The introduction of a corona QR-ticket necessity for access catering, theaters and events with the exception of terraces will be implemented on the 25th of September in The Netherlands following EU countries like France and Italy. The members in favour have great concerns about security, privacy, freedom of choice but think the measure is proportionate […]
The Zero Trust approach means nothing inside or outside the company perimeter should be trusted. As a result, every user has to authenticate themselves and their identity with every login every time before they are granted access to company resources, applications and data. Components are: Multifactor authentication,IAM (identity and access management), Orchestration, AnalyticsEncryption, Scoring, File […]
Microsoft is dropping passwords to gain access to an account by leveraging a combination of factors such as your phone (something you have) and biometrics (something you are) for identification.
Organizations find it difficult to prepare for a ransomware attack. Reason for Microsft to share three steps that help prevent ransomware.1. Set up a recovery plan where no ransom is paid. Organizations must, among other things, map and backup their important data and systems, protect the backups and perform recovery tests with all systems offline. […]
A hacker released almost 500,000 Fortinet VPN login names and passwords that were allegedly scraped from exploitable devices last summer. While many appliances with the exploited Fortinet vulnerability have since been patched, many VPN credentials seem still to be valid. With these VPN credentials access to a network can be gained to perform data exfiltration, install […]
The US Department of Justice has indicted a man for using a malware botnet to brute force 2.000 computer logon credentials per week and then selling them on a criminal dark web remote access marketplace.
Microsoft has issued a warning for a zerodaylek in Internet Explorer, where it operates through Office documents to any other. The vulnerability is located in MSHTML, which is the Microsoft-developed browser engine in Internet Explorer. MSHTML in Office applications, is used to display web content in a document.As now observed the attack send the attackers […]
Apple has abandoned its once-famous commitment to security and privacy. The next version of iOS will contain software that scans users’ photos and messages. Under pressure from U.S. law enforcement, Apple has put a backdoor into their encryption system.
According to the CEO the bad actor leveraged their knowledge of technical systems, along with specialized tools and capabilities, to gain access to our testing environments and then used brute force attacks and other methods to make their way into other IT servers that included customer data.”Compromised information includes customer names, addresses, Social Security numbers […]
Using only a password to access or manage systems remotely is unwise and should be seen as a “bad practice,” according to the Cybersecurity and Infrastructure Security Agency (CISA) of the US Department of Homeland Security. In June, the CISA decided to collect bad practices that are extremely risky and actually increase cyber risks for […]