Tag: EN

Taming Identity Sprawl With a Least Privilege Approach

Remember the Hydra, the multi-headed creature from Greek mythology? Warriors attempting to slay the beast faced a seemingly impossible challenge: when they cut off one head, multiple heads re-emerged. Security teams entrusted with Identity and Access Management (IAM) can relate…

CMIYC 2024: RAdmin3 Challenge

“Nothing is more permanent than a temporary solution.“ – Russian Proverb Introduction: This is a continuation of my write-up about this year’s Crack Me If You Can challenge. You can view the previous entry focusing on the StripHash challenge [here].…

Now espionage through HDMI Cables say experts

Research from Universidad de la República (Udelar) in Uruguay has unveiled a new security vulnerability involving HDMI cables, which are commonly used to connect computers to TVs and large screens. The study reveals that hackers can exploit these cables to…

China-linked Attackers Target Russian Govt Entities

Researchers from Kaspersky have detected a series of ongoing targeted cyberattacks on dozens of computers at Russian government entities and IT organizations. The bad actors infected devices via phishing emails with malicious shortcut attachments. These shortcuts were used to deliver…

74% of IT professionals worry AI tools will replace them

56% of security professionals are concerned about AI-powered threats, according to Pluralsight. Many organizations lack structured AI training Over half of surveyed technologists are either extremely concerned or moderately concerned about AI-powered threats, with only 6% saying they are not…

How passkeys eliminate password management headaches

In this Help Net Security interview, David Cottingham, President at rf IDEAS, discusses the key benefits organizations can expect when implementing passkeys. Cottingham addresses the misconceptions surrounding the adoption of passkeys, particularly in the B2B landscape. What are the key…

Log in to the ADSM Portal using Region User

This article will introduce how to use Region User to log into Portal on ADSM and achieve permission control among different accounts. Due to different versions, the screenshots in this article may be inconsistent with the webpage of your device,…

China-linked cyber-spies infect Russian govt, IT sector

No, no, go ahead, don’t let us stop you, Xi Cyber-spies suspected of connections with China have infected “dozens” of computers belonging to Russian government agencies and IT providers with backdoors and trojans since late July, according to Kaspersky.… This…