Why using Google OAuth in work applications is unsafe
Credit to Author: Alanna Titterington| Date: Thu, 18 Jan 2024 17:19:06 +0000
A bug in the Google OAuth sign-in mechanism can be exploited by fired employees to retain access to accounts
Read moreCredit to Author: Alanna Titterington| Date: Thu, 18 Jan 2024 17:19:06 +0000
A bug in the Google OAuth sign-in mechanism can be exploited by fired employees to retain access to accounts
Read moreCredit to Author: Stan Kaminsky| Date: Mon, 15 Jan 2024 19:46:34 +0000
Single sign-on is supposed to enhance corporate security, but it’s essential that cloud vendors have the information security team's back.
Read moreCredit to Author: Alanna Titterington| Date: Fri, 12 Jan 2024 16:00:09 +0000
What’s the principle of least privilege (also known as the principle of minimal privilege), why’s it needed, and how does it help secure corporate information assets?
Read moreCredit to Author: Alanna Titterington| Date: Fri, 22 Dec 2023 15:13:25 +0000
How scammers use compromised hotel accounts on Booking.com to steal banking data from the hotels’ clients.
Read moreCredit to Author: Roman Dedenok| Date: Tue, 12 Dec 2023 17:45:40 +0000
Methods used by attackers to redirect victims to malicious and phishing sites from seemingly safe URLs.
Read moreCredit to Author: Daria Ivanova| Date: Wed, 06 Dec 2023 19:41:34 +0000
Attackers send companies Remcos RAT under the guise of emails from a new client —hiding malware in Discord attachments.
Read moreCredit to Author: Alanna Titterington| Date: Thu, 30 Nov 2023 18:16:25 +0000
The security issues faced by the world's most popular CMS, and how to protect your WordPress-based site or online store from hackers.
Read moreCredit to Author: Stan Kaminsky| Date: Tue, 28 Nov 2023 20:51:08 +0000
Why hackers go for routers and firewalls, and what role the device firmware plays in this.
Read more