logo
INE Security Alert: World Password Day 2025 Cybersecurity Training Insights

INE Security Alert: World Password Day 2025 Cybersecurity Training Insights

Business Upturn01-05-2025
By GlobeNewswire Published on May 1, 2025, 15:02 IST
Cary, NC, May 01, 2025 (GLOBE NEWSWIRE) — INE Security, a leading global provider of hands-on cybersecurity training and cybersecurity certifications, today released expert analysis on the current state of password security and security team training best practices as organizations recognize World Password Day on May 1, 2025.
Threat intelligence data shows that password vulnerabilities continue to be the favorite target for hackers worldwide, despite years of warnings from security experts. While companies keep investing in advanced security tech, the humble password remains the front door to most organizations—and too often, it's a door with a broken lock.
'It's concerning to see password-related breaches still dominating security incidents despite all the technological advances,' said Dara Warn, CEO of INE Security. 'What we're finding is that there's a persistent gap between security training and implementation—teams know what they should be doing, but putting that knowledge into practice remains challenging. That's why we're emphasizing practical, hands-on cybersecurity training that transforms security knowledge into meaningful action.'
INE Security's analysis reveals three critical password security trends for 2025: Credential Stuffing Attacks Are Getting Worse
According to The Hacker News, stolen credentials topped the charts as the #1 attack method in 2023/24, with credential stuffing attacks leaving a trail of damage. These attacks are behind 80% of web application breaches.
According to The Hacker News, stolen credentials topped the charts as the #1 attack method in 2023/24, with credential stuffing attacks leaving a trail of damage. These attacks are behind 80% of web application breaches. People Just Aren't Using Password Managers
Despite all the evidence showing they work, password manager adoption remains stubbornly low. Analysis from JumpCloud found that 83% of enterprise organizations use MFAs, but that drops to a mere 60% for smaller businesses. Even more concerning, Security.org's 2024 research shows only 36% of people use password managers at all—just 2% more than last year—while more than half are still relying on their memory to keep track of credentials.
Despite all the evidence showing they work, password manager adoption remains stubbornly low. Analysis from JumpCloud found that 83% of enterprise organizations use MFAs, but that drops to a mere 60% for smaller businesses. Even more concerning, Security.org's 2024 research shows only 36% of people use password managers at all—just 2% more than last year—while more than half are still relying on their memory to keep track of credentials. Hackers Are Getting Better at Bypassing MFA
Multi-factor authentication has improved, but phishing campaigns designed to steal those verification codes have gotten much more sophisticated. Keepnet Labs found that 15-20% of phishing attacks are now specifically crafted to get around MFA protection.
Addressing these vulnerabilities requires comprehensive cybersecurity training that prepares teams for real-world threats.
The Security Training Reality Gap
INE Security recommends a fresh approach to security training to fix these problems and strengthen password protection: Make Training Count: Ditch the annual checkbox compliance training for realistic cybersecurity training scenarios that mirror actual credential attacks. IBM found that top-performing companies are 68% more likely to provide effective training compared to low performers. Teams with proper training save around $70,000 annually and are 10% more productive. Get Hands On with Real Practice: Set up security labs and cyber ranges where people can experience simulated password attacks firsthand, building critical skills for their cybersecurity career. F.Learning Studio found that employees who face simulated attacks develop deeper understanding that sticks with them and keeps them motivated to stay vigilant. Train, Practice, Certify, Repeat: Don't just train once and forget it. Companies with structured, ongoing training see 218% higher income per employee than those that train sporadically according to Keepnet. Build Security Into Your Culture: Close the gap between security knowledge and actual practice by making security part of your company's DNA. A report conducted by INE Security found cybersecurity training programs are the most effective way to keep organizations secure in a cloud-dependent landscape.
'The data consistently shows that organizations investing in comprehensive, hands-on security training achieve measurable improvements in their security outcomes and realize significant returns on that investment,' Warn concluded. 'On World Password Day, I encourage security leaders to thoughtfully evaluate their current training approaches and consider how they might better develop the practical skills their teams need to address today's sophisticated password-based threats.'
About INE Security:
INE Security is the premier provider of online networking and cybersecurity training and certification. Harnessing a powerful hands-on lab platform, cutting-edge technology, a global video distribution network, and world-class instructors, INE Security is the top training choice for Fortune 500 companies worldwide for cybersecurity training in business and for IT professionals looking to advance their careers. INE Security's suite of learning paths offers an incomparable depth of expertise across cybersecurity and is committed to delivering advanced technical training while also lowering the barriers worldwide for those looking to enter and excel in an IT career.
Disclaimer: The above press release comes to you under an arrangement with GlobeNewswire. Business Upturn takes no editorial responsibility for the same.
GlobeNewswire provides press release distribution services globally, with substantial operations in North America and Europe.
Orange background

Try Our AI Features

Explore what Daily8 AI can do for you:

Comments

No comments yet...

