Mandiant, Google Cloud Security’s threat intelligence company, has exposed a sophisticated cyber espionage campaign by the China-linked hacking group UNC3886. The group has been found infiltrating outdated Juniper Networks routers with custom malware designed for long-term persistence and stealth.
Attention to detail is crucial when maintaining cybersecurity within an organisation. Security controls must be consistent and robust and extend to every aspect of the system. However, it must be noted that adversaries only need to identify one or two vulnerabilities to breach an enterprise’s defences, making it clear why they continue to find ways to infiltrate systems.
GUEST OPINION: As e-commerce continues its meteoric rise, it is also becoming a prime target for increasingly sophisticated cybercriminals.
Enterprise users further empowered to be phishing-resistant and go passwordless on day one
COMPANY NEWS: TrustRadius accolades across product categories add to broad recognition for WatchGuard’s comprehensive cybersecurity platform
Patent advisory services provider Global Technology Transfer Group (GTT), has publicly announced the availability of a 'major telecom and mobile network operator's' global patent portfolio for acquisition.
Digital identity software provider Okta has massively upgraded its free tier, allowing any developer to include MFA in their apps, no matter if it is a hobby app or a commercial product. Okta has also upped the number of monthly active users from 7,500 to 25,000, and thrown in so much more.
New research by hardware security key provider Yubico finds the most common login method remains the old username and password despite being the least secure option available today. Further, AI advances are making online scams even more successful. Yet, at the same time, many people don't know there are better options, and they're not being aided by employee onboarding which glosses over the subject.
Ping Identity, a leading provider of seamless and secure digital experiences, has been named an Overall Leader in the 2024 KuppingerCole Leadership Compass report on Passwordless Authentication for Enterprises. The report explores workforce-focused passwordless authentication technologies and shares guidance on the most effective solutions, with Ping Identity positioned first in Overall, Product, and Innovation Leadership for its comprehensive approach.
New SaaS plans provide comprehensive code quality and code security visibility for developers, software engineering managers, and business leaders
Australian telco Telstra has paid $1,551,000 to the Australian Communications and Media Authority (ACMA) after failing to perform required customer ID authentication processes, leaving thousands vulnerable to SIM-swap scams and other types of mobile fraud.
iGaming is a rapidly evolving field and the amount of people entering it is increasing at a rapid pace. If you want to start an iGaming venture or make sure that your deposits and withdrawals from online casinos and other games are safe and hassle free, it is vital to choose a reliable high risk payment gateway with online casino processing capabilities. This is precisely where GumBallPay comes into the picture, offering users what they need for their iGaming venture.
Access management and authentication specialist SecureAuth and multi-cloud infrastructure automation software provider HashiCorp are working together to improve DevOps security and deployment velocity through the use of SecureAuth's passwordless authentication and MFA capabilities.
GUEST OPINION: The use of Basic Authentication over the internet is as old as the basic standard for the world wide web. Its use was outlined in May 1996 as part of the standard for version 1.0 of the Hypertext Transfer Protocol.
GUEST OPINION: A new year is a time when most people take stock of what they have accomplished and make plans for the year ahead. New opportunities await those who are prepared and know where to find them.
GUEST OPINION: Since Australia has come to terms with COVID-19, employees are either returning to work, still working from home, or doing both in a hybrid situation. Yet countless organisations have moved to reliance on cloud technologies and services for remote work, causing a massive shift to cloud adoption.
GUEST INTERVIEW: Cybersecurity is ever-changing, with cyber criminals continually thinking up new ways to steal passwords and evade defences, so how has biometrics evolved to create safer and more secure environments? Blair Crawford joins iTWireTV to explain the Daltrey difference.
GUEST INTERVIEW: Cybersecurity is ever-changing, with cyber criminals continually thinking up new ways to steal passwords and evade defences, so how has biometrics evolved to create safer and more secure environments? Blair Crawford joins iTWireTV to explain the Daltrey difference.
GUEST OPINION: Many companies, including GitHub, Credit Karma, Intuit and PayPal use GraphQL, which is a query language for application programming interfaces and a runtime for fulfilling queries with existing data.
COMPANY NEWS: WatchGuard Technologies, a global leader in unified cybersecurity, today announced that its AuthPoint multi-factor authentication (MFA) solution has earned a Performance Verified certification from Miercom, an independent testing and certification service. Evaluating AuthPoint against competing solutions across a wide range of categories, Miercom found that WatchGuard's MFA solution offered greater functionality at a lower cost, easier setup and administration, and a better end-user experience.