Where SSO Falls Short in Protecting SaaS
Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
Microsoft has released an out-of-band update to address a privacy-defeating flaw in its screenshot editing tool for Windows 10 and...
Single sign-on (SSO) is an authentication method that allows users to authenticate their identity for multiple applications with just one...
A new information-stealing malware has set its sights on Apple's macOS operating system to siphon sensitive information from compromised devices....
The Federal Bureau of Investigation is warning companies in the U.S. of threat actors using tactics similar to business email...
A new Emotet phishing campaign is targeting U.S. taxpayers by impersonating W-9 tax forms allegedly sent by the Internal Revenue...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
A new ransomware operation named 'Dark Power' has appeared, and it has already listed its first victims on a dark...
American university researchers have developed a novel attack called "Near-Ultrasound Inaudible Trojan" (NUIT) that can launch silent attacks against devices...
Russia's Rostec has reportedly bought a platform that allows it to uncover the identities of anonymous Telegram users, likely to...
The CISA Vulnerability Bulletin provides a summary of new vulnerabilities that have been recorded by the National Institute of Standards and...
Microsoft on Friday shared guidance to help customers discover indicators of compromise (IoCs) associated with a recently patched Outlook vulnerability....
OpenAI on Friday disclosed that a bug in the Redis open source library was responsible for the exposure of other...
In what's a case of setting a thief to catch a thief, the U.K. National Crime Agency (NCA) revealed that...
GitHub has rotated its private SSH key for GitHub.com after the secret was was accidentally published in a public GitHub repository. The software...
The U.K.'s National Crime Agency (NCA) revealed today that they created multiple fake DDoS-for-hire service websites to identify cybercriminals who utilize...
OpenAI says a Redis client open-source library bug was behind Monday's ChatGPT outage and data leak, where users saw other...
A cyberespionage hacking group tracked as 'Bitter APT' was recently seen targeting the Chinese nuclear energy industry using phishing emails...
Consumer goods giant Procter & Gamble has confirmed a data breach affecting an undisclosed number of employees after its GoAnywhere...
Microsoft today published a detailed guide aiming to help customers discover signs of compromise via exploitation of a recently patched...
Today, the FBI confirmed they have access to the database of the notorious BreachForums (aka Breached) hacking forum after the...
The Australian Federal Police (AFP) has arrested four members of a cybercriminal syndicate that has laundered $1.7 million stolen from...
On the third day of the Pwn2Own hacking contest, security researchers were awarded $185,000 after demonstrating 5 zero-day exploits targeting...
This week's news has been dominated by the Clop ransomware gang extorting companies whose GoAnywhere services were breached using a...