<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Password RBL</title>
	<atom:link href="https://www.passwordrbl.com/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.passwordrbl.com/</link>
	<description>Real-time Password Blacklist</description>
	<lastBuildDate>Thu, 21 Dec 2023 04:14:44 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>

<image>
	<url>https://www.passwordrbl.com/wp-content/uploads/2020/05/cropped-Special_SmallRes_White_Circle_cropped-32x32.png</url>
	<title>Password RBL</title>
	<link>https://www.passwordrbl.com/</link>
	<width>32</width>
	<height>32</height>
</image> 
	<item>
		<title>Password Firewall Blocks Keyboard Patterns</title>
		<link>https://www.passwordrbl.com/blog/password-firewall-blocks-keyboard-patterns/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Mon, 03 Jul 2023 03:35:40 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Products]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80196</guid>

					<description><![CDATA[<p>Password RBL has released the next version of Password Firewall. This is version 7.10 and builds upon the solid foundation [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-firewall-blocks-keyboard-patterns/">Password Firewall Blocks Keyboard Patterns</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password RBL has released the next version of Password Firewall. This is version 7.10 and builds upon the solid foundation of previous versions, but it also adds a new feature that has been requested numerous times by customers and prospects.  Password Firewall now blocks common keyboard patterns in password choices even if the exact password permutation that includes the pattern is not blacklisted.  We have also included a few safeguards so Password Firewall doesn&#8217;t make choosing a new password overly burdensome on users..  Continue reading for details of how it works.</p>
<h2>Blocking the Most Common Patterns</h2>
<p>Password Firewall v7.10 blocks the most common keyboard-based patterns.  Examples include, &#8220;qwerty&#8221;, &#8220;zxcvbn&#8221;, &#8220;qazwsx&#8221;, etc.  The matching is not case sensitive so Password Firewall will catch most use of these patterns as part of password choices.  If a match is found then Password Firewall will block the password choice without a need for performing the blacklist query.  But we don&#8217;t want to deny just any password that happens to include one of these keyboard patterns.  That is where our safeguards apply.</p>
<p>&nbsp;</p>
<h2>Safeguards</h2>
<p>Not all passwords containing a keyboard pattern are of poor quality.  Qwerty12345 is certainly a bad choice.  After all, it is in our curated blacklist and commonly tops the Worst Passwords of the Year lists.  But a randomly generated 30-character password that happens to include a case insensitive match for &#8220;qazwsx&#8221; is likely still a plenty secure password, due to it&#8217;s length and randomness.  Because of this, Password Firewall includes length as a safeguard to keyboard pattern matching.   If a password choice that matches a common keyboard pattern is not significantly longer than the pattern itself, then Password Firewall will block the password choice.  Generally, since the keyboard patterns are short (5-6 characters), then the password choice will need to be at least 15 characters in length to be exempted from the pattern-based matching.</p>
<p>But we also include a safeguard to the safeguard.   Before granting an exemption to the pattern matching based upon password length, an additional check is done to make sure the end-user has also included some non-pattern characters in their password choice.  This prevents &#8220;clever&#8221; password choices based upon keyboard patterns from being exempted just because overall length is good.  This is best understood by example:  &#8220;aE8QazWSx72-8uNn3vPR&#8221; would be exempted from pattern matching but &#8220;QAZ2WSXqaz2wsxQAZ2WSX&#8221; would not.</p>
<p>&nbsp;</p>
<h2>Blacklisting Still Applies</h2>
<p>It&#8217;s important to remember that once a password choice makes it past the keyboard pattern matching check, blacklist checks still apply. &#8220;Qwerty12345password&#8221; might make it passed the pattern check, but it&#8217;s still a blacklisted password.</p>
<p>&nbsp;</p>
<h2>Upgrade Today</h2>
<p>Password Firewall v7.10 is available for <a href="https://www.passwordrbl.com/downloads/">download</a> now.  Upgrades are easy, but you have to be running v7.10 (or later) to gain this additional protection.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-firewall-blocks-keyboard-patterns/">Password Firewall Blocks Keyboard Patterns</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Zero-Trust Before It Was Cool</title>
		<link>https://www.passwordrbl.com/blog/zero-trust-before-it-was-cool/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Tue, 07 Jun 2022 16:55:40 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80201</guid>

