Tag: Authentication
-
Why Is It So Challenging to Go Passwordless?
Imagine a world where you never have to remember another password. Seems like a dream come true for both end users and IT teams, …
-
Authentication bypass discovered in Microsoft Entra ID
Research has shown that Microsoft Entra ID (formerly Azure AD), a cloud identity and access management solution, can be manipulated to …
-
10 Authentication Trends in 2024 and Beyond
What Is Authentication? Authentication is the process of verifying the identity of a user or …
-
Google Workspace Authentication Vulnerability Allowed Thousands of Emails to be Compromised
Thousands of email addresses have been compromised after hackers used them to create Google Workspace accounts and bypassed the …
-
Microsoft’s Windows Hello for Business Flaw Let Attackers Bypass Authentication
Researchers have uncovered a vulnerability in Microsoft’s Windows Hello for Business (WHfB) that allows attackers to bypass its robust …
-
Snowflake introduces mandatory multifactor authentication following recent cyberattacks
Data cloud company Snowflake Inc. has introduced new security measures following its customers being targeted following a third-party …
-
Snowflake introduces mandatory MFA to bolster account security following recent cyber attacks
Data cloud company Snowflake Inc. has introduced new security measures following its customers being targeted following a third-party …
-
BlastRADIUS vulnerability exposes legacy security flaws in widely used RADIUS Protocol
Cybersecurity researchers have discovered a critical security vulnerability in RADIUS, a widely used network authentication protocol that …
-
AWS Adds Passkey Support for Enhanced Security, Enforces MFA for Root Users
AWS has recently announced two new security features. First, passkeys can now be used for multi-factor authentication (MFA) for root and …
-
ZKTeco Biometric System Found Vulnerable to 24 Critical Security Flaws
An analysis of a hybrid biometric access system from Chinese manufacturer ZKTeco has uncovered two dozen security flaws that could be used …
-
Progress Telerik Report Server Flaw Let Attackers Bypass Authentication
A new vulnerability related to authentication bypass was discovered in the Progress Telerik Report server. The CVE for this vulnerability …
●●●