top of page


New White Paper from The Fraud Practice and myNetWatchman Discusses Balancing Protection Against ATO with Preserving the User Experience
We provide an alternative perspective on the myth that 2FA makes user credentials secure so you don’t need to detect compromised credentials
Justin McDonald
Oct 30, 20242 min read


Anatomy of Email Compromise
Protect your castle! Compromised emails put data & accounts at risk. Businesses using email for 2FA need a new approach. #cybersecurity
Karen Simmons
Oct 23, 20243 min read


User Password Behavior can be Exploited by Criminals
Criminals exploit predictable password patterns & variations to access accounts. Screening services can detect compromised credentials
Karen Simmons
Sep 25, 20243 min read


Anatomy of an FI Credential Stuffing Attack
Financial Institutions are not immune to credential stuffing. Here’s an example of an attack on an FI, its risk and success.
Karen Simmons
Sep 4, 20244 min read


myNetWatchman Cybersecurity Glossary
Whether you’re a professional, a business owner, or an end user, here are common cybersecurity terms you should know. 2FA Two-factor...
Grace Howard
Aug 28, 20241 min read


myNetWatchman Releases Study on Credential and Password Reuse
Consumers are frequently reusing passwords & credentials according to a myNetWatchman review of criminal activity.
Justin McDonald
Aug 21, 20242 min read


myNetWatchman’s AllCreds and Active Directory Audit Helps Organizations Prevent Use of Stolen Credentials Like Those Targeting Snowflake Accounts
Snowflake “breach” actually a successful credential stuffing attack & reminder to be aware of exposure through partners as well as directly
Rob Long
Aug 7, 20243 min read


Using AllCreds to Successfully prevent Account Takeover from Compromised Credentials, a myNetWatchman Client Case Study
New publication from myNetWatchman: Company M: A Case Study Demonstrating AllCreds’ Effectiveness in Combating Credential Stuffing Attacks
Justin McDonald
Jul 18, 20242 min read


Credential Stuffing
Credential stuffing uses reused credentials to hack multiple sites via automation, causing account takeover and organizational damage.
Grace Howard
Jul 10, 20245 min read
bottom of page
