Identity & Access
What is Session Hijacking?
Session hijacking is a prevalent and dangerous attack method frequently employed by cybercriminals to illicitly gain access and then take control of user accounts and systems. Session hijacking is a type of ...
HHS: Health Care IT Helpdesks Under Attack in Voice Scams
Scammers are impersonating employees in voice calls to gain access to healthcare organizations' systems and steal money, the agency says ...
FCC: Phone Network Bugs Must Be Fixed — But are SS7/Diameter Beyond Repair?
Fast enough for government work: The Federal Communications Commission is finally minded to do something about decades-old vulnerabilities ...
Mapping Your Path to Passwordless
Navigating the shift to passwordless authentication via digital certificates demands a visionary approach that considers the immediate benefits while strategically planning for future scalability and adaptability ...
How to Correctly Use Client IP Addresses in Okta Audit Logs to Improve Identity Security
Being able to identify client IP addresses is essential for detecting and preventing identity-related threats. These IP addresses help establish a baseline of identity activities and highlight deviations often associated with threat ...
Google Chrome Enlists Emerging DBSC Standard to Fight Cookie Theft
Google is prototyping a new technology in Chrome that is designed to thwart the growing trend among cybercriminals of stealing browser session cookies, which enables hackers to bypass multifunction authentication (MFA) protections ...
The Five Essentials of Immutable Storage: Why They Matter
Organizations need a robust backup strategy that can outsmart bad actors. And these days, that strategy must include immutability ...
What Makes a Password Weak or Strong?
In today’s digital age, passwords serve as the first line of defense in securing our online accounts. Yet, despite the increasing awareness of cybersecurity threats, many individuals and organizations still fall victim ...
Biden Review Board Gives Microsoft a Big, Fat Raspberry
Storm-0558 forecast: Last year’s Chinese hack of federal agencies’ email is still a mystery, and “should never have occurred,” says CISA ...
Don’t Leave the Door Open to Threat Actors
We came across this recent Joint Cybersecurity Advisory paper: “Threat Actor Leverages Compromised Account of... The post Don’t Leave the Door Open to Threat Actors appeared first on Entrust Blog ...