Related Articles

200,000 passwords, credit card data and more stolen by this dangerous new malware — how to stay safe
200,000 passwords, credit card data and more stolen by this dangerous new malware — how to stay safe

Yahoo

time06-08-2025

  • Yahoo

200,000 passwords, credit card data and more stolen by this dangerous new malware — how to stay safe

When you buy through links on our articles, Future and its syndication partners may earn a commission. Hackers are now using legitimate-looking software and documents to infect unsuspecting users with a new info-stealing malware capable of pilfering your passwords, credit card data and more. As reported by The Hacker News, this new campaign is believed to be the work of Vietnamese-speaking cybercriminals who have begun deploying the PXA Stealer malware in their attacks. First discovered by security researchers at Cisco Talos, PXA Stealer is an info-stealing malware written in Python. While it was initially used to target government organizations and businesses in the education sector throughout Europe and Asia, the hackers behind this new campaign have shifted their sights to go after ordinary people in the U.S., South Korea, the Netherlands, Hungary and Austria. So far, SentinelOne has identified 4,000 unique IP addresses across 62 countries that have been infected by the PXA Stealer. What makes this particular malware campaign so dangerous is that in addition to how it can steal saved passwords, cookies, credit card info and any other autofill data stored in your browser as well as from crypto wallets and popular applications like Discord, the hackers behind it are also using a number of tricks and techniques to avoid detection. Here's everything you need to know about this new malware campaign along with some tips and tricks to help you avoid falling victim to it. Sideloading to avoid detection In this new wave of attacks, the hackers responsible either tricked potential victims into visiting phishing sites or convinced them to download a ZIP file which, in addition to a signed copy of the free Haihaisoft PDF Reader, also contains a malicious Dynamic link-library or DLL file. As SentinelOne's security researchers explain in their report, this malicious DLL file is an essential part of this campaign as it's what allows the PXA Stealer malware to establish persistence via the Windows Registry on infected systems. However, it's also used to download additional malicious components like Windows executables that are hosted remotely on file-sharing sites like Dropbox. Once the PDF reader is installed and launched, this malicious DLL creates a command line script that tells Microsoft's Edge browser to open a virus-filled PDF file. While the file doesn't actually open and an error message is displayed, the damage is done. Besides using a free PDF reader as a lure, the hackers behind this campaign are also using a Microsoft Word 2013 executable to distribute the PXA Stealer malware. This executable looks like your standard Word file and comes attached in emails but when opened, it uses a different malicious DLL file to achieve the same end goal: infecting your PC with info-stealing malware. To get all of this stolen data off of your computer, the hackers behind this campaign are using Telegram as an exfiltration channel. From there, all of those stolen passwords, credit card data and other sensitive personal information is then sold on the dark web for other cybercriminals to use in their own attacks. How to stay safe from malware Everywhere you turn online these days, there seems to be hackers lurking around the corner waiting to infect your devices with malware in order to steal your data. In this particular campaign, the hackers behind it used either phishing sites or malicious email attachments to trick unsuspecting users. This is why you need to be extra careful when checking your inbox. Don't just click on any link you see in an email. Instead, you want to hover your mouse over the link to see where it's taking you. If you don't recognize the URL, don't click on the link. Likewise, when it comes to email attachments, you always want to be wary when an unknown sender attaches a file to an email they've sent you. When in doubt, if you don't recognize the sender, don't download the attachment even if it appears to be legitimate at first glance. Given that the PXA Stealer and other malware strains often target the data you've stored in your browser, you should avoid keeping sensitive information in it when possible. For instance, instead of having your browser store your saved passwords, you should use one of the best password managers instead. The same thing goes for your credit card details and other sensitive information. While I would normally recommend keeping your PC protected with the best antivirus software, the hackers behind this campaign used all sorts of clever tricks and techniques to avoid having their malware detected. In this case, it's up to you to use your best judgement when clicking on links or downloading files online. Still, it never hurts to use a reliable antivirus to keep you protected from other viruses and threats online. Given that the PXA Stealer was first used to target governments and educational organizations before regular people, I don't think this is the last we've seen of this info-stealing malware yet. Instead, other hackers may try to use this malware strain in future attacks. Follow Tom's Guide on Google News to get our up-to-date news, how-tos, and reviews in your feeds. Make sure to click the Follow button. More from Tom's Guide I ditched my passwords for passkeys on these 3 popular services — and it took me less than 10 minutes What is the most private way of verifying your age? Email security features are being hijacked to steal Microsoft 365 logins — what you need to know Solve the daily Crossword