					<description><![CDATA[<p>Password RBL&#8217;s secure design has always been zero-trust.  In fact, Password RBL was zero-trust before zero-trust was even a phrase.  [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/zero-trust-before-it-was-cool/">Zero-Trust Before It Was Cool</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password RBL&#8217;s secure design has always been zero-trust.  In fact, Password RBL was zero-trust before zero-trust was even a phrase.  Nowadays it seems every product is scrambling for a way to claim it is zero-trust.  But Password RBL&#8217;s original focus was on security &#8211; even before there was a viable product.  Since the service would be screening customer&#8217;s passwords, it was assumed that there would never be any customers if the service was not &#8220;obviously secure&#8221; (the original phrase used to describe Password RBL).</p>
<p>So we set out to make a Password Blacklisting service that was &#8220;obviously secure.&#8221;  A password screening service that had no possibly of ever knowing the password choices involved.  Or the username associated with the password.  Or even the customer sending the query.  A service where customers did not have to extend any trust or sacrifice any security to use the service.  This is what we built at Password RBL.  But the industry came up with a concise way to describe such a service:  &#8220;zero-trust.&#8221;</p>
<p>For additional details, <a href="https://www.passwordrbl.com/about-security/">follow this link</a> to read about how Password RBL&#8217;s architecture truly is zero-trust.</p>
<p>TL;DR: Password RBL was &#8220;zero-trust&#8221; before it was cool.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/zero-trust-before-it-was-cool/">Zero-Trust Before It Was Cool</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password RBL Statement on Log4j Vulnerability</title>
		<link>https://www.passwordrbl.com/blog/statement-on-log4j-vulnerability/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Wed, 15 Dec 2021 13:55:36 +0000</pubDate>
				<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80126</guid>

					<description><![CDATA[<p>The internet is abuzz about the recent disclosure of a critical vulnerability in the popular the open-source logging library Log4j. [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/statement-on-log4j-vulnerability/">Password RBL Statement on Log4j Vulnerability</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The internet is abuzz about the recent disclosure of a <a href="https://logging.apache.org/log4j/2.x/security.html#cve-2021-44228" target="_blank" rel="noopener">critical vulnerability</a> in the popular the open-source logging library <a href="https://logging.apache.org/log4j/2.x/index.html" target="_blank" rel="noopener">Log4j</a>. Rightfully so, the worst of the vulnerabilities, <a href="https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-44228" target="_blank" rel="noopener">CVE-2021-44228</a>, disclosed on Friday, December 10, 2021, is as bad as it gets, allowing an attacker to completely takeover a target system with minimal effort.  The vulnerability has earned a critical rating score of 10 out of 10 on the CVSS severity model.</p>
<p>&nbsp;</p>
<h2>Password RBL Unaffected by Log4j Vulnerability</h2>
<p>Password RBL is not impacted by this log4j vulnerability because Password RBL does not utilize this library in any systems.</p>
<p>This should not be surprising, since Password RBL has a <a href="https://www.passwordrbl.com/about-security/" target="_blank" rel="noopener">zero-logging policy</a>.  Thus, Password RBL has no need for a code library that provides advanced logging services.  But it is important for subscribers to know that Password RBL is unaffected by this recent vulnerability and continues to be a secure and easy way to prevent bad passwords before they happen.</p>
<p>&nbsp;</p>
<h2>Update on Additional Vulnerabilities</h2>
<p>Since the original positing of this statement, <a href="https://logging.apache.org/log4j/2.x/security.html" target="_blank" rel="noopener">additional vulnerabilities</a> in the log4j library have been disclosed.  Password RBL remains unaffected by these additional vulnerabilities as well, since Password RBL does not utilize the log4j library at all.</p>
<p>&nbsp;</p>
<h3>Not a customer?</h3>
<p>If you are not yet a customer of Password RBL but are interested in better passwords for your organization, then follow this link to <a href="https://www.passwordrbl.com/solutions/" target="_blank" rel="noopener">learn more</a> and read about why our zero-trust solution for better passwords <a href="https://www.passwordrbl.com/about-security/" target="_blank" rel="noopener">really is secure</a>.  Our solutions are easy to use and subscription costs are <a href="https://www.passwordrbl.com/packages/" target="_blank" rel="noopener">very reasonable</a>.  Subscribe today!</p>
<p>The post <a href="https://www.passwordrbl.com/blog/statement-on-log4j-vulnerability/">Password RBL Statement on Log4j Vulnerability</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Cybersecurity Attitudes and Behaviors Report</title>
		<link>https://www.passwordrbl.com/blog/cybersecurity-attitudes-and-behaviors-report-2021/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sun, 17 Oct 2021 21:32:28 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[API Access]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80107</guid>

