SpyCloud: "Infostealers Directly Lead to Ransomware Attacks"

Infostealers are on the rise, and with them, the statistics tracking this growing threat. Many companies publish reports, but what do those numbers really mean? We delved deeper into the data to give you the full story. No time to go through it all? Our Passguard rating system scores the value of statistics on a scale from 1 to 5. Convenient, right?

December 2, 2024

|

Reports

Kaspersky: "Infostealers #2 Malware-as-a-Service"

Infostealers are on the rise, and with them, the statistics tracking this growing threat. Many companies publish reports, but what do those numbers really mean? We delved deeper into the data to give you the full story. No time to go through it all? Our Passguard rating system scores the value of statistics on a scale from 1 to 5. Convenient, right?

November 4, 2024

|

Reports

SpyCloud: "50% of Dark Web Credentials Originate from Infostealers"

Infostealers are on the rise, and with them, the statistics tracking this growing threat. Many companies publish reports, but what do those numbers really mean? We delved deeper into the data to give you the full story. No time to go through it all? Our Passguard rating system scores the value of statistics on a scale from 1 to 5. Convenient, right?

October 7, 2024

|

Reports

NordVPN: "154 Million Dutch Cookies Stolen"

Infostealers are on the rise, and with them, the statistics tracking this growing threat. Many companies publish reports, but what do those numbers really mean? We delved deeper into the data to give you the full story. No time to go through it all? Our Passguard rating system scores the value of statistics on a scale from 1 to 5. Convenient, right?

September 9, 2024

|

Reports

IBM & Intezer: "Infostealers Make Up the Most Unique Malware Samples Targeting Microsoft Windows"

Infostealers are on the rise, and with them, the statistics tracking this growing threat. Many companies publish reports, but what do those numbers really mean? We delved deeper into the data to give you the full story. No time to go through it all? Our Passguard rating system scores the value of statistics on a scale from 1 to 5. Convenient, right?

June 3, 2024

|

Reports

IBM: "266% Increase in the Use of Infostealers"

Infostealers are on the rise, and with them, the statistics tracking this growing threat. Many companies publish reports, but what do those numbers really mean? We delved deeper into the data to give you the full story. No time to go through it all? Our Passguard rating system scores the value of statistics on a scale from 1 to 5. Convenient, right?

September 22, 2024

|

Reports

Kaspersky: “Number of Infostealer Infections Has Increased Sevenfold”

Infostealers are on the rise, and with them, the statistics tracking this growing threat. Many companies publish reports, but what do those numbers really tell us? We dug deeper into the data to give you the full picture. No time to go through everything? Our Passguard rating system scores the value of these statistics on a scale from 1 to 5. Convenient, isn’t it?

May 6, 2024

|

Reports

“If an infostealer is active on someone's device, misuse can't simply be prevented.”

The Graafschap College, a medium-sized vocational school in Doetinchem, has around ten thousand students and over a thousand employees. Rob Gerritsen, Chief Information Security Officer (CISO) at Graafschap College, gained insight into his organization's dark web exposure through Passguard. During a walk through a wintery forest near Doetinchem, he spoke to us about his experiences.

November 29, 2024

|

Endorsement story

Tips from Tom

Our colleague Tom Leijte spoke to Topicus KeyHub about the rise of and the risks they pose to organizations. From stolen session cookies to digital identity misuse—it's a growing problem that needs action.

November 27, 2024

|

News

CIO: “The decisive factor for me was that Passguard is an independent organization”

Information security is gaining increasing attention in healthcare organizations. We spoke about this with a large healthcare organization in the south of the Netherlands. Information security is an important theme for them: they continuously map out vulnerabilities and implement improvements. One of the tools they use for this is Passguard. Why? We asked the CIO.

November 1, 2024

|

Endorsement story

Passguard pitcht op ECSO Cyber Investor Days

Bijna dertig inschrijvingen, slechts tien deelnemers: op 3 oktober nam Passguard, samen met negen andere startups, deel aan de Cyber Investor Days in Den Haag, georganiseerd door de European Cyber Security Organisation (ECSO), met samenwerking van Women4Cyber, TIN Capital, InnovationQuarter, KPN Ventures, Security Delta (HSD) en de stad Den Haag.

October 3, 2024

|

Event

KennisBite: Dark Web Risico's – Het Praktijkverhaal van Omnia Wonen

Het is één ding om van een leverancier te horen hoe goed hun oplossing werkt, maar het is veel krachtiger om van een klant te horen hoe die oplossing in de praktijk wordt toegepast.

June 4, 2024

|

Event

“A Dark Web Scan Was a No-Brainer for Me”

With over 8,500 homes in around 11 municipalities and 100 employees, Omnia Wonen is a medium-sized housing corporation. You might wonder if organizations of this size can also benefit from dark web intelligence. Gerben Naaktgeboren, advisor for Information and Automation at Omnia Wonen, shares his insights.

