Beware of Password Spraying

  • Attackers are most likely to use usernames that are non-existent users, any such login attempt made with a non-existent user should be alerted.
  • Lockout events should be triggered due to exceeding the lockout threshold within any service.
  • Cybercriminals will often use automated bots or scripts targeting the specific URL of service which can also become a good signal for organizations to detect such attacks.
  • Review logs and policies in place periodically for any particular service.
  • Passwords should be changed on a regular basis.
  • Use different passwords for different websites.
  • Use password management tools that help you store and generate passwords more securely.
  • Multi-factor authentication (2FA) along with strong passwords will add a second layer of security.

--

--

A comprehensive Cyber Threat Management service. We offer cyber detection, analysis and mitigation via a 24/7/365 SOC. Headquartered in the Kingdom of Bahrain.

Love podcasts or audiobooks? Learn on the go with our new app.

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
CTM360

CTM360

A comprehensive Cyber Threat Management service. We offer cyber detection, analysis and mitigation via a 24/7/365 SOC. Headquartered in the Kingdom of Bahrain.