MFA

The Crucial Influence of Human Factors in Security Breaches
Prashant Ketkar | | breaches, Human Error, human factor, MFA, Phishing, remote browser isolation, Vulnerabilities, zero trust
The hard truth is that security breaches often happen because of human mistakes from simple, everyday actions. It's not just employees unknowingly using unsecured Wi-Fi – it's phishing, weak passwords and a ...
Security Boulevard

MFA Vulnerabilities, ATO, and the Importance of Password Security
The Microsoft 2024 Digital Defense Report exposes a hard truth—old-school password attacks are prevalent and effective ...

100 MILLION Americans in UnitedHealth PII Breach
Richi Jennings | | 2fa, 2FA policies, 2FA/MFA, ALPHV, ALPHV ransomware, Blackcat, BlackCat ransomware, BlackCat/ALPHV ransomware, Change Healthcare, HIPAA, hipaa laws, hipaa rule, MFA, multi-factor authenication, Multi-Factor Authentication, Multi-Factor Authentication (MFA), multi-factor-auth, Multifactor Authentication, multifactorauthentication, Ransomware, SB Blogwatch, Steven Martin, two-factor-authentication.2fa, UHG, UnitedHealth
Not cute: $UNH’s Change Healthcare unit paid a big ransom—its IT was as weak as a kitten ...
Security Boulevard
Response to CISA Advisory (AA24-290A): Iranian Cyber Actors’ Brute Force and Credential Access Activity Compromises Critical Infrastructure Organizations
Francis Guibernau | | adversary emulation, cisa, Energy, government, Healthcare & Life Sciences, Iran, MFA, Professional Services, Resources & Utilities, technology
AttackIQ has released a new assessment template in response to the CISA Advisory (AA24-290A), published on October 16, 2024. The advisory highlights that since October 2023, Iranian cyber actors have used password ...

Toxic Triad of Cloud Vulnerabilities Puts Businesses at Risk
Nathan Eddy | | Cloud, DEVOPS, Kubernetes, MFA, security, segmentation, Tenable, Vulnerabilities, zero trust
Publicly exposed, critically vulnerable and highly privileged workloads are putting organizations at risk of cloud data losses and cyberattacks, according to a Tenable report, which labeled the vulnerabilities a “toxic cloud triad” ...
Security Boulevard

Kia Security Flaw Exposed, NIST’s New Password Guidelines
Tom Eston | | Authentication, biometrics, cars, Connected Cars, Cyber Security, cyber threat, Cybersecurity, Data Privacy, Digital Privacy, Episodes, Hacking, Information Security, Infosec, Kia, MFA, Multi-Factor Authentication, NIST, Password, password complexity, Password Guidelines, Password Policy, Password reset, Password Resets, passwords, Podcast, Podcasts, Privacy, security, technology, web application, web application vulnerability, Weekly Edition
In this episode, the hosts discuss a significant vulnerability found in Kia’s web portal that allows remote control of various car features via their app, potentially enabling unauthorized unlocking and tracking. The ...

Mobile Phishing Attacks Explode, Enterprise Devices Targeted
Mobile phishing attacks are on the rise, with 82% of phishing sites now targeting mobile devices, marking a 7% increase over the past three years ...
Security Boulevard

BYOD Policies Fueling Security Risks
The use of employee mobile devices at work, or bring your own device (BYOD), is a significant and growing threat to organizational security ...
Security Boulevard

Cybersecurity Insights with Contrast CISO David Lindner | 9/6/24
David Lindner, Director, Application Security | | 2fa, cyberespionage, MFA, Thought Leaders, Vulnerability Disclosure
Insight #1: SQL injection baffles airport security You mean to say that SQL Injection is still a problem? How many more of these have to happen before we realize there are control layers ...

Cybersecurity Insights with Contrast CISO David Lindner | 8/30/24
David Lindner, Director, Application Security | | 2fa, cyberespionage, MFA, Thought Leaders, Vulnerability Disclosure
Insight #1: North Korean IT spies The threat of state-sponsored cyber espionage is real and evolving. Recent reports reveal North Korean IT professionals are using stolen identities and advanced tactics to infiltrate ...