Security News

6 Best Multi-Factor Authentication (MFA) Solutions for 2024
2024-03-20 17:19

MFA software solutions provide multi-factor authentication for individual end-users, organizational workforces and customer-facing applications. Software Solution category Authentication types Hosting options Pricing Google Authenticator Individual MFA Mobile app, software token, mobile push, risk-based Cloud-based Free Cisco Duo Workforce MFA Mobile app, software token, hardware token, mobile push, WebAuthn, biometric Cloud-based Free MFA for up to 10 users; plans start at $3/user/month.

How to Prevent Phishing Attacks with Multi-Factor Authentication
2024-01-25 13:00

One of the best defenses against credential-stealing phishing attacks is multifactor authentication. MFA introduces several extra security factors in the authentication process, including: something you know, something you have and/or something you are.

Medusa Ransomware on the Rise: From Data Leaks to Multi-Extortion
2024-01-12 13:23

The threat actors associated with the Medusa ransomware have ramped up their activities following the debut of a dedicated data leak site on the dark web in February 2023 to publish sensitive data...

Experts Detail Multi-Million Dollar Licensing Model of Predator Spyware
2023-12-21 16:48

A new analysis of the sophisticated commercial spyware called Predator has revealed that its ability to persist between reboots is offered as an "add-on feature" and that it depends on the...

Multi-cloud computing offers benefits but makes IT far more complex
2023-12-15 04:30

"Multi-cloud computing offers huge benefits but makes IT far more complex," said Bernie Hoecker, partner, Enterprise Cloud Transformation leader, ISG. "Enterprises that have made the leap are adopting increasingly powerful tools to manage that complexity." Cloud observability platforms are increasingly essential as multi-cloud complexity increases, the report says.

SessionProbe: Open-source multi-threaded pentesting tool
2023-12-05 06:00

SessionProbe is a multi-threaded pentesting tool designed to evaluate user privileges in web applications. It takes a user's session token and checks for a list of URLs if access is possible, highlighting potential authorization issues.

How Multi-Stage Phishing Attacks Exploit QRs, CAPTCHAs, and Steganography
2023-11-21 10:40

Phishing attacks are steadily becoming more sophisticated, with cybercriminals investing in new ways of deceiving victims into revealing sensitive information or installing malicious software. One...

Reptar: New Intel CPU Vulnerability Impacts Multi-Tenant Virtualized Environments
2023-11-15 07:52

Intel has released fixes to close out a high-severity flaw codenamed Reptar that impacts its desktop, mobile, and server CPUs. Tracked as CVE-2023-23583 (CVSS score: 8.8), the issue has the...

34 Cybercriminals Arrested in Spain for Multi-Million Dollar Online Scams
2023-10-24 11:00

Spanish law enforcement officials have announced the arrest of 34 members of a criminal group that carried out various online scams, netting the gang about €3 million ($3.2 million) in illegal...

Chinese Hackers TAG-74 Targets South Korean Organizations in a Multi-Year Campaign
2023-09-26 09:49

A "multi-year" Chinese state-sponsored cyber espionage campaign has been observed targeting South Korean academic, political, and government organizations. Recorded Future's Insikt Group, which is...