200,000 passwords, credit card data and more stolen by this dangerous new malware — how to stay safe
200,000 passwords, credit card data and more stolen by this dangerous new malware — how to stay safe

Tom's Guide

time04-08-2025

  • Tom's Guide

200,000 passwords, credit card data and more stolen by this dangerous new malware — how to stay safe

Hackers are now using legitimate-looking software and documents to infect unsuspecting users with a new info-stealing malware capable of pilfering your passwords, credit card data and more. As reported by The Hacker News, this new campaign is believed to be the work of Vietnamese-speaking cybercriminals who have begun deploying the PXA Stealer malware in their attacks. First discovered by security researchers at Cisco Talos, PXA Stealer is an info-stealing malware written in Python. While it was initially used to target government organizations and businesses in the education sector throughout Europe and Asia, the hackers behind this new campaign have shifted their sights to go after ordinary people in the U.S., South Korea, the Netherlands, Hungary and Austria. So far, SentinelOne has identified 4,000 unique IP addresses across 62 countries that have been infected by the PXA Stealer. What makes this particular malware campaign so dangerous is that in addition to how it can steal saved passwords, cookies, credit card info and any other autofill data stored in your browser as well as from crypto wallets and popular applications like Discord, the hackers behind it are also using a number of tricks and techniques to avoid detection. Here's everything you need to know about this new malware campaign along with some tips and tricks to help you avoid falling victim to it. In this new wave of attacks, the hackers responsible either tricked potential victims into visiting phishing sites or convinced them to download a ZIP file which, in addition to a signed copy of the free Haihaisoft PDF Reader, also contains a malicious Dynamic link-library or DLL file. As SentinelOne's security researchers explain in their report, this malicious DLL file is an essential part of this campaign as it's what allows the PXA Stealer malware to establish persistence via the Windows Registry on infected systems. However, it's also used to download additional malicious components like Windows executables that are hosted remotely on file-sharing sites like Dropbox. Get instant access to breaking news, the hottest reviews, great deals and helpful tips. Once the PDF reader is installed and launched, this malicious DLL creates a command line script that tells Microsoft's Edge browser to open a virus-filled PDF file. While the file doesn't actually open and an error message is displayed, the damage is done. Besides using a free PDF reader as a lure, the hackers behind this campaign are also using a Microsoft Word 2013 executable to distribute the PXA Stealer malware. This executable looks like your standard Word file and comes attached in emails but when opened, it uses a different malicious DLL file to achieve the same end goal: infecting your PC with info-stealing malware. To get all of this stolen data off of your computer, the hackers behind this campaign are using Telegram as an exfiltration channel. From there, all of those stolen passwords, credit card data and other sensitive personal information is then sold on the dark web for other cybercriminals to use in their own attacks. Everywhere you turn online these days, there seems to be hackers lurking around the corner waiting to infect your devices with malware in order to steal your data. In this particular campaign, the hackers behind it used either phishing sites or malicious email attachments to trick unsuspecting users. This is why you need to be extra careful when checking your inbox. Don't just click on any link you see in an email. Instead, you want to hover your mouse over the link to see where it's taking you. If you don't recognize the URL, don't click on the link. Likewise, when it comes to email attachments, you always want to be wary when an unknown sender attaches a file to an email they've sent you. When in doubt, if you don't recognize the sender, don't download the attachment even if it appears to be legitimate at first glance. Given that the PXA Stealer and other malware strains often target the data you've stored in your browser, you should avoid keeping sensitive information in it when possible. For instance, instead of having your browser store your saved passwords, you should use one of the best password managers instead. The same thing goes for your credit card details and other sensitive information. While I would normally recommend keeping your PC protected with the best antivirus software, the hackers behind this campaign used all sorts of clever tricks and techniques to avoid having their malware detected. In this case, it's up to you to use your best judgement when clicking on links or downloading files online. Still, it never hurts to use a reliable antivirus to keep you protected from other viruses and threats online. Given that the PXA Stealer was first used to target governments and educational organizations before regular people, I don't think this is the last we've seen of this info-stealing malware yet. Instead, other hackers may try to use this malware strain in future attacks. Follow Tom's Guide on Google News to get our up-to-date news, how-tos, and reviews in your feeds. Make sure to click the Follow button.

