<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Password RBL News Archives - Password RBL</title>
	<atom:link href="https://www.passwordrbl.com/blog/category/password-rbl-news/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.passwordrbl.com/blog/category/password-rbl-news/</link>
	<description>Real-time Password Blacklist</description>
	<lastBuildDate>Thu, 21 Dec 2023 04:15:58 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.passwordrbl.com/wp-content/uploads/2020/05/cropped-Special_SmallRes_White_Circle_cropped-32x32.png</url>
	<title>Password RBL News Archives - Password RBL</title>
	<link>https://www.passwordrbl.com/blog/category/password-rbl-news/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>New Versions of API and Password Firewall</title>
		<link>https://www.passwordrbl.com/blog/new-versions-of-api-and-password-firewall/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sun, 04 Oct 2020 16:35:25 +0000</pubDate>
				<category><![CDATA[Password RBL News]]></category>
		<category><![CDATA[API Access]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80019</guid>

					<description><![CDATA[<p>Password RBL is pleased to announce the next major versions of our products have been released for 2020-Q4.  This includes [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/new-versions-of-api-and-password-firewall/">New Versions of API and Password Firewall</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password RBL is pleased to announce the next major versions of our products have been released for 2020-Q4.  This includes API v4.00 and Password Firewall for Windows v7.00 to utilize the latest features available in the new API.</p>
<p>&nbsp;</p>
<h2>New Feature: An Additional Way to Query</h2>
<p>This major release all centers around one new core feature &#8211; an additional API endpoint that utilizes a customer-provided API Key to authorize connections to the API.  Using this API Key allows customers to query the API from anywhere, without first registering their IP address(es) with Password RBL.  Not only is API Key authorization easier for customers (because there is no extra IP address management task), but it also friendly to cloud-based infrastructure and services that do not necessarily maintain static IP addressing.  But just to be clear, this is a new API endpoint and the existing IP-authorized endpoint is still supported.</p>
<p>&nbsp;</p>
<h3>A Little History</h3>
<p>Previously, Password RBL&#8217;s API only authorized customer connections based upon their source IP address.  This was a design decision from the very beginning.  Password RBL has always been very focused on providing password blacklisting services in a zero-trust manner.  A cloud-based password blacklisting solution was new to the world back then, and we really wanted customers to understand that it really is secure.  So we choose to implement customer authorization by IP rather than API key.  API queries entering our service were confirmed to come from customers based on the packet&#8217;s source IP.  With the original architecture, by the time the query got passed network checks and load balancing, the API did not know which customer it was coming from (just that it was an authorized customer).  But once we added the Prefix-Query method (where queries only contain a portion of the password hash, not the entire hash), customers had even more assurance that even Password RBL could never determine the cleartext password from their API submission.  This opened the door to reconsidering a feature requested by many customers &#8211; API Key authorization.</p>
<p>&nbsp;</p>
<h3>A Quick Word on TLS versions</h3>
<p>This new key-based endpoint is a modern, new method of connectivity and thus, requires modern TLS connections &#8211; TLS v1.2 at a minimum.  It is important to note that Windows Server 2008 R2 does not have TLS v1.2 enabled by default.  In order for Password Firewall to run with API Key authorization on Windows 2008 R2, you must update .NET to latest patch release and then manually create some registry entries to enable the use of TLS v1.2.  There are many <a href="https://www.smarterasp.net/support/kb/a1968/how-to-fix-error-underlying-connection-was-closed-an-unexpected-error-occurred-on.aspx">guides</a> that you can follow.  Later versions of Windows supports TLS v1.2 by default.  Windows 2008 R2 is now End of Life so any 2008 R2 servers should be retired anyways (but we still support Password Firewall on Server 2008 R2 because we would rather you have strong passwords and an old server than bad passwords and an old server).</p>
<p>&nbsp;</p>
<h3>Download Today!</h3>
<p>The latest API is in production and the latest version of Password Firewall for Windows available now,  Head over to our <a href="https://www.passwordrbl.com/downloads/">downloads page</a> for the latest software and documentation.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.passwordrbl.com/blog/new-versions-of-api-and-password-firewall/">New Versions of API and Password Firewall</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password RBL adds Pwned Passwords database</title>
		<link>https://www.passwordrbl.com/blog/password-rbl-adds-pwned-passwords-database/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Thu, 13 Jun 2019 06:25:34 +0000</pubDate>
				<category><![CDATA[Password RBL News]]></category>
		<category><![CDATA[Press Release]]></category>
		<guid isPermaLink="false">https://pub-web.passwordrbl.com/?p=79627</guid>

