Tag: authentication
-
An Overview of Passwordless Authentication
Tags: authenticationExplore passwordless authentication methods, benefits, and implementation strategies. Learn how to enhance security and user experience by eliminating passwords. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/an-overview-of-passwordless-authentication/
-
9 unverzichtbare Open-Source-Security-Tools
Tags: attack, authentication, backdoor, blueteam, breach, ciso, cyersecurity, data-breach, encryption, incident response, intelligence, linux, mail, malware, monitoring, open-source, powershell, privacy, risk, software, sql, threat, tool, vulnerability, windowsDiese Open-Source-Tools adressieren spezifische Security-Probleme mit minimalem Footprint.Cybersicherheitsexperten verlassen sich in diversen Bereichen auf Open-Source-Lösungen nicht zuletzt weil diese im Regelfall von einer lebendigen und nutzwertigen Community gestützt werden. Aber auch weil es inzwischen Hunderte qualitativ hochwertiger, quelloffener Optionen gibt, um Breaches und Datenlecks auf allen Ebenen des Unternehmens-Stacks zu verhindern.Falls Sie nun gedanklich bereits…
-
VoidProxy PhaaS Targets Microsoft 365 and Google Accounts in New Campaign
Phishing-as-a-Service operation called VoidProxy that uses advanced adversary-in-the-middle techniques to bypass traditional multi-factor authentication and steal session tokens from Microsoft 365 and Google accounts. The five steps of a SIM-swap attack illustrating how fraudsters bypass multi-factor authentication to compromise accounts Okta has uncovered a sophisticated new emergence of VoidProxy, a highly evasive Phishing-as-a-Service platform that…
-
Linux CUPS Flaw Allows Remote Denial of Service and Authentication Bypass
Two critical security vulnerabilities have been discovered in the Common Unix Printing System (CUPS), a widely used printing subsystem for Unix-like operating systems. The flaws, designated as CVE-2025-58364 and CVE-2025-58060, expose Linux systems to remote denial-of-service attacks and authentication bypass, potentially affecting millions of Linux machines worldwide. CVE Severity CVSS Score Impact Affected Versions CVE-2025-58364…
-
Akamai Identity Cloud is Shutting Down, What’s Next for Your Authentication Stack?
Akamai Identity Cloud ends in 2027. Learn risks, timelines, and migration strategies to modernize your authentication stack today. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/akamai-identity-cloud-is-shutting-down-whats-next-for-your-authentication-stack/
-
Understanding JWT Expiration Time claim (exp)
Tags: authenticationJSON Web Tokens (JWT) are a popular mechanism for authentication and authorization in modern web applications. One critical aspect of… First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/understanding-jwt-expiration-time-claim-exp/
-
Understanding JWT Expiration Time claim (exp)
Tags: authenticationJSON Web Tokens (JWT) are a popular mechanism for authentication and authorization in modern web applications. One critical aspect of… First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/understanding-jwt-expiration-time-claim-exp/
-
Microsoft’s Patch Tuesday: About 80 Vulnerabilities Patched
An elevation of privilege vulnerability in the Windows NTLM authentication protocol and a flaw in Office’s Preview Pain are among the most important to patch. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-microsoft-patch-tuesday-september-2025/
-
Microsoft’s Patch Tuesday: About 80 Vulnerabilities Patched
An elevation of privilege vulnerability in the Windows NTLM authentication protocol and a flaw in Office’s Preview Pain are among the most important to patch. First seen on techrepublic.com Jump to article: www.techrepublic.com/article/news-microsoft-patch-tuesday-september-2025/
-
Ransomware gang going after improperly patched SonicWall firewalls
Tags: authentication, awareness, data-breach, defense, firewall, Internet, mfa, phishing, ransomware, updatepatch all internet-exposed systems as soon as fixes are released;enable phishing-resistant multi-factor authentication for all users;monitor the internet for leaked credentials;run a regular phishing security awareness campaign for employees.CISOs can also refer to the IST’s Blueprint for Ransomware Defense for more tips. First seen on csoonline.com Jump to article: www.csoonline.com/article/4056080/ransomware-gang-going-after-improperly-patched-sonicwall-firewalls.html
-
Microsoft under fire: Senator demands FTC investigation into ‘arsonist selling firefighting services’
Tags: access, attack, authentication, breach, business, cio, ciso, computer, corporate, cyber, cybersecurity, email, encryption, finance, government, hacker, mfa, microsoft, network, password, ransomware, service, software, technology, threat, updateThe technical reality behind the failures: Security experts have long criticized Microsoft’s reliance on outdated encryption standards. “RC4 should have been retired long ago, yet it still lurks in Active Directory and continues to enable attacks like Kerberoasting,” Gogia noted.Microsoft’s justification centered on backward compatibility concerns. “Microsoft’s line has been that switching it off overnight…
-
