Security News

Google Workspace Authentication Vulnerability Allowed Thousands of Emails to be Compromised
2024-07-30 19:24

Thousands of email addresses have been compromised after hackers used them to create Google Workspace accounts and bypassed the verification process. One impacted user that shared their experience on a Google Cloud Community forum was notified by Google that someone had created a Workspace account with their email without verification and then used it to log into Dropbox.

Docker fixes critical 5-year old authentication bypass flaw
2024-07-24 19:00

Docker has issued security updates to address a critical vulnerability impacting certain versions of Docker Engine that could allow an attacker to bypass authorization plugins (AuthZ) under...

What Is Two-Factor Authentication?
2024-07-17 16:00

TYPES OF 2FA. Secondary authentication factors vary in how they are used in the verification of user identities. The simple expedient of texting a time-sensitive code to a mobile device is usually enough to keep most accounts secure.

New Blast-RADIUS attack bypasses widely-used RADIUS authentication
2024-07-09 19:44

Blast-RADIUS, an authentication bypass in the widely used RADIUS/UDP protocol, enables threat actors to breach networks and devices in man-in-the-middle MD5 collision attacks. [...]

Selfie-based authentication raises eyebrows among infosec experts
2024-07-08 05:30

The use of selfies to verify identity online is an emerging trend in some parts of the world since the pandemic forced more business to go digital. Local media has weighed in to suggest that selfies will not improve security.

ASUS Patches Critical Authentication Bypass Flaw in Multiple Router Models
2024-06-17 14:39

ASUS has shipped software updates to address a critical security flaw impacting its routers that could be exploited by malicious actors to bypass authentication. Tracked as CVE-2024-3080, the...

ASUS warns of critical remote authentication bypass on 7 routers
2024-06-15 15:17

ASUS has released a new firmware update that addresses a vulnerability impacting seven router models that allow remote attackers to log in to devices.The flaw, tracked as CVE-2024-3080, is an authentication bypass vulnerability allowing unauthenticated, remote attackers to take control of the device.

Microsoft deprecates Windows NTLM authentication protocol
2024-06-04 15:38

Microsoft has officially deprecated NTLM authentication on Windows and Windows servers, stating that developers should transition to Kerberos or Negotiation authentication to prevent problems in the future. New Technology LAN Manager, better known as NTLM, is an authentication protocol first released in 1993 as part of Windows NT 3.1 and as the successor to the LAN Manager protocol.

Fail2Ban: Ban hosts that cause multiple authentication errors
2024-05-24 05:00

Fail2Ban is an open-source tool that monitors log files, such as /var/log/auth. Log, and blocks IP addresses that exhibit repeated failed login attempts.

Authelia: Open-source authentication and authorization server
2024-05-22 04:30

Authelia is an open-source authentication and authorization server that offers 2FA and SSO for applications through a web portal. Authelia connects directly to the reverse proxy but never to the application backends.