					<description><![CDATA[<p>Password RBL expands its password blacklisting service by adding Pwned Passwords blacklist database. Password RBL has extended its bad password blacklisting [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-rbl-adds-pwned-passwords-database/">Password RBL adds Pwned Passwords database</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><b>Password RBL expands its password blacklisting service by adding Pwned Passwords blacklist database.</b></p>
<p>Password RBL has extended its bad password blacklisting service to include the Pwned Passwords blacklist in addition to Password RBL&#8217;s own highly curated blacklist that it has continually developed for years.  This new feature adds over 500 million passwords to the blacklisting service and is now available to all customers who want even more protection from bad passwords.  Customers can simultaneously query Password RBL&#8217;s highly-curated blacklist, their own custom blacklist, and now the Pwned Passwords blacklist, too.</p>
<p>Bad passwords have plagued organizations for decades, and reported data breaches have increased in recent years.  These breaches commonly exfiltrate the credential database, providing hackers with passwords to use in attacks on other organizations.  Credential stuffing and password spray attacks are becoming more common due to the large number of known breached passwords.  IT departments have tried to coach users into choosing complex passwords and employed the use of password policies, but password policies cannot solve this growing problem on their own.  Password blacklisting is a perfect supplement to existing password policies.</p>
<p>Password blacklisting blocks the millions of bad passwords that meet common password policies.  This is why the National Institute for Standards and Technology (NIST) in the United States has <a href="https://pages.nist.gov/800-63-3/sp800-63b.html" rel="nofollow">recommended employing the use of a password blacklist</a> in their latest authentication guidelines.  The National Cyber Security Centre (NCSC) in United Kingdom <a href="https://www.ncsc.gov.uk/collection/passwords/updating-your-approach" rel="nofollow">also makes this recommendation</a>.  Password blacklisting is an easy and effective way to combat password reuse and just plain bad passwords.</p>
<p>Password RBL&#8217;s blacklisting service includes direct <a href="https://www.passwordrbl.com/api-access.html" rel="nofollow">API access</a> and <a href="https://www.passwordrbl.com/password-firewall.html" rel="nofollow">Password Firewall for Windows</a>, an extremely lightweight software solution that only needs to be installed on Domain Controllers and does not require end-users or IT staff to learn anything new.  These features make it incredibly easy to add password blacklisting to any existing Windows network.</p>
<p>Password RBL, founded in 2013, provides affordable and easy to use password blacklisting solutions.  The company slogan is &#8220;Prevent Bad Passwords Before They Happen&#8221; because their solutions prevent the use of bad passwords that hackers use to gain unauthorized access to networks across the globe.  They consolidate passwords by analyzing hacker tools, running honeypot servers, and scouring the web for leaked credential databases from data breaches.</p>
<p>Subscriptions to the service start at just $15.00 (USD) per month for small-medium businesses.  Larger organizations can <a href="https://www.passwordrbl.com/request-quote.html" rel="nofollow">request a quote</a>.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-rbl-adds-pwned-passwords-database/">Password RBL adds Pwned Passwords database</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password RBL targets enterprises with latest release of Password Firewall for Windows</title>
		<link>https://www.passwordrbl.com/blog/password-rbl-targets-enterprises-password-firewall-for-windows/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Tue, 06 Jun 2017 06:21:23 +0000</pubDate>
				<category><![CDATA[Password RBL News]]></category>
		<category><![CDATA[Press Release]]></category>
		<guid isPermaLink="false">https://pub-web.passwordrbl.com/?p=79621</guid>

					<description><![CDATA[<p>Administrators of large Windows networks can now easily deploy password blacklisting across their entire organization in mere minutes. Password RBL is [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-rbl-targets-enterprises-password-firewall-for-windows/">Password RBL targets enterprises with latest release of Password Firewall for Windows</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><b>Administrators of large Windows networks can now easily deploy password blacklisting across their entire organization in mere minutes.</b></p>
<p>Password RBL is targeting large Windows enterprises with their latest release of <a href="https://www.passwordrbl.com/password-firewall.html" rel="nofollow">Password Firewall for Windows</a>.  The new version adds automated installation (and uninstallation)<wbr /> options to the product&#8217;s deployment methods. The provided documentation includes step by step instructions for using Group Policy to deploy and configure the password blacklisting solution for Active Directory in an automated fashion, but the method is easily adapted to any existing system management software.  Password Firewall is enterprise-ready and can now be deployed across the entire organization in minutes.</p>
