Evilginx Attack Demo: How Hackers Bypass Microsoft MFA

How to Prevent Evilginx Attacks Targeting Entra ID

Attackers continually refine their methods to compromise user identities and gain unauthorized access to sensitive systems. One particularly insidious threat is Evilginx, a phishing framework designed to bypass traditional multi-factor authentication (MFA) ...
Fake IT Workers: How HYPR Stopped a Fraudulent Hire

Fake IT Workers: How HYPR Stopped a Fraudulent Hire

Since 2022, the FBI and other agencies have been sounding the alarm about North Koreans posing as US or other non-North Korean based IT workers and infiltrating companies. In July, security firm ...
How To Improve Okta Security

How To Improve Okta Security

Okta is one of the most widely-used single sign-on (SSO) providers, making authentication more convenient for organizations and their users alike. We at HYPR use Okta. This convenience, however, comes at a ...
Key Takeaways From Horizon3.ai’s Analysis of an Entra ID Compromise

Key Takeaways From Horizon3.ai’s Analysis of an Entra ID Compromise

As enterprises shift from on-premises to cloud systems, hybrid cloud solutions have become essential for optimizing performance, scalability, and user ease. However, risks arise when poorly configured environments connect to the cloud ...
Best Practices to Strengthen VPN Security

Best Practices to Strengthen VPN Security

Virtual private networks (VPNs) form a staple of the modern work environment. VPNs provide an essential layer of protection for employees working remotely or across multiple office locations, encrypting data traffic to ...
Protecting Against Attacks on NTLM Authentication

Protecting Against Attacks on NTLM Authentication

When it comes to cyberattacks, March has come in like a lion for Microsoft. Last week, Microsoft said in an SEC filing that that information stolen in a hack of senior leaders’ ...
Using Deterministic Security Controls To Stop Generative AI Attacks

Using Deterministic Security Controls To Stop Generative AI Attacks

Deepfake cyberattacks, phishing, and social engineering have all received a turbo boost in recent months due to the proliferation of easily accessed AI tools. Cybercriminals are some of the most creative individuals ...
ScreenConnect Authentication Bypass demo

ScreenConnect Authentication Bypass (CVE-2024-1709 & CVE-2024-1708)

Uncover critical security flaws in ConnectWise ScreenConnect (CVE-2024-1709 & CVE-2024-1708) posing remote code execution risks. Actively exploited in the wild. The post ScreenConnect Authentication Bypass (CVE-2024-1709 & CVE-2024-1708) appeared first on Indusface ...
Device details

Ordr Security Bulletin – Volt Typhoon State-Sponsored Cyber Actor  

Authors: Pandian G, Gowri Sunder Ravi, Srinivas Loke Summary of Advisory from FBI/CISA Actors with malicious intentions, particularly the People’s Republic of China-backed Volt Typhoon group, are manipulating small office/home office (SOHO) ...

FBI Issues Ominous Warning of Imminent Cyber Attack on Critical Infrastructure

In testimony before the House Select Committee on the Chinese Communist Party yesterday, FBI Director Christopher Wray delivered an ominous message: “China’s hackers are positioning on American infrastructure in preparation to wreak ...