					<description><![CDATA[<p>The National Cybersecurity Alliance (NCSA) has released their Attitudes and Behaviors report for 2021, and, honestly, it&#8217;s not great.  Well, [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/cybersecurity-attitudes-and-behaviors-report-2021/">Cybersecurity Attitudes and Behaviors Report</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>The <a href="https://staysafeonline.org/" target="_blank" rel="noopener">National Cybersecurity Alliance (NCSA)</a> has released their <a href="https://staysafeonline.org/resource/oh-behave-2021/" target="_blank" rel="noopener">Attitudes and Behaviors report for 2021</a>, and, honestly, it&#8217;s not great.  Well, the reporting is great, and it&#8217;s great that the NCSA conducts and releases this annual report.  But the content of the report contains some not-so-great behaviors among real users.</p>
<h2>MFA</h2>
<p>As we know, Multi-Factor Authentication (MFA) is a great way to combat potential account takeovers or just general bad password hygiene.  Even when MFA is used, <a href="https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/">Password Blacklisting still makes sense</a>.  But if MFA is not in use, then Password Blacklisting is an absolute must!   Unfortunately, the report found that 52% of people have never heard of MFA.  This makes enforcing strong passwords even more important.  But why is this?  Well, 64% say they have no access to MFA, and another 10% say they do have access MFA, but choose not to use it.</p>
<p>&nbsp;</p>
<h2>Responsibility</h2>
<p>Additionally, the data indicates a significant proportion of people simply do not see themselves as responsible for looking after their workplace’s sensitive information.  Over a third (40%) of the full-time and part-time employees participating in this report considered themselves to be the least responsible agency for their organization’s cybersecurity.  That means that nearly half of your employees don&#8217;t think it&#8217;s their responsibility to choose a strong password!  This statistic is alarming and makes the case for all businesses to deploy Password Blacklisting in order to prevent users from choosing poor passwords.</p>
<p>&nbsp;</p>
<h2>Passwords</h2>
<p>Speaking of passwords, the report also discovered some alarming, but simultaneously not surprising, statistics on real-life password behaviors.  Only 43% of participants reported creating long and unique passwords for their online accounts “very often” or “always”. However, almost a third (28%) stated that they didn’t do so.  A third of real-life users are knowingly choosing weak passwords!  That&#8217;s a big number!</p>
<p>But about the more middle-of-the-road, average password behavior.  It&#8217;s still not great.  A majority (58%) of the respondents say they only &#8220;sometimes&#8221; (30%), &#8220;rarely&#8221; (18%), or &#8220;never&#8221; (10%) create long (12 character) and unique passwords.  This is probably because use of a stand-alone password manager application, which would create these long unique passwords, was uncommon, with almost half (49%) of the participants noting they ‘never’ or ‘rarely’ used one.</p>
<p>&nbsp;</p>
<h2>Not Great.  But What To Do?</h2>
<p>The full Cybersecurity Attitudes and Behaviors report (<a href="https://staysafeonline.org/resource/oh-behave-2021/" target="_blank" rel="noopener">available here</a>) contains lots more information and statistics.  But even with just the few takeaways mentioned above, it&#8217;s clear that more work needs to be done.  Deployment of Multi-Factor Authentication would absolutely help, but by 2021, the reason MFA isn&#8217;t completely pervasive is because of many real-life problems, including end-user adoption woes, cost to the business, supportability, and definitely incomplete deployments since businesses commonly support legacy systems which have no concept of MFA &#8211; or anything other than usernames and passwords, really.</p>
<p>Enter Password Blacklisting &#8211; the incredibly affordable and easy to use solution to the bad password problem.  Password RBL has drop-in support for Microsoft Active Directory (and anything linked to AD) and a dead-simple API that can be incorporated into basically anything else.  The return on investment (ROI) of a subscription to Password RBL makes deployment an easy choice &#8211; for IT and decision makers.  See our <a href="https://www.passwordrbl.com/solutions/">solutions</a> in action and <a href="https://www.passwordrbl.com/request-a-quote/">request a free quote</a> today!</p>
<p>The post <a href="https://www.passwordrbl.com/blog/cybersecurity-attitudes-and-behaviors-report-2021/">Cybersecurity Attitudes and Behaviors Report</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Password Attacks Continue to Cause Major Problems</title>
		<link>https://www.passwordrbl.com/blog/password-attacks-continue-to-cause-major-problems/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sat, 07 Aug 2021 14:39:33 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80113</guid>

