How Are Cybercriminals Stealing Business Data?

How are cybercriminals stealing business data? Very easily using tools like ransomware. Does that put your business at risk? Yes. Here’s how to mitigate it quickly and affordably.
The post How Are Cybercriminals Stealing Business Data? appeared first o… Continue reading How Are Cybercriminals Stealing Business Data?

FBI Warn Hackers are Using Hijacked Home Security Devices for ‘Swatting’

Stolen email credentials are being used to hijack home surveillance devices, such as Ring, to call police with a fake emergency, then watch the chaos unfold. Continue reading FBI Warn Hackers are Using Hijacked Home Security Devices for ‘Swatting’

Ring’s Flying In-Home Camera Drone Escalates Privacy Worries

Privacy fears are blasting off after Amazon’s Ring division unveiled the new Always Home Cam, a smart home security camera drone. Continue reading Ring’s Flying In-Home Camera Drone Escalates Privacy Worries

Alien Android Banking Trojan Sidesteps 2FA

A new ‘fork’ of the Cerberus banking trojan, called Alien, targets victims’ credentials from more than 200 mobile apps, including Bank of America and Microsoft Outlook. Continue reading Alien Android Banking Trojan Sidesteps 2FA

MFA Bypass Bugs Opened Microsoft 365 to Attack

Vulnerabilities ‘that have existed for years’ in WS-Trust could be exploited to attack other services such as Azure and Visual Studio. Continue reading MFA Bypass Bugs Opened Microsoft 365 to Attack

Turn on MFA Before Crooks Do It For You

Hundreds of popular websites now offer some form of multi-factor authentication (MFA), which can help users safeguard access to accounts when their password is breached or stolen. But people who don’t take advantage of these added safeguards may find it far more difficult to regain access when their account gets hacked, because increasingly thieves will enable multi-factor options and tie the account to a device they control. Here’s the story of one such incident. Continue reading Turn on MFA Before Crooks Do It For You

Building on the IAM Benefits of SSO with MFA and Privileged Access Management

In part one of this post, we talked about why identity access management (IAM) is important.  In that discussion, we identified three types of IAM: Single Sign On Multi-Factor Authentication Privileged Access Management We discussed the different … Continue reading Building on the IAM Benefits of SSO with MFA and Privileged Access Management

Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials

The attack discovered by Cofense can steal sensitive user data stored on the cloud as well as find other victims to target. Continue reading Clever Phishing Attack Bypasses MFA to Nab Microsoft Office 365 Credentials

Enforce MFA for SharePoint Online Sites with Conditional Access Policies

A conditional access policy to enforce MFA access for SharePoint Online sites
A conditional access policy to enforce MFA access for SharePoint Online sites

A preview conditional access policy allows Office 365 tenants to require MFA for access to SharePoint sites.

The post Enforce MFA for SharePoint Online Sites with Conditional Access Policies appeared first on Petri.

Continue reading Enforce MFA for SharePoint Online Sites with Conditional Access Policies