DORA Mandates Credential Security as Financial Risk Control

What happens when a threat actor waltzes into your network with a legitimate username and password - can your controls stop them? With DORA now in effect, EU financial institutions must prioritize credential security as a critical risk control, shifting from best practice to binding regulation.

https://osintsights.com/dora-mandates-credential-security-as-financial-risk-control?utm_source=mastodon&utm_medium=social

#DigitalOperationalResilienceAct #CredentialSecurity #FinancialInstitutions #EuRegulations #FinancialRiskControl

DORA Mandates Credential Security as Financial Risk Control

Learn how DORA mandates credential security for financial risk control, and take action to ensure compliance with new regulations on access and authentication now.

OSINTSights

πŸ“’ Day 10: How Password Attacks Work β€” Hashing, Cracking & Credential Security (2026)

Day 10 of 100. Understand how password attacks works - hashing, dictionary attacks, brute force and credential testing β€” explained by a professional pentester so you can defend against these techniques. FREE course by Mr Elite.

πŸ”— https://securityelites.com/day-10-how-password-attacks-work/

#credentialsecurity #howhackerscrackpasswords #passwordhashingexplained

How Password Attacks Work 2026 β€” Day 10 Ethical Hacking

Day 10 of 100. Understand how password attacks works - hashing, dictionary attacks, brute force and credential testing β€” explained by a professional pentester so you can defend against these techniques. FREE course by Mr Elite.

SecurityElites

Exposed credentials remain a top breach vector - leaked secrets in code, logs, and configs continue to open the door. If it’s in plaintext, assume it’s compromised. πŸ”‘βš οΈ #SecretsManagement #CredentialSecurity

https://www.helpnetsecurity.com/2026/03/27/gitguardian-exposed-credentials-risk-report/

AI frenzy feeds credential chaos, secrets spread through code, tools, and infrastructure - Help Net Security

Exposed credentials continue to spread through code and internal systems, increasing risk as leaks persist longer and reach more tools.

Help Net Security

Rhaetian Railway has confirmed unauthorized access to customer data linked to its Vereina car shuttle ticketing system.

While card data was not impacted, exposed account credentials raise familiar questions around access control, credential storage, and customer-facing attack surfaces in transport infrastructure.

This incident reinforces the importance of continuous monitoring and credential hygiene in public-sector systems.

Follow @technadu for sober, technically grounded cybersecurity reporting.

Source: https://www.inside-it.ch/datenleck-bei-der-rhaetischen-bahn-20260122

Thoughts and analysis welcome.

#InfoSec #DataBreach #TransportSecurity #CredentialSecurity #PublicInfrastructure #CyberRisk

A recent investigation into malicious Chrome extensions targeting enterprise HR and ERP platforms highlights a persistent challenge: browser extensions operating with elevated trust.

The campaign involved credential cookie exfiltration, session hijacking, and interference with administrative security controls - demonstrating how extensions can bypass traditional perimeter defenses.

This reinforces the need for stronger browser governance, extension allow-listing, and visibility within enterprise environments.

Follow @technadu for neutral, practitioner-focused cybersecurity reporting.

Source: https://www.bleepingcomputer.com/news/security/credential-stealing-chrome-extensions-target-enterprise-hr-platforms/

Thoughtful discussion encouraged.

#InfoSec #EnterpriseSecurity #BrowserHardening #IdentityThreats #CredentialSecurity #SaaSRisk #CyberDefense #SecurityAwareness

Recent law enforcement actions against suspected Black Basta affiliates highlight how modern ransomware groups operate.
Investigators say some members focused on credential recovery and access enablement, while leadership coordinated targeting, negotiations, and cryptocurrency payments. Authorities seized digital media and continue forensic analysis.

Defensive implications:
β€’ Credential theft remains a primary entry point
β€’ Ransomware operations are modular and role-based
β€’ Early-stage detection is critical
How are organizations adjusting controls to detect access misuse sooner?

Source:https://therecord.media/police-raid-homes-of-alleged-black-basta-hackers

Engage with the discussion and follow TechNadu for objective InfoSec coverage.

#InfoSec #Ransomware #ThreatIntelligence #CredentialSecurity #IncidentResponse #CyberDefense #TechNadu

APT28 is running credential-stealing campaigns to fuel long-term espionage β€” persistence, not noise, remains the real threat. Identity is still the weakest link. πŸ•΅οΈβ€β™‚οΈπŸ”‘ #APT #CredentialSecurity

https://thehackernews.com/2026/01/russian-apt28-runs-credential-stealing.html

Russian APT28 Runs Credential-Stealing Campaign Targeting Energy and Policy Organizations

Russian-linked APT28 ran credential-harvesting attacks in 2025 using fake Microsoft, Google, and VPN login pages, PDF lures, and legitimate web servic

The Hacker News

🚨 Collins Aerospace Breached Twice in One Week β€” Everest + Ransomware

Evidence confirms two distinct incidents:
– Everest data exfiltration (Sept 10–11): leveraged old credentials from a 2022 RedLine infection.
– Ransomware attack (Sept 19): separate event, caused system disruptions.

Legacy credentials remain one of the most exploited weaknesses in enterprise networks.

πŸ’¬ How does your team track and rotate long-term credentials? Comment below & follow TechNadu for real-time cyber intelligence.

#CyberSecurity #CollinsAerospace #Everest #Ransomware #RedLineStealer #InfoSec #CredentialSecurity #ThreatIntel #AviationSecurity #CyberDefense #ZeroTrust #TechNadu

AI MCP servers have a glaring security hole: long-lived, static credentials are putting data, code, and production systems at risk. https://jpmellojr.blogspot.com/2025/10/model-context-protocol-credential.html #AIsecurity #CredentialSecurity #MCP #APISecurity #SecretsManagement #Astrix
Palo Alto Networks CEO Nikesh Arora warns that agentic AI browsers may face resistance in corporate settings due to security concerns, stressing the need for robust credential controls and highlighting ongoing industry investment in AI models.
#YonhapInfomax #PaloAltoNetworks #AgenticAI #CredentialSecurity #CyberArk #EnterpriseSecurity #Economics #FinancialMarkets #Banking #Securities #Bonds #StockMarket
https://en.infomaxai.com/news/articleView.html?idxno=80336