An Overview of Passwordless Authentication

Explore passwordless authentication methods, benefits, and implementation strategies. Learn how to enhance security and user experience by eliminating passwords. The post An Overview of Passwordless Authentication appeared first on Security Boulevard. This article has been indexed from Security Boulevard Read…

Yurei Ransomware Uses PowerShell to Deploy ChaCha20 File Encryption

A newly discovered ransomware group called Yurei has emerged with sophisticated encryption capabilities, targeting organizations through double-extortion tactics while leveraging open-source code to rapidly scale operations. First observed on September 5, 2025, this Go-based ransomware employs the ChaCha20 encryption algorithm…

FlowiseAI Password Reset Token Vulnerability Enables Account Takeover

A critical vulnerability in FlowiseAI has been discovered that allows attackers to take over user accounts with minimal effort. The flaw, tracked as CVE-2025-58434, affects both cloud-hosted and self-hosted FlowiseAI deployments, posing significant risks to organizations using this AI workflow automation platform. CVE…