• Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
Starby Four

Vibes|Music|Tech

  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram
  • Home
  • About
  • Social
    • Twitter
    • LinkedIn
    • Instagram

No Widgets found in the Sidebar Alt!

  • Tech

    How Was Colonial Pipeline Hacked/Breached? Because of One Single Employee’s Compromised Password

    June 7, 2021 /

    That’s all it takes, and usually what it comes down to. Passwords. As the founding contemporary lyrical wordsmith members of Wu-Tang would say, “Protect ya neck!“. Because without it, you’ll lose your head. Same with passwords! Protect ya passwords!!! All a malicious actor would need is a password to an account, and just like that (*finger snap!*), you’ve invited them in, like welcoming Count Dracula through your front door for Sunday dinner. So, Colonial, right…here’s the latest. After an analysis of the cyberattack on Colonial Pipeline, investigators suspect that hackers obtained the password from the dark web (think a marketplace for illicit activity) where such info is available for the…

    read more
    Aaron Comments Off on How Was Colonial Pipeline Hacked/Breached? Because of One Single Employee’s Compromised Password

    You May Also Like

    Learning To Program Is Hard…

    December 30, 2020

    Protected: What is Equinix? And Why Are They So Important??

    March 23, 2021

    Vim–The Vi IMproved Text Editor

    December 30, 2020

Archives

Categories

More

About

Documentation

Vim

Recent Posts

  • Metaverse security is a thing because security is still a thing…
  • What is a password manager and why do you need one…
  • What Is The Metaverse?
  • FAA Plans Warnings on 5G…What 5G Means for the FAA, FCC and Air-safety…
  • Blockchain & Money: Session 18: , by M.I.T. Sloan School of Management with Professor Gary Gensler

Tags

2020 A+ Bitcoin Blockchain C++ Careers CLI Cloud Coding CompTIA CompTIA A+ CompTIA Network+ Course Notes Covid-19 Crypto Cryptography Cyberattack Cybersecurity Data Structures Definitions Economy Essential Music Functions Learning Life M.I.T. Methods Mobile Music Music Video Networking News Notes NYC Peering Programming Ruby Security Structured Programming TCP/IP Tech Terminal The Internet Video Wireless Networking
© 2026 Starby Four.
Ashe Theme by WP Royal.