<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Tech News Archives - Password RBL</title>
	<atom:link href="https://www.passwordrbl.com/blog/tag/technews/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.passwordrbl.com/blog/tag/technews/</link>
	<description>Real-time Password Blacklist</description>
	<lastBuildDate>Thu, 21 Dec 2023 04:14:51 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.passwordrbl.com/wp-content/uploads/2020/05/cropped-Special_SmallRes_White_Circle_cropped-32x32.png</url>
	<title>Tech News Archives - Password RBL</title>
	<link>https://www.passwordrbl.com/blog/tag/technews/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Password RBL Statement on Log4j Vulnerability</title>
		<link>https://www.passwordrbl.com/blog/statement-on-log4j-vulnerability/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Wed, 15 Dec 2021 13:55:36 +0000</pubDate>
				<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80126</guid>

					<description><![CDATA[<p>The internet is abuzz about the recent disclosure of a critical vulnerability in the popular the open-source logging library Log4j. [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/statement-on-log4j-vulnerability/">Password RBL Statement on Log4j Vulnerability</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The internet is abuzz about the recent disclosure of a <a href="https://logging.apache.org/log4j/2.x/security.html#cve-2021-44228" target="_blank" rel="noopener">critical vulnerability</a> in the popular the open-source logging library <a href="https://logging.apache.org/log4j/2.x/index.html" target="_blank" rel="noopener">Log4j</a>. Rightfully so, the worst of the vulnerabilities, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228" target="_blank" rel="noopener">CVE-2021-44228</a>, disclosed on Friday, December 10, 2021, is as bad as it gets, allowing an attacker to completely takeover a target system with minimal effort.  The vulnerability has earned a critical rating score of 10 out of 10 on the CVSS severity model.</p>
<p>&nbsp;</p>
<h2>Password RBL Unaffected by Log4j Vulnerability</h2>
<p>Password RBL is not impacted by this log4j vulnerability because Password RBL does not utilize this library in any systems.</p>
<p>This should not be surprising, since Password RBL has a <a href="https://www.passwordrbl.com/about-security/" target="_blank" rel="noopener">zero-logging policy</a>.  Thus, Password RBL has no need for a code library that provides advanced logging services.  But it is important for subscribers to know that Password RBL is unaffected by this recent vulnerability and continues to be a secure and easy way to prevent bad passwords before they happen.</p>
<p>&nbsp;</p>
<h2>Update on Additional Vulnerabilities</h2>
<p>Since the original positing of this statement, <a href="https://logging.apache.org/log4j/2.x/security.html" target="_blank" rel="noopener">additional vulnerabilities</a> in the log4j library have been disclosed.  Password RBL remains unaffected by these additional vulnerabilities as well, since Password RBL does not utilize the log4j library at all.</p>
<p>&nbsp;</p>
<h3>Not a customer?</h3>
<p>If you are not yet a customer of Password RBL but are interested in better passwords for your organization, then follow this link to <a href="https://www.passwordrbl.com/solutions/" target="_blank" rel="noopener">learn more</a> and read about why our zero-trust solution for better passwords <a href="https://www.passwordrbl.com/about-security/" target="_blank" rel="noopener">really is secure</a>.  Our solutions are easy to use and subscription costs are <a href="https://www.passwordrbl.com/packages/" target="_blank" rel="noopener">very reasonable</a>.  Subscribe today!</p>
<p>The post <a href="https://www.passwordrbl.com/blog/statement-on-log4j-vulnerability/">Password RBL Statement on Log4j Vulnerability</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Attitudes and Behaviors Report</title>
		<link>https://www.passwordrbl.com/blog/cybersecurity-attitudes-and-behaviors-report-2021/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sun, 17 Oct 2021 21:32:28 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[API Access]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80107</guid>

					<description><![CDATA[<p>The National Cybersecurity Alliance (NCSA) has released their Attitudes and Behaviors report for 2021, and, honestly, it&#8217;s not great.  Well, [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/cybersecurity-attitudes-and-behaviors-report-2021/">Cybersecurity Attitudes and Behaviors Report</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The <a href="https://staysafeonline.org/" target="_blank" rel="noopener">National Cybersecurity Alliance (NCSA)</a> has released their <a href="https://staysafeonline.org/resource/oh-behave-2021/" target="_blank" rel="noopener">Attitudes and Behaviors report for 2021</a>, and, honestly, it&#8217;s not great.  Well, the reporting is great, and it&#8217;s great that the NCSA conducts and releases this annual report.  But the content of the report contains some not-so-great behaviors among real users.</p>
