AI, identity, FraudGPT identity, risk, CrowdStrike digital identitiies Identity Theft Financial Fraud Digital Age

Securing Digital Identities in 2023 and Beyond

The need to secure digital identities remains one of the most urgent tasks facing modern enterprises. Stolen or compromised credentials continue to be not only the most common cause of a data ...
Security Boulevard
Jar differences

ManageEngine CVE-2022-47966 Technical Deep Dive

| | Blog, Red Team
Introduction On January 10, 2023, ManageEngine released a security advisory for CVE-2022-47966 (discovered by Khoadha of Viettel Cyber Security) affecting a wide range of products. The vulnerability allows an attacker to gain ...
breach Uber

Former Uber CISO’s Conviction Affirmed by Trial Court

On January 11, 2023, presiding United States District Judge William Orrick in San Francisco denied the motion of Joe Sullivan, the former CISO of Uber, for a judgment of acquittal. The conviction ...
Security Boulevard

Security Analysis of Threema

A group of Swiss researchers have published an impressive security analysis of Threema. We provide an extensive cryptographic analysis of Threema, a Swiss-based encrypted messaging application with more than 10 million users ...
How Automation is Redefining Compliance Management

How Automation is Redefining Compliance Management

| | Blog, HIPAA, ISO 27001, SOC 2
Here’s everything you need to know about compliance automation and how it redefines compliance management one click at a time.  The post How Automation is Redefining Compliance Management appeared first on Scytale ...
1 - LastPass Aftermath, LastPass vault de-obfuscator, LastPass iteration count folly

Password manager best practices: Why you should care about password managers’ iteration counts

The post Password manager best practices: Why you should care about password managers’ iteration counts appeared first on Click Armor ...
EmojiDeploy attack flow

EmojiDeploy: Smile! Your Azure web service just got RCE’d ._.

| | azure
Ermetic's research team discovered a remote code execution vulnerability affecting Azure cloud services and other cloud sovereigns including Function Apps, App Service and Logic Apps. The post EmojiDeploy: Smile! Your Azure web ...

Data Exfiltration Prevention: A How-To Guide

The most common goal of malicious insiders is stealing (or data exfiltrating) sensitive data by copying, transferring, emailing, or printing it without authorization. Targeted data can include customer lists, source code, patent ...
Identity Modernization: What Is It & Why Should You Care?

Identity Modernization: What Is It & Why Should You Care?

Identity modernization could be defined as shifting from managing identities through on-premises identity providers to a cloud-based identity management solution. Moreover, it could also be a shift from one cloud to multiple ...