Legion AWS credential harvester and hijacker analyzed

Researchers from Cado Labs recently encountered an update to the emerging cloud-focused malware family, Legion. This sample iterates upon the credential harvesting features of its predecessor, with a continued emphasis on exploiting PHP web application… Continue reading Legion AWS credential harvester and hijacker analyzed

Credential management for an app requiring multiple different logins within a single application [closed]

I created an app that requires users to make multiple different logins within the app. Is it possible to use Google’s Identity API to ensure that the different required login credentials are stored/retrieved by Google whenever they are nee… Continue reading Credential management for an app requiring multiple different logins within a single application [closed]

Bad bots are coming for APIs

In 2022, 47.4% of all internet traffic came from bots, a 5.1% increase over the previous year, according to Imperva. The proportion of human traffic (52.6%) decreased to its lowest level in eight years. Bad bot traffic For the fourth consecutive year, … Continue reading Bad bots are coming for APIs

Data-driven insights help prevent decisions based on fear

Organizations have strengthened security measures and become more resilient, but threat actors are still finding ways through, according to BakerHostetler. “We launched the Data Security Incident Response Report nine years ago because we recognized tha… Continue reading Data-driven insights help prevent decisions based on fear

Using just-in-time access to reduce cloud security risk

Excessive privileges are a continuing headache for security professionals. As more organizations migrate assets to the cloud, users with excessive permissions can expand the blast radius of an attack, leaving organizations open to all sorts of maliciou… Continue reading Using just-in-time access to reduce cloud security risk

Overcoming industry obstacles for decentralized digital identities

In this Help Net Security interview, Eve Maler, CTO at ForgeRock, talks about how digital identities continue to play a critical role in how we access online services securely. Maler also highlights the challenges encountered by various industries in i… Continue reading Overcoming industry obstacles for decentralized digital identities

Researchers discover sensitive corporate data on decommissioned routers

Looking at configuration data, 56% of decommissioned routers disposed of and sold on the secondary market contained sensitive corporate data, according to ESET. Of the networks that had complete configuration data available: 22% contained customer data… Continue reading Researchers discover sensitive corporate data on decommissioned routers