					<description><![CDATA[<p>Password attacks continue to cause major problems.  These attacks are as old as passwords themselves, and seemingly will never go [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-attacks-continue-to-cause-major-problems/">Password Attacks Continue to Cause Major Problems</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password attacks continue to cause major problems.  These attacks are as old as passwords themselves, and seemingly will never go away.  Every year there are more and more high profile attacks or breaches get traced back to poor password hygiene.  Most critics lament that if only these companies had deployed Multi-Factor Authentication (MFA), this wouldn&#8217;t have happened.  But MFA doesn&#8217;t get deployed for a multitude of real-life reasons, including cost, incompatibility with older systems, end-user acceptance, etc.  And the incredibly cost-effective and simple solution of Password Blacklisting could have also stopped these attacks and without the negatives associated with MFA.</p>
<h2>Pipeline Problems</h2>
<p>In May 2021, a <a href="https://www.theverge.com/2021/6/5/22520297/compromised-password-reportedly-allowed-hackers-colonial-pipeline-cyberattack" target="_blank" rel="noopener">password-based hack of Colonial Pipeline Co</a>. took down the largest fuel pipeline in the U.S. which led to fuel shortages all across the East Coast.  It was a single compromised password that allowed the attackers to completely shutdown the company and cause devastating downstream affects, including a run on fuel, higher fuel prices, but also a data breach of customer information as well.  If the company had just implemented Password Blacklisting, the poor password choice would have been caught and prevented from use in the first place.  No MFA required.</p>
<p>&nbsp;</p>
<h2>Supply Chain Problems</h2>
<p>Of course we all remember the <a href="https://www.itpro.com/security/cyber-attacks/358738/intern-blamed-for-weak-password-that-may-have-sparked-solarwinds" target="_blank" rel="noopener">Solarwinds hack from late 2020</a>.  Again, a single compromised password, &#8220;solarwinds123&#8221;, was found in data breach data from 2019.  The company&#8217;s poor password hygiene allowed a user to choose such a terribly crafted password.  And it doesn&#8217;t matter if it was an intern, manager or leader.  A single compromised account spells disaster.  And in the case of Solarwinds, it was not only disasters for Solarwinds, but all of their downstream customers, too.  Once in the Solarwinds network, the attackers were able to change the code of their product, granting access to any Solarwinds customer who installed the latest version &#8211; and there were some big customers hit by this, including numerous departments of the US Government and many Fortune 500 companies.</p>
<p>&nbsp;</p>
<h2>A Simple Solution</h2>
<p>The easiest and most cost effective way to combat these types of attacks is to deploy Password Blacklisting.  It&#8217;s incredibly easy to do &#8211; much easier than deploying MFA.  There isn&#8217;t even a requirement to change end-user behavior or provide training.  A subscription to Password RBL is incredibly inexpensive and easy to deploy, adding another layer to your companies security stack.  Check out our <a href="https://www.passwordrbl.com/solutions/">solutions</a> and <a href="https://www.passwordrbl.com/request-a-quote/">request a quote</a> today!</p>
<p>The post <a href="https://www.passwordrbl.com/blog/password-attacks-continue-to-cause-major-problems/">Password Attacks Continue to Cause Major Problems</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Got MFA? Good. But You Still Need Password Blacklisting</title>
		<link>https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Tue, 26 Jan 2021 05:20:31 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80072</guid>

					<description><![CDATA[<p>Password Blacklisting is sometimes considered a bridge solution until organizations can finally implement Multifactor Authentication (MFA).  Password blacklisting may get [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/">Got MFA? Good. But You Still Need Password Blacklisting</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password Blacklisting is sometimes considered a bridge solution until organizations can finally implement Multifactor Authentication (MFA).  Password blacklisting may get deployed with plans to retire it once MFA is in place.  On the surface, this seems to make sense.  Once MFA has been implemented, it should not matter if end-user passwords are poor quality, because attacks on those poor passwords would still be thwarted by the extra authentication step of MFA.  However, we are here to inform you that you should not forgo Password Blacklisting if you have already implemented MFA.  In fact, the best, most secure solution is to use both!  Below are some real-world reasons why you should keep using password blacklisting even if you have MFA in place (or plan to soon).</p>
<h3>Reason 1 &#8211; Exceptions</h3>
