This story was originally published on Cybersecurity Dive. To receive daily news and insights, subscribe to our free daily Cybersecurity Dive newsletter. Russia-backed threat actors have attacked a ...
A deep dive into implicit identity authentication methods for software development, covering oauth 2.0 flows, security risks, and modern alternatives for single-page applications.
MetaMask users are facing a renewed phishing threat as attackers deploy realistic two-factor authentication flows.
MetaMask users face a new phishing scam using fake 2FA and security alerts to steal seed phrases and drain wallets.
Just as we think we’re getting one step ahead of cybercriminals, they find a new way to evade our defenses. The latest method causing trouble for security teams is that of device code phishing, a ...
A vulnerability that exposed millions of airline customers to potential account takeovers has highlighted the significant risks organizations face from misconfigured OAuth authentication processes.
Learn why passwordless authentication is essential for mobile-first SaaS used by field teams to improve security, speed, and productivity.
Google unveiled on Wednesday a five-year roadmap for stronger consumer authentication tagging smartphones, long-life tokens, and futurist schemes to harden access controls while striking an ...
Capital might be harder to come by than it once was in startup land, but some firms are bucking the trend — hard. Take Descope, for example, which today announced that it raised a whopping $53 million ...
San Francisco — September 19, 2019 — OneLogin, the leader in Unified Access Management, today announced Vigilance AI, the new artificial intelligence and machine learning (AI/ML) risk engine, and ...