![authentication](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/13161306/authentication-biometrics-400x200.jpg)
Enterprises persist with outdated authentication strategies
Despite authentication being a cornerstone of cybersecurity, risk mitigation strategies remain outdated, according to new research from Enzoic. With the attack surface …
![Retool](https://img.helpnetsecurity.com/wp-content/uploads/2023/09/14165340/retool2-400x200.jpg)
Attackers hit software firm Retool to get to crypto companies and assets
Retool, the company behind the popular development platform for building internal business software, has suffered a breach that allowed attackers to access and take over …
![identity](https://img.helpnetsecurity.com/wp-content/uploads/2018/10/09100001/identity-400x200.jpg)
Companies need to rethink how they implement identity security
More than 80% of organizations have experienced an identity-related breach that involved the use of compromised credentials, half of which happened in the past 12 months, …
![Cisco ASA 5500-X](https://img.helpnetsecurity.com/wp-content/uploads/2018/02/09101927/cisco-ASA-5500-X-400x200.jpg)
Cisco VPNs with no MFA enabled hit by ransomware groups
Since March 2023 (and possibly even earlier), affiliates of the Akira and LockBit ransomware operators have been breaching organizations via Cisco ASA SSL VPN appliances. …
![Florian Forster](https://img.helpnetsecurity.com/wp-content/uploads/2023/08/16131036/florian_forster-2-zitadel-400x200.jpg)
Adapting authentication to a cloud-centric landscape
In this Help Net Security interview, Florian Forster, CEO at Zitadel, discusses the challenges CISOs face in managing authentication across increasingly distributed and remote …
![Microsoft 365](https://img.helpnetsecurity.com/wp-content/uploads/2023/05/26063958/microsoft365-net-400x200.jpg)
Microsoft 365 accounts of execs, managers hijacked through EvilProxy
A phishing campaign leveraging the EvilProxy phishing-as-a-service (PhaaS) tool has been spotted targeting Microsoft 365 user accounts of C-level executives and managers at …
![audio](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/28082626/audio1-400x200.jpg)
Scammers using AI voice technology to commit crimes
The usage of platforms like Cash App, Zelle, and Venmo for peer-to-peer payments has experienced a significant surge, with scams increasing by over 58%. Additionally, there …
![lock](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/07131855/lock-tech-400x200.jpg)
Small organizations outpace large enterprises in MFA adoption
The use of MFA has nearly doubled since 2020 and that phishing-resistant authenticators represent the best choice in terms of security and convenience for users, according to …
![authentication](https://img.helpnetsecurity.com/wp-content/uploads/2023/06/13161306/authentication-biometrics-400x200.jpg)
Beyond MFA: 3 steps to improve security and reduce customer authentication friction
For many people, life’s fundamental activities are now conducted online. We do our banking and shopping online, turn to the digital realm for entertainment and to access …
![email](https://img.helpnetsecurity.com/wp-content/uploads/2019/05/09094418/email-danger-400x200.jpg)
Cybercriminals masquerading as MFA vendors
Cybercriminals are increasingly posing as multi-factor authentication vendors and small businesses are becoming more popular targets, according to VIPRE. Attachment-based …
![CISA](https://img.helpnetsecurity.com/wp-content/uploads/2022/11/16103959/cisa-tunnel-400x200.jpg)
The essence of OT security: A proactive guide to achieving CISA’s Cybersecurity Performance Goals
The widespread adoption of remote and hybrid working practices in recent years has brought numerous benefits to various industries, but has also introduced new cyber threats, …
![Microsoft 365](https://img.helpnetsecurity.com/wp-content/uploads/2020/12/09161031/microsoft365-2-400x200.jpg)
Greatness phishing-as-a-service threatens Microsoft 365 users
Manufacturing businesses, healthcare organizations, and tech companies in English-speaking countries are the most targeted by phishers leveraging a relatively new …
Featured news
Sponsored
Don't miss
- Progress fixes critical RCE flaw in Telerik Report Server, upgrade ASAP! (CVE-2024-6327)
- Docker fixes critical auth bypass flaw, again (CVE-2024-41110)
- Learning from CrowdStrike’s quality assurance failures
- BIND 9.20 released: Enhanced DNSSEC support, application infrastructure improvements
- How CISOs enable ITDR approach through the principle of least privilege