<p>Bad passwords have plagued organizations for decades, and reported data breaches have increased in recent years.  These breaches commonly exfiltrate the credential database, providing hackers with passwords to use in attacks on other organizations.  In fact, the 2014 Verizon Data Breach Investigation Report found that 2 out of 3 network breaches exploited weak or stolen credentials.  IT departments have tried to coach users into choosing complex passwords and employed the use of password policies, but password policies cannot solve this growing problem on their own.  That&#8217;s where password blacklisting comes in.</p>
<p>Password blacklisting blocks the millions of bad passwords that meet common password policies.  This is why the National Institute for Standards and Technology (NIST) in the United States <a href="https://pages.nist.gov/800-63-3/sp800-63b.html" rel="nofollow">has recommended</a> employing the use of a password blacklist in their latest authentication guidelines.  The National Cyber Security Centre (NCSC) in United Kingdom also <a href="https://www.ncsc.gov.uk/guidance/password-guidance-simplifying-your-approach" rel="nofollow">makes this recommendation</a>.  Password blacklisting is an easy and effective way to combat bad passwords.</p>
<p>Password RBL&#8217;s blacklisting solution, <a href="https://www.passwordrbl.com/password-firewall.html" rel="nofollow">Password Firewall for Windows</a>, is extremely lightweight, only needs to be installed on Domain Controllers, and doesn&#8217;t require end-users or IT staff to learn anything new.  These features make it easy to add Password Firewall to any Windows network.  Combine these features with the latest automated installation methods, and companies can now deploy password blacklisting throughout their whole organization in minutes.</p>
<p><a href="https://www.passwordrbl.com/" rel="nofollow">Password RBL</a>, founded in 2013, is a provider of affordable and easy to use password blacklisting solutions.  The company slogan is &#8220;Prevent Bad Passwords Before They Happen&#8221; because their solutions prevent the use of bad passwords that hackers use to gain unauthorized access to networks across the globe.  They consolidate passwords by analyzing hacker tools, running honeypot servers, and scouring the web for leaked credential databases from data breaches.</p>
<p>SMB <a href="https://www.passwordrbl.com/packages.html" rel="nofollow">subscriptions</a> to the service start at just $15.00 (USD) per month.  Larger organizations can <a href="https://www.passwordrbl.com/request-quote.html" rel="nofollow">request a quote</a>.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-rbl-targets-enterprises-password-firewall-for-windows/">Password RBL targets enterprises with latest release of Password Firewall for Windows</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Custom Password Blacklisting comes to Active Directory</title>
		<link>https://www.passwordrbl.com/blog/custom-password-blacklisting-comes-to-active-directory/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Mon, 18 Apr 2016 06:18:26 +0000</pubDate>
				<category><![CDATA[Password RBL News]]></category>
		<category><![CDATA[Press Release]]></category>
		<guid isPermaLink="false">https://pub-web.passwordrbl.com/?p=79619</guid>

					<description><![CDATA[<p>Administrators can now easily block specific passwords in Active Directory; Password RBL adds customer-specific entries to its massive password blacklist [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/custom-password-blacklisting-comes-to-active-directory/">Custom Password Blacklisting comes to Active Directory</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><b>Administrators can now easily block specific passwords in Active Directory; Password RBL adds customer-specific entries to its massive password blacklist for Windows.</b></p>
<p>Password RBL adds customer-specific entries to their <a href="https://www.passwordrbl.com/solutions.html" rel="nofollow">password blacklisting products</a> that solve the problem of weak passwords that lead to unauthorized access and data breaches.  In addition to stopping nearly 70 million bad password combinations, their newest feature allows subscribers to provide their own banned passwords.  This increases the effectiveness of the solution for each individual subscriber as they can now add entries to their own password blacklist.  This includes passwords known by terminated employees or known to have been shared by users.  Other common passwords that a company may want to ban include passwords based on publicly available company-specific information, such as company name, address, or slogan.  This is the type of information used in password-based attacks.</p>
<p>Bad passwords have plagued businesses for decades.  In the last few years there has been a noticeable increase in reported data breaches because exploiting weak passwords is an easy way for hackers to gain access to business networks.  The 2014 Verizon Data Breach Investigation Report found that 2 out of 3 network breaches exploited weak or stolen credentials.  IT departments have tried to coach users into choosing complex passwords and employed the use of password policies, but this doesn&#8217;t solve the problem.  There are millions of bad passwords that meet common policies.  Password policies do, however, annoy end-users with frequently required password changes.  The built-in password policy in Windows is no longer good enough.  Password RBL ensures that end-users choose strong passwords that hackers don&#8217;t already know.  And now companies can add their own banned passwords to further customize the service to their needs.  If users are picking strong passwords, then they should be allowed to keep them for longer.  Truly a win-win situation.</p>
