Security News

JumpCloud vs Okta (2024): IAM Software Comparison
2024-03-22 16:48

Okta is one of the most well-known companies in the IAM space, but up-and-coming competitor JumpCloud has recently challenged Okta's dominance. This review compares the essential features of JumpCloud and Okta to help you choose the right IAM software for your business.

Darknet marketplace Nemesis Market seized by German police
2024-03-22 16:12

The German police have seized infrastructure for the darknet Nemesis Market cybercrime marketplace in Germany and Lithuania, disrupting the site's operation. The Nemesis Market was launched in 2021 as a new marketplace to purchase illegal drugs and narcotics, stolen data and credit cards, and various cybercrime services related to ransomware, phishing, and distributed denial of service attacks.

Duo vs Microsoft Authenticator (2024): Which Tool is Better?
2024-03-22 16:07

Microsoft Authenticator utilizes push notifications, one-time passcodes and can integrate with Microsoft 365 and Microsoft Entra ID. While both 2FA options share some similarities, there are key differences that can sway your decision to choose one over the other. Microsoft Authenticator is free and comes bundled with all Microsoft Entra ID and 365 Business accounts.

Top 6 Google Authenticator Alternatives in 2024
2024-03-22 16:00

TechRepublic is able to offer our services for free because some vendors may pay us for web traffic or other sales opportunities. Our mission is to help technology buyers make better purchasing decisions, so we provide you with information for all vendors - even those that don't pay us.

Hardware-level Apple Silicon vulnerability can leak cryptographic keys
2024-03-22 15:03

Apple is having its own Meltdown/Spectre moment with a new side-channel vulnerability found in the architecture of Apple Silicon processors that gives malicious apps the ability to extract cryptographic keys. "We reverse-engineered DMPs on Apple m-series CPUs and found that the DMP activates data loaded from memory that 'looks like' a pointer," the team say in the paper.

New GoFetch attack on Apple Silicon CPUs can steal crypto keys
2024-03-22 15:01

A new side-channel attack called "GoFetch" impacts Apple M1, M2, and M3 processors and can be used to steal secret cryptographic keys from data in the CPU's cache. The attack targets constant-time cryptographic implementations using data memory-dependent prefetchers found in modern Apple CPUs.

New StrelaStealer Phishing Attacks Hit Over 100 Organizations in E.U. and U.S.
2024-03-22 14:08

Cybersecurity researchers have detected a new wave of phishing attacks that aim to deliver an ever-evolving information stealer referred to as StrelaStealer. The campaigns impact more than 100...

Auth0 vs Okta (2024): Which IAM Software Is Better?
2024-03-22 14:00

Auth0 and Okta are powerful IAM tools with distinct strengths that solve this problem. The key difference perhaps lies in how Auth0 and Okta approach identity.

NVD slowdown leaves thousands of vulnerabilities without analysis data
2024-03-22 13:45

NIST is currently working to establish a consortium to address challenges in the NVD program and develop improved tools and methods. That's a good thing, because a CVE without its NVD data is pretty meaningless.

AWS Patches Critical 'FlowFixation' Bug in Airflow Service to Prevent Session Hijacking
2024-03-22 13:45

Cybersecurity researchers have shared details of a now-patched security vulnerability in Amazon Web Services (AWS) Managed Workflows for Apache Airflow (MWAA) that could be potentially exploited...