Why Legacy MFA is DOA
Multi-Factor Authentication (MFA) has long been heralded as a cornerstone of secure digital practices. However, the traditional forms of MFA,…
Multi-Factor Authentication (MFA) has long been heralded as a cornerstone of secure digital practices. However, the traditional forms of MFA,…
A new Android malware named SpyAgent uses optical character recognition (OCR) technology to steal cryptocurrency wallet recovery phrases from screenshots…
SonicWall is warning that a recently fixed access control flaw tracked as CVE-2024-40766 in SonicOS is now "potentially" exploited in attacks,…
Google has released the September 2024 Android security updates to fix 34 vulnerabilities, including CVE-2024-32896, an actively exploited elevation of…
Russia's Midnight Blizzard infected Mongolian government websites to try to compromise the devices of visitors, using watering-hole tactics.
Microsoft has released the August 2024 preview update for Windows 10, version 22H2, with fixes for issues causing system freezes…
Attending Black Hat 2024 with Cyber Defense Magazine is always an enlightening experience, giving me the opportunity to interview several…
Another innovative industry leader I had the pleasure of speaking with was Michael Bargury, Co-Founder and CTO of Zenity, a…
At Black Hat 2024, I had the opportunity to speak with Jasson Casey, CEO of Beyond Identity, about their groundbreaking…
The Russian state-sponsored APT29 hacking group has been observed using the same iOS and Android exploits created by commercial spyware…