Tag

weak passwords

1 views collected around this technical thread.

DevOps Operations Practice
DevOps Operations Practice
Jun 11, 2024 · Information Security

Common Weak Passwords and Best Practices for Secure Password Creation

The article presents NordPass's annual most‑used password list, highlights the top ten weak passwords in China that can be cracked in seconds, explains why users choose them, and offers four practical recommendations for creating stronger, more secure passwords.

NordPassbest practicesinformation security
0 likes · 3 min read
Common Weak Passwords and Best Practices for Secure Password Creation
IT Services Circle
IT Services Circle
Jul 8, 2022 · Information Security

Weak Passwords Lead to Massive AMD Data Breach: RansomHouse Exposes Security Lapses

A recent ransomware group called RansomHouse revealed that AMD suffered a massive data breach of over 450 GB due to employees using simple passwords like "admin" and "123456", highlighting the dangers of weak credentials and prompting urgent security awareness.

AMDdata breachinformation security
0 likes · 5 min read
Weak Passwords Lead to Massive AMD Data Breach: RansomHouse Exposes Security Lapses
Efficient Ops
Efficient Ops
Mar 23, 2017 · Information Security

Why Weak Passwords Still Threaten Enterprises: Real-World DevOps Security Risks

The article examines common security risks such as weak passwords, GitHub credential leaks, and misconfigurations in DevOps pipelines, illustrating how attackers exploit these flaws and offering practical mitigation strategies like access control, least‑privilege policies, robust password rules, and vulnerability tracking.

DevOpsRisk Assessmentgit security
0 likes · 10 min read
Why Weak Passwords Still Threaten Enterprises: Real-World DevOps Security Risks
Efficient Ops
Efficient Ops
May 30, 2016 · Information Security

Why Weak Passwords and Unpatched Redis Threaten Operational Security

The article explains how weak passwords, misconfigured services like Redis, careless port changes, and leaked data enable attackers to compromise servers and internal networks, illustrating each risk with real‑world case studies and offering practical mitigation advice for robust ops security.

Redis vulnerabilitydata breachincident response
0 likes · 11 min read
Why Weak Passwords and Unpatched Redis Threaten Operational Security