Microsoft has started enforcing number matching in Microsoft Authenticator push notifications to fend off multi-factor authentication (MFA) fatigue attacks. In...
Meet Issak Davidovich, Vice President of Research and Development at C2A Security. He has more than 16 years experience of leading embedded security teams. He joined...
In response to ongoing cybersecurity events, the National Security Agency (NSA) released a Cybersecurity Advisory “Detecting Abuse of Authentication Mechanisms.” The advisory provides guidance to National Security System...
There is an old saying that “There is strength in numbers.” But what happens when that strength is on the side of the intent to do harm? ...
Here are the news and updates you may have missed. Attorney General William Barr is the latest government official to join those blaming Russian actors for...
Identity access management provider SecureAuth has uncovered a security vulnerability in SAP HANA, SAP’s in-memory database. HANA is a core component of SAP’s business technology platform...
The FBI should establish a “formalized bureau-wide dark web strategy” to address operational shortcomings in how it tackles illegal darknet activities, a Department of Justice (DoJ)...
There’s no doubt that 2020 will be remembered for the uncertainty and rapid change it brought. As the global pandemic accelerated trends like remote working and digital transformation,...
Flavor and fragrance developer Symrise has suffered a Clop ransomware attack where the attackers allegedly stole 500 GB of unencrypted files and encrypted close to 1,000...
Medical records, insurance claim docs, promotion process feedback… you name it, Probase bared it A business app developer’s unsecured Microsoft Azure blob left more than half...
Telangana state government took over three months to protect sensitive details of its employees and pensioners from its website. The Indian Computer Emergency Response Team (CERT-In)...
Recent Comments