BlastRADIUS Vulnerability Discovered in RADIUS Protocol Used in Corporate Networks and Cloud

Exploiting the BlastRADIUS vulnerability leverages a man-in-the-middle attack on the RADIUS authentication process. Continue reading BlastRADIUS Vulnerability Discovered in RADIUS Protocol Used in Corporate Networks and Cloud

Using Authy? Beware of impending phishing attempts

Do you use Authy for your multi-factor authentication needs? If you do, you should keep an eye out for phishing attempts, as well as implement defenses against SIM swapping attacks. What happened? On July 1, Twilio – the company that develops the… Continue reading Using Authy? Beware of impending phishing attempts