<h2>MFA</h2>
<p>As we know, Multi-Factor Authentication (MFA) is a great way to combat potential account takeovers or just general bad password hygiene.  Even when MFA is used, <a href="https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/">Password Blacklisting still makes sense</a>.  But if MFA is not in use, then Password Blacklisting is an absolute must!   Unfortunately, the report found that 52% of people have never heard of MFA.  This makes enforcing strong passwords even more important.  But why is this?  Well, 64% say they have no access to MFA, and another 10% say they do have access MFA, but choose not to use it.</p>
<p>&nbsp;</p>
<h2>Responsibility</h2>
<p>Additionally, the data indicates a significant proportion of people simply do not see themselves as responsible for looking after their workplace’s sensitive information.  Over a third (40%) of the full-time and part-time employees participating in this report considered themselves to be the least responsible agency for their organization’s cybersecurity.  That means that nearly half of your employees don&#8217;t think it&#8217;s their responsibility to choose a strong password!  This statistic is alarming and makes the case for all businesses to deploy Password Blacklisting in order to prevent users from choosing poor passwords.</p>
<p>&nbsp;</p>
<h2>Passwords</h2>
<p>Speaking of passwords, the report also discovered some alarming, but simultaneously not surprising, statistics on real-life password behaviors.  Only 43% of participants reported creating long and unique passwords for their online accounts “very often” or “always”. However, almost a third (28%) stated that they didn’t do so.  A third of real-life users are knowingly choosing weak passwords!  That&#8217;s a big number!</p>
<p>But about the more middle-of-the-road, average password behavior.  It&#8217;s still not great.  A majority (58%) of the respondents say they only &#8220;sometimes&#8221; (30%), &#8220;rarely&#8221; (18%), or &#8220;never&#8221; (10%) create long (12 character) and unique passwords.  This is probably because use of a stand-alone password manager application, which would create these long unique passwords, was uncommon, with almost half (49%) of the participants noting they ‘never’ or ‘rarely’ used one.</p>
<p>&nbsp;</p>
<h2>Not Great.  But What To Do?</h2>
<p>The full Cybersecurity Attitudes and Behaviors report (<a href="https://staysafeonline.org/resource/oh-behave-2021/" target="_blank" rel="noopener">available here</a>) contains lots more information and statistics.  But even with just the few takeaways mentioned above, it&#8217;s clear that more work needs to be done.  Deployment of Multi-Factor Authentication would absolutely help, but by 2021, the reason MFA isn&#8217;t completely pervasive is because of many real-life problems, including end-user adoption woes, cost to the business, supportability, and definitely incomplete deployments since businesses commonly support legacy systems which have no concept of MFA &#8211; or anything other than usernames and passwords, really.</p>
<p>Enter Password Blacklisting &#8211; the incredibly affordable and easy to use solution to the bad password problem.  Password RBL has drop-in support for Microsoft Active Directory (and anything linked to AD) and a dead-simple API that can be incorporated into basically anything else.  The return on investment (ROI) of a subscription to Password RBL makes deployment an easy choice &#8211; for IT and decision makers.  See our <a href="https://www.passwordrbl.com/solutions/">solutions</a> in action and <a href="https://www.passwordrbl.com/request-a-quote/">request a free quote</a> today!</p>
<p>The post <a href="https://www.passwordrbl.com/blog/cybersecurity-attitudes-and-behaviors-report-2021/">Cybersecurity Attitudes and Behaviors Report</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Got MFA? Good. But You Still Need Password Blacklisting</title>
		<link>https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Tue, 26 Jan 2021 05:20:31 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80072</guid>

					<description><![CDATA[<p>Password Blacklisting is sometimes considered a bridge solution until organizations can finally implement Multifactor Authentication (MFA).  Password blacklisting may get [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/">Got MFA? Good. But You Still Need Password Blacklisting</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password Blacklisting is sometimes considered a bridge solution until organizations can finally implement Multifactor Authentication (MFA).  Password blacklisting may get deployed with plans to retire it once MFA is in place.  On the surface, this seems to make sense.  Once MFA has been implemented, it should not matter if end-user passwords are poor quality, because attacks on those poor passwords would still be thwarted by the extra authentication step of MFA.  However, we are here to inform you that you should not forgo Password Blacklisting if you have already implemented MFA.  In fact, the best, most secure solution is to use both!  Below are some real-world reasons why you should keep using password blacklisting even if you have MFA in place (or plan to soon).</p>
