Read the results of the largest US-based study focused on workforce passwordless authentication with Ponemon Institute
The State of Workforce Passwordless Authentication report

Octopus Blog | Threats and Alerts

Servers Turned to Cryptocurrency Miners

Blog

Wednesday June 26, 2019

How Poor Passwords Turned 50,000 Servers Into Cryptocurrency Miners

In May, researchers from security firm Guardicore uncovered a massive campaign by Chinese hackers to break into online Windows servers and to infect them with cryptocurrency miners. Cryptominers are special malware that hijack the resources of the infected machine to solve complicated mathematical equations and collect cryptocurrency rewards. As explained by the security researchers, the...
Read more

About Octopus

Secret Double Octopus is the passwordless authentication solution for the enterprise. We liberate end-users and security teams from the burden of passwords with the simplicity and security of strong passwordless authentication.

How Phishing Can Overcome 2FA

Blog

Monday June 17, 2019

How Phishing Can Overcome 2FA

Phishing is a serious and ever-present threat to businesses and individuals The development of increasingly sophisticated methods coupled with high success rates has caused phishing attacks to double over the past year. While phishing comes in many forms, all phishing methods are in essence an attempt to extract credentials from an unsuspecting user through some...
Read more

The Verizon Breach Report

Blog

Monday May 27, 2019

The Verizon Breach Report – 4 Things Learned

Telecom giant Verizon Wireless recently released their annual Data Breach Investigation Report for 2019. The Report lays out a data-driven assessment of threat trends and other stats on information-breach incidents over the previous year. Looking over the Report’s 78 pages, several important realities about the state of authentication security come to light. Stolen Passwords are...
Read more

Solving Phishing from the Root

Blog

Wednesday April 3, 2019

Solving Phishing from the Root

Spear phishing. It’s one of the more vicious methods used by today’s cyber criminals to compromise networks. Phishing related attacks have been a favorite of the hackers tool kit for years. And these kinds of attacks are becoming more common and more sophisticated over time. What is Spear Phishing? In its most basic definition, phishing...
Read more

Password Spraying

Blog

Monday March 18, 2019

Password Spraying – The Citrix Breach

On March 8, Citrix posted a statement confirming that the company’s internal network had been breached. Citrix became aware of the attack a couple of days earlier when the FBI advised that they had reason to believe that cyber criminals gained access to Citrix’s internal network. Cybersecurity firm Resecurity claimed it had alerted Citrix to...
Read more

Stolen Passwords Are a Big Deal

Blog

Thursday February 21, 2019

How stolen passwords are damaging the cybersecurity industry

On February 14, dating site Coffee Meets Bagel sent an email to its users, informing them that an unauthorized party may have gained access to their data. This is not the kind of Valentine’s Day message you would expect from a website that is supposed to help you find love. Coffee Meets Bagel was part...
Read more

Visit the OctoCampus

Get a crash course in passwordless authentication at our campus to learn all about modern workforce authentication technologies and standrads!

Big Credential Breaches

Blog

Tuesday February 12, 2019

Big Credential Breaches

In today’s digital threat landscape, large-scale information compromise is no longer big news. Averaging one a month, hackers have consistently managed to execute major breaches against organizations the world over, resulting in millions of compromised identities But the sheer scale of the most recent mega breach makes it something unique. Dubbed Collection #1 by its...
Read more