<img height="1" width="1" style="display:none" src="https://www.facebook.com/tr?id=1678611822423757&amp;ev=PageView&amp;noscript=1">
Defrag This

| Read. Reflect. Reboot.

hacks

Posted on 06.21.19 by Dan Franciscus

Detecting and Defending Against Pass the Hash Attacks

A pass the hash attack is a common attack vector utilized by many adversaries. In this attack, a Windows username is paired with the hashed value of a Windows account password. Let's take a deeper look.

Posted on 02.01.19 by Jeff Edwards

Podcast - 12 Years Later: How the TJX Hack Changed Security and Compliance

In this episode of Defrag This, we’re taking a look back at one of the most monumental events in hacker history—the 2007 hack of TJX companies, which was, at the time, the biggest breach of consumer data in the history of the United States.

Posted on 12.19.18 by Greg Mooney

Podcast : Top 6 Data Breaches of 2018

And here we are yet again. Another year and another array of data breaches to talk about over the course of the year. So what exactly defined 2018 when it came to data security?

Posted on 11.30.18 by Jeff Edwards

Marriott Hotels Discloses Data Breach Affecting 500M Customers

Today, the world's largest hotel chain, Marriott International, disclosed what may be turn out to be one of the largest data breaches in history.

Posted on 10.12.18 by Jeff Edwards

Did China Pull off the Biggest Hardware Hack in History?

For years, there have been concerns of the Chinese government building backdoors and spying capabilities in to phones and hardware built on their soil, and now it seems those concerns are coming to head with a recent Bloomberg story that alleges that Chinese government...

Free Trials

Getting started has never been easier. Download a trial today.

Download Free Trials

Contact Us

Let us know how we can help you. Focus on what matters.

Send Us a Note

Subscribe to our Blog

Let’s stay in touch! Register to receive our blog updates.