It’s been common knowledge for years that local Windows Active Directory networks are vulnerable to NTLM relay and pass-the-hash attacks that can allow attackers…
authentication
-
-
Network SecurityNewsSecurity
Sophisticated BEC scammers bypass Microsoft 365 multi-factor authentication
and hackers have developed ways to bypass multi-factor authentication (MFA) on cloud productivity services like Microsoft 365 (formerly Office 365). A BEC attack recently…
-
“Cookie stealing” is among the latest trends in cybercrimes that hackers are using to bypass credentials and access private databases, according to Sophos. Typical…
-
LinuxNetwork SecurityNewsOperating SystemPC & LaptopServerSoftware
Managing the whole lifecycle for human and machine authentication
In my last column for CIO.com, I outlined some of the cybersecurity issues around user authentication for verification of consumer and business accounts. Among…
-
LinuxNetwork SecurityNewsOperating SystemPC & LaptopServerSoftware
Why Multi-Factor Authentication is Key to Modern Cybersecurity
According to recent data from the Identity Theft Resource Center, there was a 14% increase in data breaches and compromises in the first quarter…
-
LinuxNetwork SecurityNewsOperating SystemPC & LaptopServerSoftware
Architecting Identity: Five Essential Elements of a Modern Customer Authentication Service
Rapidly accelerated digital transformation strategies over the last few years only cemented what digital identity architects already knew: identity is the perimeter. While protecting…