top of page


User Password Behavior can be Exploited by Criminals
Criminals exploit predictable password patterns & variations to access accounts. Screening services can detect compromised credentials
Karen Simmons
Sep 25, 20243 min read


Anatomy of an FI Credential Stuffing Attack
Financial Institutions are not immune to credential stuffing. Here’s an example of an attack on an FI, its risk and success.
Karen Simmons
Sep 4, 20244 min read


myNetWatchman Cybersecurity Glossary
Whether you’re a professional, a business owner, or an end user, here are common cybersecurity terms you should know. 2FA Two-factor...
Grace Howard
Aug 28, 20241 min read


myNetWatchman Releases Study on Credential and Password Reuse
Consumers are frequently reusing passwords & credentials according to a myNetWatchman review of criminal activity.
Justin McDonald
Aug 21, 20242 min read


myNetWatchman’s AllCreds and Active Directory Audit Helps Organizations Prevent Use of Stolen Credentials Like Those Targeting Snowflake Accounts
Snowflake “breach” actually a successful credential stuffing attack & reminder to be aware of exposure through partners as well as directly
Rob Long
Aug 7, 20243 min read


myNetWatchman Announces New CEO
Proven Fraud and Security Executive David Montague to Succeed Lawrence Baldwin as CEO.
David Montague
Aug 5, 20242 min read
PrincipleLogic finds mNW's Active Directory Audit revealing and enlightening
Security consultant Kevin Beaver praises mNW’s AD Audit solution & describes using it to find holes in his customers’ password security
Rob Long
Jul 23, 20241 min read


Using AllCreds to Successfully prevent Account Takeover from Compromised Credentials, a myNetWatchman Client Case Study
New publication from myNetWatchman: Company M: A Case Study Demonstrating AllCreds’ Effectiveness in Combating Credential Stuffing Attacks
Justin McDonald
Jul 18, 20242 min read


Understanding the RockYou2024 Data Dump: Implications and Realities
RockYou2024 Breach Assessment: don’t be put off by size; myNetWatchman clients and most others don’t need to be concerned about RockYou2024
Rob Long
Jul 16, 20243 min read


Credential Stuffing
Credential stuffing uses reused credentials to hack multiple sites via automation, causing account takeover and organizational damage.
Grace Howard
Jul 10, 20245 min read


Naz.API and Making the Case for using Compromised Credential Monitoring
Companies using compromised credential screening were able to detect 94% of these compromised credentials earlier than when it was public.
David Montague
Jun 27, 20242 min read
Krebs on Security: Who’s Behind the SWAT USA Reshipping Service?
Our team at myNetWatchman is thrilled to be referenced in the latest article by KrebsOnSecurity: Who's Behind the SWAT USA Reshipping...
Rob Long
Nov 7, 20231 min read
bottom of page
