Account Security

Enabling Passkeys on Devices Without a Screen
Identity & Access Management Enabling Passkeys on Devices Without a Screen

The rapid expansion of connected technology has introduced a new class of devices, from immersive extended reality (XR) headsets to smart home hubs and industrial sensors, that often lack a traditional screen. This evolution presents a significant challenge to modern security practices,

AI Helps Hacker Gain AWS Admin Access in Under 10 Minutes
Infrastructure & Network Security AI Helps Hacker Gain AWS Admin Access in Under 10 Minutes

The time it takes to step away for a cup of coffee is now more than enough for a sophisticated threat actor, supercharged by artificial intelligence, to infiltrate a corporate cloud environment and seize complete administrative control. This startling reality was demonstrated in a recent security

Shadow#Reactor Uses Text Files to Deliver Remcos RAT
Identity & Access Management Shadow#Reactor Uses Text Files to Deliver Remcos RAT

The most dangerous threats in cybersecurity are often not the ones that announce their presence with a bang, but those that whisper their way past defenses hidden within the most mundane of digital artifacts. A sophisticated malware campaign, dubbed Shadow#Reactor, has brought this concept to the

Did a Patch Expose This Critical SmarterMail Flaw?
Identity & Access Management Did a Patch Expose This Critical SmarterMail Flaw?

A recently disclosed security flaw in the SmarterTools SmarterMail email software has rapidly escalated into a significant threat, with active exploitation observed in the wild merely two days after the vendor released a patch intended to resolve it. This alarming development highlights a

Are Patched FortiGate Firewalls Still Vulnerable?
Identity & Access Management Are Patched FortiGate Firewalls Still Vulnerable?

The persistent and evolving nature of cyber threats often means that even the most diligent security patching may not provide the impenetrable defense organizations expect. Fortinet has recently confirmed this unsettling reality by announcing that it is actively working to address a FortiCloud

eScan Antivirus Breach Delivers Signed Malware via Updates
Identity & Access Management eScan Antivirus Breach Delivers Signed Malware via Updates

The very tools designed to protect digital environments have become the conduits for a sophisticated cyberattack, turning a trusted antivirus solution into an unwitting distributor of malware that evades conventional security checks. A recent investigation has uncovered a critical supply chain

Loading

Subscribe to our weekly news digest.

Join now and become a part of our fast-growing community.

Invalid Email Address
Thanks for Subscribing!
We'll be sending you our best soon!
Something went wrong, please try again later