CyberArk has expanded passwordless authentication capabilities with new passkeys support. Now, CyberArk Identity customers can accelerate passwordless adoption and reduce cybersecurity risk by enabling the use of passkeys to easily access apps and websites using strong authentication methods like biometrics.…
Category: EN
North Korean Hackers Posed as Job Recruiters and Seekers
Two ongoing efforts, Contagious Interview and Wagemole, have been identified to target job-seeking activities connected to North Korean Hackers and state-sponsored threat actors. Threat actors use the interview process in “Contagious Interview” to trick developers into installing malware by posing…
Integration Spotlight: Stellar Cyber Open XDR
By integrating D3 Smart SOAR (Security Orchestration, Automation, and Response) with Stellar Cyber Open XDR, organizations can create a seamless incident response workflow that minimizes time to contain and enables better decision-making. This article outlines how the integration works and…
Insights from SentinelOne’s OneCon23
Earlier in the month I had the chance to attend OneCon, SentinelOne’s first ever customer conference in Boca Raton, Florida. This event was a pleasure to be at, not least as the Florida weather in November is considerably better than…
ENow App Governance Accelerator helps organizations identify risky apps
ENow releases its App Governance Accelerator software to help organizations get control and remain in control of their Microsoft Entra ID apps. This product enables companies to understand their current security posture, define actionable areas for improvement, and accelerate the…
Microsoft announces Defender bug bounty program
Microsoft has announced a new bug bounty program aimed at unearthing vulnerabilities in Defender-related products and services, and is offering participants the possibility to earn up to $20,000 for the most critical bugs. The Microsoft Defender bug bounty program Microsoft…
AI Solutions Are the New Shadow IT
Ambitious Employees Tout New AI Tools, Ignore Serious SaaS Security RisksLike the SaaS shadow IT of the past, AI is placing CISOs and cybersecurity teams in a tough but familiar spot. Employees are covertly using AI with little regard for established IT and…
LockBit Affiliates are Exploiting Citrix Bleed, Government Agencies Warn
Multiple threat actor groups including Lockbit affiliates are found to be exploiting a vulnerability in Citrix NetScaler gateway appliances, government agencies have warned This article has been indexed from www.infosecurity-magazine.com Read the original article: LockBit Affiliates are Exploiting Citrix Bleed,…
Sam Altman Reinstated As CEO, New OpenAI Board Appointed
Turbulent few days for OpenAI ends, after new board of directors is announced and Sam Altman returns as CEO This article has been indexed from Silicon UK Read the original article: Sam Altman Reinstated As CEO, New OpenAI Board Appointed
CISA adds Looney Tunables Linux bug to its Known Exploited Vulnerabilities catalog
US CISA adds Looney Tunables Linux flaw to its Known Exploited Vulnerabilities catalog. The U.S. Cybersecurity and Infrastructure Security Agency (CISA) added Looney Tunables Linux vulnerability to its Known Exploited Vulnerabilities (KEV) catalog. The vulnerability CVE-2023-4911 (CVSS score 7.8), aka Looney Tunables, is a buffer…