What is digital identity?
Digital identity is the way a computer stores a record of an external person or system. It is closely related to authentication. What is digital identity? In access management, digital…
Your Go-To Source for Cyber Security Insights and Solutions
Digital identity is the way a computer stores a record of an external person or system. It is closely related to authentication. What is digital identity? In access management, digital…
Okta is warning nearly 5,000 current and former employees that their personal information was exposed after a third-party vendor was breached. Okta is a San Fransisco-based cloud identity and access…
1Password, a popular password management platform used by over 100,000 businesses, suffered a security incident after hackers gained access to its Okta ID management tenant. “We detected suspicious activity on…
Okta says attackers accessed files containing cookies and session tokens uploaded by customers to its support management system after breaching it using stolen credentials. “The threat actor was able to…
Spoofed IP packets with forged source addresses are often used in attacks to avoid detection. What is IP spoofing? IP spoofing is the creation of Internet Protocol (IP) packets with…
A volumetric DDoS attack that takes advantage of a vulnerability in the NTP protocol, flooding a server with UDP traffic. What is a NTP amplification attack? An NTP amplification attack…
September has been a packed month of continuous updates. Apple and Microsoft released new operating systems, and several vulnerabilities exploited in web services resulted in a domino effect of zero-day…
CAPTCHAs and reCAPTCHAs determine if a user is a bot. While these tests can help stop malicious bot activity, they are far from foolproof. What is a CAPTCHA? A CAPTCHA…
Click fraud fakes clicks target pay-per-click ads, boosting webpage search rankings or artificially inflating the popularity of a post. Click bots are often responsible for click fraud. What is click…
The Mirai malware exploits security holes in IoT devices and has the potential to harness the collective power of millions of IoT devices into botnets and launch attacks. What is…