It is possible to detect while the attack is happening (for example, there more authentications per time period than expected), but it is nearly impossible to detect when an attacker successfully logs into a target account.  This is because that login event &#8220;looks&#8221; just as legitimate as the actual account owner using the same credentials to log into the same account.  In fact, Citrix did not even realize hackers were actively breaching their network.  The FBI contacted Citrix in March, 2019 to inform them that they believed the cyber-criminals had gained access to Citrix&#8217;s internal network.</p>
<p>&nbsp;</p>
<p>Because these unauthorized logins do not raise any alarms, the Citrix attackers were able to continue logging into the victim accounts and root around the inside of Citrix&#8217;s corporate network for five months!  They have plenty of time to discover the interior systems and data layout and thus, were able to make off with a swath of proprietary data, social security numbers and other personal identity data, as well as payment card information.</p>
<p>&nbsp;</p>
<p>To prevent such an attack, all Citrix needed to do, was employ Password Blacklisting.  Yes, Multi-Factor Authentication (MFA) is an effective defense against password-based attacks, too, but there are commonly many reasons MFA doesn&#8217;t get deployed [everywhere] including, cost, complexity, incompatibility, end-user training, and more.  But Password Blacklisting is simple, affordable, best yet, incredibly effective.</p>
<p>&nbsp;</p>
<p>Password RBL has <a href="https://pub-web.passwordrbl.com/solutions/">solutions</a> for all size customers, are super-easy to deploy and use, and provide the power of 3 password blacklists.  Get started today &#8211; costs are typically just a few dollars per user per YEAR (yes, per Year, not per month).</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-based-hack-of-citrix/">Password-based Hack of Citrix</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