Secure by Design, Visible by Choice: Why Authentication Page Optimization Matters for B2B SaaS
Enterprise customers demand both ironclad security and seamless user experiences. Your authentication pages are more than just login forms”, they’re the gat First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/secure-by-design-visible-by-choice-why-authentication-page-optimization-matters-for-b2b-saas/
-
Building Adaptive and Future-Ready Security Strategies
Learn how to build adaptive and future-ready security strategies using Enterprise SSO and CIAM solutions. Protect your organization from evolving threats with robust authentication and access management. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/building-adaptive-and-future-ready-security-strategies/
-
Imperva API Security: Authentication Risk Report”, Key Findings Fixes
An in-depth analysis of common JSON Web Token (JWT) mistakes, basic auth, long-lived tokens, and quick, high-impact fixes to secure your APIs. Introduction APIs are the backbone of modern digital services”, from mobile apps and e-commerce to banking and IoT. That scale and utility also make them prime targets. In our recent study of authentication-related…
-
How npm Security Collapsed Thanks To a 2FA Exploit
Billions (No, that’s not a typo, Billions with a capital B) of files were potentially compromised. If you thought Node Package Manager (npm), the JavaScript runtime environment Node.js’s default package manager, had finally stopped having serious security problems, you thought wrong. This time, a two-factor authentication (2FA) phishing attack left developers frustrated, angry, and in..…
-
New Tenable Report: How Complexity and Weak AI Security Put Cloud Environments at Risk
Tags: access, ai, attack, authentication, breach, cloud, control, credentials, cyber, cybersecurity, data, governance, iam, identity, least-privilege, metric, mfa, monitoring, resilience, risk, security-incident, skills, software, strategy, threat, toolThis survey, commissioned by Tenable and developed in collaboration with the Cloud Security Alliance, warns that rapid cloud and AI adoption, combined with insecure identities and a reactive posture, leave organizations exposed. The report urges a strategic shift to preventive security with a unified view of risk and mature identity governance. Key takeaways Organizations are…
-
Neues Phishing-Framework umgeht Multi-Faktor-Authentifizierung
Tags: authentication, ceo, ciso, cloud, corporate, cyberattack, framework, hacker, Hardware, infrastructure, mail, mfa, microsoft, passkey, password, phishing, service, strategy, zero-trustPhishing 2.0 nutzt Subdomain-Rotation und Geoblocking.Eine kürzlich aufgedeckte Phishing-Kampagne steht in Verbindung mit Salty2FA, einem Phishing-as-a-Service-(PhaaS-)Framework. Es soll entwickelt worden sein, um Multi-Faktor-Authentifizierung (MFA) zu umgehen.Wie die Cybersicherheitsfirma Ontinue herausgefunden hat,fängt sie Verifizierungsmethoden ab,rotiert Subdomains undtarnt sich innerhalb vertrauenswürdiger Plattformen wie Cloudflare Turnstile.In unserer US-Schwesterpublikation CSO erklärten die Experten, dass die Kampagne ‘bemerkenswerte technische Innovationen”…
-
We’ve crossed the security singularity – Impart Security
Tags: access, ai, api, attack, authentication, breach, ciso, compliance, credentials, cyber, cyberattack, cybersecurity, data, data-breach, defense, detection, exploit, framework, group, hacker, incident response, injection, intelligence, Internet, msp, password, penetration-testing, ransomware, risk, risk-assessment, skills, software, sql, strategy, supply-chain, threat, update, vulnerability, zero-day, zero-trustThe Bottom Line: We’ve Crossed the Security Singularity “ The Security Singularity: When AI Democratized Cyberattacks We’ve crossed a threshold that fundamentally changes cybersecurity forever. Not with fanfare or headlines, but quietly, in the background of our AI-powered world. The expertise barrier that once separated script kiddies from sophisticated threat actors has simply… vanished. I…
-
Auth Migration Hell: Why Your Next Identity Project Might Keep You Up at Night
Authentication migrations fail 40% of the time, costing millions in downtime. Learn the strategies security leaders use to avoid disaster, choose the right vendors, and build future-proof identity infrastructure that won’t lock you in. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/auth-migration-hell-why-your-next-identity-project-might-keep-you-up-at-night/
-
Why User Safety Should Be a Core SSO Design Principle
Explore why user safety should be the core of SSO design. Learn how MFA, encryption, and compliance keep authentication secure and trustworthy. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/why-user-safety-should-be-a-core-sso-design-principle/
-
Watch Out for Salty2FA: New Phishing Kit Targeting US and EU Enterprises
Phishing-as-a-Service (PhaaS) platforms keep evolving, giving attackers faster and cheaper ways to break into corporate accounts. Now, researchers at ANY.RUN has uncovered a new entrant: Salty2FA, a phishing kit designed to bypass multiple two-factor authentication methods and slip past traditional defenses. Already spotted in campaigns across the US and EU, Salty2FA puts enterprises at First…