<p>First off, it is very common that when MFA gets implemented, there will be exceptions for systems/services that just do not (yet) support MFA.  Each of these applications/services are holes in your organization&#8217;s security and attackers will find them.  Most MFA rollouts have at least one of these apps/services that still rely on classic username and password authentication.  As many organizations found out the hard way in the <a href="https://www.passwordrbl.com/blog/bad-password-plus-zerologon-equals-ransomware/">summer of 2020, MFA is great, but if your company VPN solution doesn&#8217;t use/support it</a>, then very bad things can happen.  Attackers can log into the company VPN, impersonating a real company user.  Once attackers have direct access to the interior of company networks, it is as if the bad guys are freely roaming the isles of the company datacenter.  Nothing good becomes of that!</p>
<p>&nbsp;</p>
<h3>Reason 2 &#8211; MFA Bypass</h3>
<p>Another great reason to keep password blacklisting around is that as the prevalence of MFA deployments increases, attackers are changing their ways and are figuring out how to bypass MFA altogether.  There have been numerous high-profile MFA-bypasses in the past year.  A quick <a href="https://www.google.com/search?q=mfa+bypass+attacks">google search</a> shows reports on many of them.  But the most disastrous MFA bypass has to be the Solarwinds supply-chain attack announced in late 2020.   In order for the attackers to gain access to the source-code of Solarwinds&#8217; popular Orion platform, they first had to bypass the MFA that Solarwinds had deployed.  Spoiler alert, the attackers were able to bypass Duo MFA and injected malicious code into the Solarwinds source.   The Cybersecurity and Infrastructure Security Agency (CISA) in the US <a href="https://threatpost.com/cloud-attacks-bypass-mfa-feds/163056/">issued an advisory</a> about attackers combining numerous different attack methods, but notably, MFA bypasses.</p>
<p>&nbsp;</p>
<h3>The Bottom Line</h3>
<p>The answer is clear: you should deploy both Password Blacklisting and Multifactor Authentication.  MFA deployments can stress the budget, but whereas the cost for a Password RBL subscription is quite reasonable.  If you do not have the budget for MFA, then Password RBL blacklisting is a perfect first step &#8211; providing an effective addition to your security makeup and fantastic ROI.  And if you do already have MFA deployed (or the budget to do so), then you can inexpensively add Password RBL blacklisting for a fraction of the total cost.  Either way, Password RBL is for you!  Check out our <a href="https://www.passwordrbl.com/packages/">Packages for Small &amp; Medium Business</a> or request a <a href="https://www.passwordrbl.com/request-a-quote/">free quote</a> if your organization is larger.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.passwordrbl.com/blog/got-mfa-good-but-you-still-need-password-blacklisting/">Got MFA? Good. But You Still Need Password Blacklisting</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>New Versions of API and Password Firewall</title>
		<link>https://www.passwordrbl.com/blog/new-versions-of-api-and-password-firewall/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Sun, 04 Oct 2020 16:35:25 +0000</pubDate>
				<category><![CDATA[Password RBL News]]></category>
		<category><![CDATA[API Access]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80019</guid>

					<description><![CDATA[<p>Password RBL is pleased to announce the next major versions of our products have been released for 2020-Q4.  This includes [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/new-versions-of-api-and-password-firewall/">New Versions of API and Password Firewall</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Password RBL is pleased to announce the next major versions of our products have been released for 2020-Q4.  This includes API v4.00 and Password Firewall for Windows v7.00 to utilize the latest features available in the new API.</p>
<p>&nbsp;</p>
<h2>New Feature: An Additional Way to Query</h2>
<p>This major release all centers around one new core feature &#8211; an additional API endpoint that utilizes a customer-provided API Key to authorize connections to the API.  Using this API Key allows customers to query the API from anywhere, without first registering their IP address(es) with Password RBL.  Not only is API Key authorization easier for customers (because there is no extra IP address management task), but it also friendly to cloud-based infrastructure and services that do not necessarily maintain static IP addressing.  But just to be clear, this is a new API endpoint and the existing IP-authorized endpoint is still supported.</p>
<p>&nbsp;</p>
<h3>A Little History</h3>
<p>Previously, Password RBL&#8217;s API only authorized customer connections based upon their source IP address.  This was a design decision from the very beginning.  Password RBL has always been very focused on providing password blacklisting services in a zero-trust manner.  A cloud-based password blacklisting solution was new to the world back then, and we really wanted customers to understand that it really is secure.  So we choose to implement customer authorization by IP rather than API key.  API queries entering our service were confirmed to come from customers based on the packet&#8217;s source IP.  With the original architecture, by the time the query got passed network checks and load balancing, the API did not know which customer it was coming from (just that it was an authorized customer).  But once we added the Prefix-Query method (where queries only contain a portion of the password hash, not the entire hash), customers had even more assurance that even Password RBL could never determine the cleartext password from their API submission.  This opened the door to reconsidering a feature requested by many customers &#8211; API Key authorization.</p>