<h3>Reason 1 &#8211; Exceptions</h3>
<p>First off, it is very common that when MFA gets implemented, there will be exceptions for systems/services that just do not (yet) support MFA.  Each of these applications/services are holes in your organization&#8217;s security and attackers will find them.  Most MFA rollouts have at least one of these apps/services that still rely on classic username and password authentication.  As many organizations found out the hard way in the <a href="https://www.passwordrbl.com/blog/bad-password-plus-zerologon-equals-ransomware/">summer of 2020, MFA is great, but if your company VPN solution doesn&#8217;t use/support it</a>, then very bad things can happen.  Attackers can log into the company VPN, impersonating a real company user.  Once attackers have direct access to the interior of company networks, it is as if the bad guys are freely roaming the isles of the company datacenter.  Nothing good becomes of that!</p>
<p>&nbsp;</p>
<h3>Reason 2 &#8211; MFA Bypass</h3>
<p>Another great reason to keep password blacklisting around is that as the prevalence of MFA deployments increases, attackers are changing their ways and are figuring out how to bypass MFA altogether.  There have been numerous high-profile MFA-bypasses in the past year.  A quick <a href="https://www.google.com/search?q=mfa+bypass+attacks">google search</a> shows reports on many of them.  But the most disastrous MFA bypass has to be the Solarwinds supply-chain attack announced in late 2020.   In order for the attackers to gain access to the source-code of Solarwinds&#8217; popular Orion platform, they first had to bypass the MFA that Solarwinds had deployed.  Spoiler alert, the attackers were able to bypass Duo MFA and injected malicious code into the Solarwinds source.   The Cybersecurity and Infrastructure Security Agency (CISA) in the US <a href="https://threatpost.com/cloud-attacks-bypass-mfa-feds/163056/">issued an advisory</a> about attackers combining numerous different attack methods, but notably, MFA bypasses.</p>
<p>&nbsp;</p>
<h3>The Bottom Line</h3>
<p>The answer is clear: you should deploy both Password Blacklisting and Multifactor Authentication.  MFA deployments can stress the budget, but whereas the cost for a Password RBL subscription is quite reasonable.  If you do not have the budget for MFA, then Password RBL blacklisting is a perfect first step &#8211; providing an effective addition to your security makeup and fantastic ROI.  And if you do already have MFA deployed (or the budget to do so), then you can inexpensively add Password RBL blacklisting for a fraction of the total cost.  Either way, Password RBL is for you!  Check out our <a href="https://www.passwordrbl.com/packages/">Packages for Small &amp; Medium Business</a> or request a <a href="https://www.passwordrbl.com/request-a-quote/">free quote</a> if your organization is larger.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/">Got MFA? Good. But You Still Need Password Blacklisting</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bad Password + Zerologon = Ransomware</title>
		<link>https://www.passwordrbl.com/blog/bad-password-plus-zerologon-equals-ransomware/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 20:43:51 +0000</pubDate>
				<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80030</guid>

					<description><![CDATA[<p>In the August 2020 monthly patch rollup, Microsoft patched and also released extra guidance for a critical vulnerability in the [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/bad-password-plus-zerologon-equals-ransomware/">Bad Password + Zerologon = Ransomware</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the August 2020 monthly patch rollup, Microsoft patched and also released extra guidance for a <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472">critical vulnerability in the Netlogon service</a>.  This vulnerability allows for easy and complete takeover of an Active Directory Domain Controller.  And the only requirement to exploit this vulnerability is network connectivity to the Domain Controller.  This means that if ANY of your end-users have a poor password, your entire Windows network can be taken over.  And it is already happening.</p>
<p>The attack is quite simple.  A regular end-user has a bad password.  Attackers can figure this out in the typical manner &#8211; a password spray or credential stuffing attack.  Once they know the credentials for a user account, the attackers perform a scan of the companies public infrastructure to find the VPN device.  They log into the VPN with the compromised credentials and now have direct network connectivity. The attacker uses this recent <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">Netlogon vulnerability</a> to gain SYSTEM level permissions on the domain controller which means that can basically do anything they want after that, because they can create a new Domain Administrator account.</p>