<p>Password RBL&#8217;s <a href="https://www.passwordrbl.com/password-firewall.html" rel="nofollow">Password Firewall for Windows</a> is extremely lightweight, features an easy wizard-based installation that only needs to be run on Domain Controllers, and doesn&#8217;t require end-users or IT staff to learn anything new.  Furthermore, Password Firewall follows the exact same <a href="https://www.passwordrbl.com/packages.html" rel="nofollow">pricing model</a> as <a href="https://www.passwordrbl.com/api-access.html" rel="nofollow">direct API access</a> to the Password RBL blacklist and both products can be used simultaneously under the same subscription.</p>
<p>Password RBL, founded in 2013, is a provider of affordable and easy to use password blacklist solution.  The company slogan is &#8220;Prevent Bad Passwords Before They Happen&#8221; because their solutions prevent the use of bad passwords that hackers user to gain unauthorized access to business networks across the globe.  They consolidate passwords discovered by analysis of hacker tools, running honeypot servers, and scouring the web for published credential databases from data breaches.</p>
<p>Currently, subscriptions to the service start at just $15.00 (USD) per month.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/custom-password-blacklisting-comes-to-active-directory/">Custom Password Blacklisting comes to Active Directory</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password Blacklisting comes to Active Directory</title>
		<link>https://www.passwordrbl.com/blog/password-blacklisting-comes-to-active-directory/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Wed, 18 Nov 2015 06:12:31 +0000</pubDate>
				<category><![CDATA[Password RBL News]]></category>
		<category><![CDATA[Press Release]]></category>
		<guid isPermaLink="false">https://pub-web.passwordrbl.com/?p=79617</guid>

					<description><![CDATA[<p>Password Firewall prevents the use of bad passwords that satisfy Active Directory password policies but are actively being used by [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-blacklisting-comes-to-active-directory/">Password Blacklisting comes to Active Directory</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><b>Password Firewall prevents the use of bad passwords that satisfy Active Directory password policies but are actively being used by hackers to gain unauthorized access.</b></p>
<p>Password RBL provides an affordable password blacklist solution that solves the problem of end-users picking poorly constructed passwords that can lead to unauthorized access and data breaches.  Originally, the service was targeted at web site and app operators as access to the blacklist database was provided via a web-based API.  With the recent release of Password Firewall, the service extends heightened password security to the millions of Windows-based networks worldwide by protecting Microsoft’s Active Directory, the core of a Windows-based business network.  Many additional software packages, such as Microsoft’s Exchange and Sharepoint services, rely on Active Directory, and those systems will also reap the benefits of enhanced password security.</p>
<p>Bad passwords have plagued IT departments and businesses for decades.  In the last few years there has been a significant increase in hackers utilizing password-based attacks to gain unauthorized access to business networks and data.  The 2014 Verizon Data Breach Investigation Report found that 2 out of 3 network breaches exploited weak or stolen credentials.  IT departments have tried to coax users into choosing complex passwords and employed the use of password policies, but this has barely mitigated the problem while annoying end-users with always-too-frequent password changes.  The built-in password policy is no longer “good enough” security.  <a href="https://www.passwordrbl.com/" rel="nofollow">Password RBL</a> can ensure end-users are picking strong passwords that hackers aren’t already using.  This means IT can reduce the frequency of pesky required password changes.  As founder Adam Smith puts it, “IT gets strong passwords and users get to keep their passwords.”</p>
<p><a href="https://www.passwordrbl.com/password-firewall.html" rel="nofollow">Password Firewall for Windows</a> is extremely lightweight, features an easy wizard-based installation that only needs to be run on Domain Controllers, and doesn’t require end-users or IT staff to learn anything new or change their behavior.  Furthermore, Password Firewall follows the exact same pricing model as <a href="https://www.passwordrbl.com/info.html" rel="nofollow">direct API access</a> to the Password RBL blacklist database and both products can be used simultaneously under the same subscription.</p>
<p>Password RBL, founded in 2013, is a provider of easy to use yet secure and affordable password security solutions.  The company slogan is <i>“Prevent Bad Passwords Before They Happen”</i> because their <a href="https://www.passwordrbl.com/solutions.html" rel="nofollow">solutions</a> prevent the use of bad passwords that hackers already utilize to gain unauthorized access to business networks across the globe.  They consolidate passwords discovered by analysis of hacker tools, running honeypot servers, and scouring the web for published credential databases from data breaches.</p>
<p>Currently, <a href="https://www.passwordrbl.com/subscribe.html" rel="nofollow">subscriptions to the service</a> start at just $15.00 (USD) per month.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-blacklisting-comes-to-active-directory/">Password Blacklisting comes to Active Directory</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