<p>&nbsp;</p>
<h3>A Quick Word on TLS versions</h3>
<p>This new key-based endpoint is a modern, new method of connectivity and thus, requires modern TLS connections &#8211; TLS v1.2 at a minimum.  It is important to note that Windows Server 2008 R2 does not have TLS v1.2 enabled by default.  In order for Password Firewall to run with API Key authorization on Windows 2008 R2, you must update .NET to latest patch release and then manually create some registry entries to enable the use of TLS v1.2.  There are many <a href="https://www.smarterasp.net/support/kb/a1968/how-to-fix-error-underlying-connection-was-closed-an-unexpected-error-occurred-on.aspx">guides</a> that you can follow.  Later versions of Windows supports TLS v1.2 by default.  Windows 2008 R2 is now End of Life so any 2008 R2 servers should be retired anyways (but we still support Password Firewall on Server 2008 R2 because we would rather you have strong passwords and an old server than bad passwords and an old server).</p>
<p>&nbsp;</p>
<h3>Download Today!</h3>
<p>The latest API is in production and the latest version of Password Firewall for Windows available now,  Head over to our <a href="https://www.passwordrbl.com/downloads/">downloads page</a> for the latest software and documentation.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.passwordrbl.com/blog/new-versions-of-api-and-password-firewall/">New Versions of API and Password Firewall</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Bad Password + Zerologon = Ransomware</title>
		<link>https://www.passwordrbl.com/blog/bad-password-plus-zerologon-equals-ransomware/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Thu, 24 Sep 2020 20:43:51 +0000</pubDate>
				<category><![CDATA[Industry News]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<category><![CDATA[Tech News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=80030</guid>

					<description><![CDATA[<p>In the August 2020 monthly patch rollup, Microsoft patched and also released extra guidance for a critical vulnerability in the [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/bad-password-plus-zerologon-equals-ransomware/">Bad Password + Zerologon = Ransomware</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>In the August 2020 monthly patch rollup, Microsoft patched and also released extra guidance for a <a href="https://portal.msrc.microsoft.com/en-US/security-guidance/advisory/CVE-2020-1472">critical vulnerability in the Netlogon service</a>.  This vulnerability allows for easy and complete takeover of an Active Directory Domain Controller.  And the only requirement to exploit this vulnerability is network connectivity to the Domain Controller.  This means that if ANY of your end-users have a poor password, your entire Windows network can be taken over.  And it is already happening.</p>
<p>The attack is quite simple.  A regular end-user has a bad password.  Attackers can figure this out in the typical manner &#8211; a password spray or credential stuffing attack.  Once they know the credentials for a user account, the attackers perform a scan of the companies public infrastructure to find the VPN device.  They log into the VPN with the compromised credentials and now have direct network connectivity. The attacker uses this recent <a href="https://nvd.nist.gov/vuln/detail/CVE-2020-1472">Netlogon vulnerability</a> to gain SYSTEM level permissions on the domain controller which means that can basically do anything they want after that, because they can create a new Domain Administrator account.</p>
<p>And now with a Domain Administrator account in hand, the attacker can trigger a very thorough crypto-malware attack across the entire organization.  Ransomware with the reduced privileges of a normal end-user account is bad enough.  But ransomware from a Domain Administrator can be debilitating.  Not only can it encrypt important company data, but also system files which can bring down every Windows systems.  Most companies have good backups of servers.  But most companies do not back up workstations.  It could take weeks or months to rebuild or replace all the workstations.</p>
<p>Obviously, organizations need to follow Microsoft&#8217;s guidance on patching this vulnerability as soon as possible.  But there has been similar vulnerabilities before, and there will surely be similar ones in the future.  So, organizations should also deploy <a href="https://www.passwordrbl.com/password-firewall/">Password Firewall for Windows</a> to prevent the use of bad passwords that lead to account takeover and much, much worse.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/bad-password-plus-zerologon-equals-ransomware/">Bad Password + Zerologon = Ransomware</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>A Billion Passwords Analyzed; Password Firewall Protects You</title>