July 12, 2024

|

Endorsement story

Deep Dive into Infostealers at the Association of Public Libraries

More than 50 information security professionals from public libraries across the Netherlands gathered today in the beautiful theater hall of the Utrecht Library, located in the historic building on the Neude. The purpose? To discuss the latest insights in information security. Among the speakers were Aleid Wolfsen, Chairman of the Dutch Data Protection Authority, and our own Tom Leijte, CEO and Co-Founder of Passguard.

June 25, 2024

|

Event

5 Key Quotes from the New Cyber Security Centre Report on Infostealers

Government agencies rarely give explicit attention to the growing threat of infostealers, but Down Under, that's changing. The Australian Cyber Security Centre (ACSC) recently released their report The Silent Heist, a deep dive into the infostealer ecosystem. Here are the five most important findings.

September 22, 2024

|

News

“We can't afford to miss infostealer infections”

With 12,500 employees worldwide, dozens of shipyards, and a turnover of several billion euros, Damen Shipyards is the largest shipbuilder in the Netherlands. In addition to civilian vessels, Damen is also active in the construction of military ships for navies and coast guards. To map out dark web data and infostealer infections, it uses Passguard. Hans Quivooij, CISO of Damen Shipyards, explains why.

March 8, 2024

|

Endorsement story

“That's how Passguard makes my life as a CISO a lot easier”

Royal FloraHolland is the leading international cooperative and marketplace for floriculture. With their digital platform and physical hubs, they make the widest and deepest floriculture assortment easily accessible worldwide. Royal FloraHolland also takes a pioneering role around cyber, for example as co-initiator of the Cyber Resilience Centre Greenport. From this role, Royal FloraHolland has started offering the RFH (Royal FloraHolland) Cyber subscription for growers and buyers. For mapping its dark web exposure, it uses Passguard. Why? Here is the story of Bas Wevers, CISO (Chief Information Security Officer) of Royal FloraHolland.

February 4, 2024

|

Endorsement story

The four steps of an infostealer attack.

How does an attack on an organization using an infostealer unfold? Examining examples such as Uber and EA Games reveals a four-step plan utilized by attackers to target an organization.

October 4, 2024

|

Infostealers series

What is an infostealer?

An infostealer is a specific type of malware designed to steal as much valuable information from devices as possible. This includes locally stored files and login credentials. Session tokens, stored in cookies, are especially valuable to infostealers. Such data can be exploited to gain access to active sessions, even when multi-factor authentication (MFA) is enabled.

October 1, 2024

|

Infostealers series

Why Are Infostealers Dangerous for Organizations?

If an employee's device is infected with an infostealer – even if it’s not a managed device – the attacker has the same access to internal systems and data as the employee does through that device. This access poses a significant risk for organizations and can result in data breaches and hacks.

October 2, 2024

|

Infostealers series

Why is the infostealer risk so difficult to manage?

Managing the infostealer risk is challenging not only because of the versatility and stealthy nature of this malware but also due to where the risk primarily occurs: on unmanaged devices that have access to internal environments, such as employees’ personal laptops or suppliers’ computers.

October 3, 2024

|

Infostealers series

How Do Devices Get Infected with Infostealers?

It may sound a bit crude, but we often compare infostealers to dog poop: they don’t come flying at you, but you simply step into them. In other words, infostealer infections are almost always the result of user behavior. At this stage, infostealer attacks are generally not yet targeted at specific organizations or users.

October 4, 2024

|

Infostealers series

Infostealer Infection? Follow These 5 Steps.

If you suspect that your organization is dealing with an infostealer infection, it’s crucial to act quickly and decisively. Follow these steps to get the situation under control and prevent further damage.

October 6, 2024

|

Infostealers series

How Do I Prevent Infostealer Infections?

Preventing infostealer infections can be broken down into two key steps. While the first step is usually relatively straightforward, the second is often much more challenging.

October 7, 2024

|

Infostealers series

Why Is the Infostealer Risk Growing So Quickly?

In recent years, many organizations have implemented effective measures to secure their networks and reduce the risk of phishing attacks. As a result, the effectiveness of traditional attack methods has significantly decreased. This poses a major problem for cybercriminals, as their entire ecosystem relies on successful attacks.

October 8, 2024

|

Infostealers series

How Are Infostealers Created?

Infostealers are developed as Malware-as-a-Service (MaaS). This model allows cybercriminals without deep technical knowledge to gain access to advanced malware by simply paying for a subscription. This makes infostealers more accessible for a wider range of criminals to launch attacks without having to develop malware themselves.

October 9, 2024

|

Infostealers series