SecurityBridge Acquires CyberSafe To Deliver Contextual SSO, MFA, And Passwordless Authentication To SAP Users
SecurityBridge Acquires CyberSafe To Deliver Contextual SSO, MFA, And Passwordless Authentication To SAP Users

Business Upturn

time23-07-2025

  • Business Upturn

SecurityBridge Acquires CyberSafe To Deliver Contextual SSO, MFA, And Passwordless Authentication To SAP Users

Business Wire India SecurityBridge, the creator of the Cybersecurity Command Center for SAP, today announced the acquisition of CyberSafe, a UK-based pioneer in multi-factor authentication (MFA) and single sign-on (SSO) solutions for SAP users. The acquisition marks a significant milestone in SAP security innovation, as CyberSafe's flagship TrustBroker® products will further enrich the SecurityBridge platform capabilities. A two-way integration enables customers to transition from password-based authentication to multi-factor authentication across the SAP technology stack, with full insight into the SAP application layer. This press release features multimedia. View the full release here: SecurityBridge, the leading SAP security software provider, acquires MFA and SSO software company CyberSafe. 'SAP's native security lacks the depth today's threat landscape demands,' said Christoph Nagy, CEO and Co-founder of SecurityBridge. 'This acquisition reinforces our mission to ensure no SAP system or customer is ever compromised. By integrating TrustBroker with our platform, we enable customers to apply passwordless MFA across all SAP workflows, without compromising usability. However, customers can still use TrustBroker products standalone.' With a glowing global customer base spanning all industry segments and over three decades of cybersecurity expertise, CyberSafe brings deep authentication capabilities and a proven track record in enterprise-class identity protection. The TrustBroker products offer secure single sign-on (SSO), policy-based MFA during login, and step-up authentication (SUA), utilizing leading MFA applications, such as Microsoft Entra MFA (formerly Azure MFA), Okta, PingID, Duo, RSA SecurID, and TOTP/HOTP apps. Once integrated with SecurityBridge, TrustBroker products will act upon real-time threat signals, such as anomalous logon behavior, suspicious devices, and past user activity, to determine when MFA enforcement is necessary, thereby adding contextual intelligence to SAP user authentication. 'For over three decades, CyberSafe has been at the forefront of integrating SAP user authentication with existing infrastructure, such as Microsoft Active Directory,' said Tim Alsop, Managing Director of CyberSafe. 'Joining forces with SecurityBridge facilitates building new products and enhancing existing products while leveraging the growing adoption of modern authentication methods. I am also looking forward to being able to deliver integration with the SecurityBridge platform, so that our TrustBroker products can offer contextual and risk-based MFA.' The combined platform offering behavior-based enforcement policies with MFA takes SAP security to a new level by: Automatically enforcing MFA when users return after long periods of inactivity (e.g., 90+ days). Prompting MFA for logins outside of a user's standard working hours. Enforcing MFA when logins originate from devices not previously associated with the user. Requiring additional authentication for users with past suspicious behavior or flagged activity. Triggering MFA when access occurs from devices used by multiple individuals. These context-aware measures will seamlessly adapt authentication requirements to each situation, reducing user friction during normal activity while strengthening protection against abnormal or high-risk access attempts. About CyberSafe CyberSafe is a leading global security software vendor, providing mature, proven, standards-based solutions that enable true enterprise-class single sign-on (SSO), policy-based multi-factor authentication (MFA), and step-up authentication (SUA) for mission-critical SAP business applications. In 1991, the company pioneered the first commercial Kerberos-based security product, including being the first to provide critical security interoperability between Microsoft Windows and non-Microsoft operating systems and applications. More recently, CyberSafe has pioneered step-up authentication for SAP users, a feature not available from any other software vendor. The TrustBroker products are flexible and leverage existing infrastructure to minimize implementation and ongoing costs. About SecurityBridge SecurityBridge is the leading provider of a comprehensive, SAP-native cybersecurity platform, enabling organizations worldwide to protect their most critical business systems. The platform seamlessly integrates real-time threat monitoring, vulnerability management, and compliance capabilities directly into the SAP environment, enabling organizations to protect their data's integrity, confidentiality, and availability with minimal manual effort. It provides a 360° view of the SAP security situation and is characterized by user-friendliness, rapid implementation, and transparent licensing. SecurityBridge has a proven track record, including an excellent customer rating and over 7,500 secured SAP systems worldwide. The company is committed to innovation, transparency, and customer focus, ensuring that SAP users can confidently navigate the evolving landscape of SAP security threats. For more information, please visit View source version on Disclaimer: The above press release comes to you under an arrangement with Business Wire India. Business Upturn take no editorial responsibility for the same. Ahmedabad Plane Crash

DOWNLOAD THE APP

Get Started Now: Download the App

Ready to dive into a world of global content with local flavor? Download Daily8 app today from your preferred app store and start exploring.
app-storeplay-store