		<link>https://www.passwordrbl.com/blog/a-billion-passwords-analyzed-password-firewall-protects-you/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Tue, 21 Jul 2020 04:28:05 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Industry News]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=79926</guid>

					<description><![CDATA[<p>A student studying in Cyprus recently released the results of an analysis of 1 billion leaked passwords.  This is one [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/a-billion-passwords-analyzed-password-firewall-protects-you/">A Billion Passwords Analyzed; Password Firewall Protects You</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>A student studying in Cyprus recently <a href="https://github.com/FlameOfIgnis/Pwdb-Public">released the results</a> of an analysis of 1 billion leaked passwords.  This is one of the biggest leaked password data sets ever analyzed and can provide some insights to contemporary password use.  Unfortunately, the results show that the common bad password hygiene that has coinutually plagued the industry, continues to occur.  But, studying such a large dataset has also revealed some other interesting information.  We will go over some of these more interesting discoveries and show you how Password RBL and Password Firewall protect you from these types of problems.</p>
<p>&nbsp;</p>
<h2>Basic Findings</h2>
<p>Out of the 1 billion credentials analyzed, there were only 168.9 million unique passwords in the list.  This means there is a startling amount of password reuse &#8211; bad password reuse.  Password RBL specifically blocks these poor and reused passwords.  This prevents Account Takeover Events by preventing users from, knowingly or inadvertently, choosing the passwords that hackers already know and use in password-based attacks.</p>
<p>The most popular password was &#8220;123456&#8221; &#8211; a truly horrible password choice, as this password (or similar ascending numerical variants) has been in the top 10 worst password choices for years now.  In fact, it was so popular that it was 1 out of ever 142 passwords in this dataset!  This password has been blocked by Password RBL since the very beginning of our service.</p>
<h2>Password Complexity</h2>
<p>Of all the unique passwords in the list, 28.79% were comprised of letters only with 26.16% using lowercase letters only.  Sadly, 13.37% of the passwords used only numbers, which is terrible since there are only 10 characters in the numeric alphabet, making brute-force of numeric-only passwords far easier.  And finally, only 2.04% of the passwords used special characters.</p>
<p>Password Firewall for Windows, specifically addresses password complexity with the Minimum Character Sets Required option.  This allows administrators to choose how many character sets must be present in password choices.  It doesn&#8217;t require a specific number of characters from each character set, because it&#8217;s only important that the passwords have at least one character from the specified number of sets.</p>
<p>Interestingly, 34.41% of the passwords analyzed ended in a numeric digit (but only 4.52% began with a digit).  This is exactly why Password Firewall has the Password DoubleCheck feature.  It will drop any digits at the end of a password choice and then re-query the Password RBL database with the resulting (truncated) password to see if the end-user has chosen a bad password, but simply added a digit to the end.</p>
<h2>Password Reuse</h2>
<p>There is plenty more evidence of the bad password reuse happening.  Unique passwords, that are found only once in the dataset, make up only 8.83% of the dataset.  The top 1,000 most common unique passwords from made up 6.61% of all passwords in the dataset.  The top 1 million most common passwords comprised 36.28% of the dataset.  And the top 10 million most common passwords made up 54.00% of the entire dataset.  So an attacker cracking a password database (that did not use password blacklisting) with a wordlist of only the 10 million most common passwords, has a better than 50/50 chance at cracking each password.  This is why password blacklisting is so necessary.</p>
<p>There is diminishing returns in brute-forcing with a larger datasets.  Brute forcing attackers obviously don&#8217;t need to.  But, we go even farther at Password RBL.  Our highly curated database currently has over 75 million of the most commonly used bad passwords and is growing every year.  Additionally, we provide a conduit for our customers to simultaneously query the Pwned Passwords database as well.  There is a large overlap in our databases, especially at the top end of the most commonly used bad passwords.  But it is a fairly safe assumption to say that this provides protection from over 500 million bad password combinations, which is more than the total number of unique passwords from this latest analysis.</p>
<h2>Conclusion</h2>
