Generative Data Intelligence

Tag: multifactor authentication

LastPass Users Lose Master Passwords to Ultra-Convincing Scam

An ongoing, highly sophisticated phishing campaign may have led some LastPass users to give up their all-important master passwords to hackers.Password managers store all...

Top News

New Tool Shields Organizations From NXDOMAIN Attacks

Attacks against the Domain Name System (DNS) are numerous and varied, so organizations have to rely on layers of protective measures, such as traffic...

CISA Issues Emergency Directive After Midnight Blizzard Microsoft Hits

The Cybersecurity and Infrastructure Security Agency (CISA) issued an emergency directive in response on April 11 to Midnight Blizzard, aka Cozy Bear, a Russian...

Selecting an Authentication Protocol for Your Business

Authentication protocols serve as the backbone of online security, enabling users to confirm their identities securely and access protected information and services. They define...

Top MITRE ATT&CK Techniques and How to Defend Against Them

Of the hundreds of documented MITRE ATT&CK techniques, two dominate the field: command and scripting interpreters (T1059) and phishing (T1566).In a report published on...

Top MITRE ATT&CK Techniques and How to Defend Against Them

Of the hundreds of documented MITRE ATT&CK techniques, two dominate the field: command and scripting interpreters (T1059) and phishing (T1566).In a report published on...

CISO Corner: Ivanti’s Mea Culpa; World Cup Hack; CISOs & Cyber-Awareness

Welcome to CISO Corner, Dark Reading's weekly digest of articles tailored specifically to security operations readers and security leaders. Every week, we'll offer articles...

Suspected MFA Bombing Attacks Target Apple iPhone Users

Attackers are targeting Apple iPhone users with a rash of MFA bombing attacks that use a relentless series of legitimate password-reset notification alerts in...

Strata Identity Releases New Authentication Recipes

Strata Identity has announced a Microsoft Identity Cookbook that aims to help enterprises securely move authentication from on-premises Microsoft Active Directory to the cloud-based...

How Can We Reduce Threats From the IABs Market?

Question: How do we keep initial access brokers from selling access to our networks to any ransomware actors who wants it?Ram Elboim, CEO, Sygnia:...

Cyber Warfare: Understanding New Frontiers in Global Conflicts

COMMENTARYIn recent decades, the nature of warfare between nations has evolved substantially with the integration of offensive cyber tactics. In late 2023, Israel's cyber-defense...

Cyber Warfare: Understanding New Frontiers in Global Conflicts

COMMENTARYIn recent decades, the nature of warfare between nations has evolved substantially with the integration of offensive cyber tactics. In late 2023, Israel's cyber-defense...

Latest Intelligence

spot_img
spot_img
spot_img

Chat with us

Hi there! How can I help you?