<p>And now with a Domain Administrator account in hand, the attacker can trigger a very thorough crypto-malware attack across the entire organization.  Ransomware with the reduced privileges of a normal end-user account is bad enough.  But ransomware from a Domain Administrator can be debilitating.  Not only can it encrypt important company data, but also system files which can bring down every Windows systems.  Most companies have good backups of servers.  But most companies do not back up workstations.  It could take weeks or months to rebuild or replace all the workstations.</p>
<p>Obviously, organizations need to follow Microsoft&#8217;s guidance on patching this vulnerability as soon as possible.  But there has been similar vulnerabilities before, and there will surely be similar ones in the future.  So, organizations should also deploy <a href="https://www.passwordrbl.com/password-firewall/">Password Firewall for Windows</a> to prevent the use of bad passwords that lead to account takeover and much, much worse.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/bad-password-plus-zerologon-equals-ransomware/">Bad Password + Zerologon = Ransomware</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password-based Hack of Citrix</title>
		<link>https://www.passwordrbl.com/blog/password-based-hack-of-citrix/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sun, 23 Feb 2020 18:36:53 +0000</pubDate>
				<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://pub-web.passwordrbl.com/?p=79638</guid>

					<description><![CDATA[<p>Citrix is a well-known company that sells remote-access software solutions worldwide.  Citrix is large.  They have hundreds of thousands of [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-based-hack-of-citrix/">Password-based Hack of Citrix</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Citrix is a well-known company that sells remote-access software solutions worldwide.  Citrix is large.  They have hundreds of thousands of customers.  They have the resources to deploy the best and most elaborate security.  Back in October 2018, the networking software company was hacked.  But the hack was nothing sexy.  They were compromised by a simple password-guessing scheme called &#8220;password spraying&#8221; and they didn&#8217;t even know it yet.</p>
<p>&nbsp;</p>
<p>Password spraying is when attackers simply guess the passwords of known accounts using a list of common passwords.  It is a crude, brute-force method, but can be incredibly effective when the target businesses don&#8217;t employ the necessary defenses.</p>
<p>&nbsp;</p>
<p>The worst part of a password-based attack is when it is successful.  It is possible to detect while the attack is happening (for example, there more authentications per time period than expected), but it is nearly impossible to detect when an attacker successfully logs into a target account.  This is because that login event &#8220;looks&#8221; just as legitimate as the actual account owner using the same credentials to log into the same account.  In fact, Citrix did not even realize hackers were actively breaching their network.  The FBI contacted Citrix in March, 2019 to inform them that they believed the cyber-criminals had gained access to Citrix&#8217;s internal network.</p>
<p>&nbsp;</p>
<p>Because these unauthorized logins do not raise any alarms, the Citrix attackers were able to continue logging into the victim accounts and root around the inside of Citrix&#8217;s corporate network for five months!  They have plenty of time to discover the interior systems and data layout and thus, were able to make off with a swath of proprietary data, social security numbers and other personal identity data, as well as payment card information.</p>
<p>&nbsp;</p>
<p>To prevent such an attack, all Citrix needed to do, was employ Password Blacklisting.  Yes, Multi-Factor Authentication (MFA) is an effective defense against password-based attacks, too, but there are commonly many reasons MFA doesn&#8217;t get deployed [everywhere] including, cost, complexity, incompatibility, end-user training, and more.  But Password Blacklisting is simple, affordable, best yet, incredibly effective.</p>
<p>&nbsp;</p>
<p>Password RBL has <a href="https://pub-web.passwordrbl.com/solutions/">solutions</a> for all size customers, are super-easy to deploy and use, and provide the power of 3 password blacklists.  Get started today &#8211; costs are typically just a few dollars per user per YEAR (yes, per Year, not per month).</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-based-hack-of-citrix/">Password-based Hack of Citrix</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