<p>This analysis confirmed alot of what Password RBL has known for a long time.  People reuse passwords, alot!  And the passwords they are reusing are common and well-known at this time.  These are the passwords you do not want your users or customers using on your network or app/service.</p>
<p>Password RBL provides an easy way to block these bad passwords as well as any custom passwords you want banned, too.  We even provide statistics so you can know if your users are getting better at choosing passwords.  And best of all, <a href="https://www.passwordrbl.com/packages/">subscriptions are inexpensive</a> so organizations of any a size can afford this effective base-layer of security.</p>
<p>The post <a href="https://www.passwordrbl.com/blog/a-billion-passwords-analyzed-password-firewall-protects-you/">A Billion Passwords Analyzed; Password Firewall Protects You</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
		<item>
		<title>Why You Need Password Firewall to Protect Okta</title>
		<link>https://www.passwordrbl.com/blog/why-you-need-password-firewall-to-protect-okta/</link>
		
		<dc:creator><![CDATA[PasswordRBL Staff]]></dc:creator>
		<pubDate>Wed, 01 Jul 2020 18:32:32 +0000</pubDate>
				<category><![CDATA[General]]></category>
		<category><![CDATA[Products]]></category>
		<category><![CDATA[Password Firewall for Windows]]></category>
		<guid isPermaLink="false">https://www.passwordrbl.com/?p=79914</guid>

					<description><![CDATA[<p>Many organizations are in the process of moving applications to cloud-based service offerings.  This includes big, well-known services like productivity [&#8230;]</p>
<p>The post <a href="https://www.passwordrbl.com/blog/why-you-need-password-firewall-to-protect-okta/">Why You Need Password Firewall to Protect Okta</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Many organizations are in the process of moving applications to cloud-based service offerings.  This includes big, well-known services like productivity suites Office 365 and G-Suite, and point-solutions, such as online meeting services and external file storage/sharing services.  But as companies continue these moves, they retain their core on-premise infrastructure because moving completely to the cloud is more difficult than it seems.  Plus, there are always good reasons to keep some servers/services on-premise.  The most popular on-premise service that is retained is Active Directory, since it is the core directory service that everything is built upon in a Microsoft-based network.</p>
<p>Active Directory services get extended to cloud services via proprietary directory synchronization tools such as Microsoft&#8217;s Azure AD Connect (previously known as DirSync) or Okta&#8217;s AD Agent.  In the case of <a href="https://www.okta.com">Okta</a>, the AD Agent is a small service that runs on one (or more) servers on-premise, synchronizes directory users into Okta and acts as an authentication relay agent using a method refereed to as Delegated Authentication.</p>
<p>Okta becomes an organization&#8217;s central cloud-services authentication hub.  This is where [Active Directory] users authenticate to gain access to the organization&#8217;s growing cloud-based services catalog.  This centralization of authentication helps organizations control cloud-service sprawl and therefore the number of places where they can be attacked.  But this also means that the passwords that grant access into an organization&#8217;s Okta tenant are even more important to protect.</p>
<p>Okta does have an option for preventing the use of the most common bad passwords.  But not only is this blacklist small, it only protects Directory Users when they choose to change their password from inside the Okta portal (which is a feature that is not even enabled by default).  Most directory users still use plenty of on-premise applications and still use a computer that is joined to the company&#8217;s Active Directory.  These users will be changing their passwords against Active Directory, directly interfacing with one of their organization&#8217;s Domain Controllers.  Okta&#8217;s bad password prevention feature is not involved in these password change events.  This is why you still need Password Firewall for Windows to protect your Okta environment, as well as Active Directory and anything else linked to it.</p>
<p>Not only is Password Firewall&#8217;s blacklist far more extensive and our solution more configurable, but most importantly, it catches these on-premise password change (and Admin/Helpdesk password reset) events that are happening directly with Active Directory.  Without Password Firewall&#8217;s protection of your on-premise Active Directory passwords, your Okta tenant is at risk.</p>
<p>Check out <a href="https://www.passwordrbl.com/password-firewall/">Password Firewall for Windows</a>.  It&#8217;s fast to deploy, super easy to use, and inexpensive, too.</p>
<p>&nbsp;</p>
<p>The post <a href="https://www.passwordrbl.com/blog/why-you-need-password-firewall-to-protect-okta/">Why You Need Password Firewall to Protect Okta</a> appeared first on <a href="https://www.passwordrbl.com">Password RBL</a>.</p>
]]></content:encoded>
					
		
		
			</item>
	</channel>
</rss>
