authentication

  • Blog

    Hackers exploit authentication bypass in Palo Alto Networks PAN-OS

    Hackers are launching attacks against Palo Alto Networks PAN-OS firewalls by exploiting a recently fixed vulnerability (CVE-2025-0108) that allows bypassing authentication. The security issue received a high-severity score and impacts the PAN-OS management web interface and allows an unauthenticated attacker on the network to bypass authentication and invoke certain PHP scripts, potentially compromising integrity and confidentiality. In a security bulletin on February 12,…

    Read More »
  • Blog

    How to Prevent Phishing Attacks with Multi-Factor Authentication

    Phishing takes advantage of the weakest link in any organization’s cybersecurity system — human behavior. Phishing attacks are generally launched via email, although some opening salvos have begun using text messaging or phone calls. In the most common scenario, an email arrives purporting to be from HR or IT, for example. It looks just like any other company email. It…

    Read More »
  • Blog

    How To Use SCP (Secure Copy) With SSH Key Authentication

    Anyone who administers Linux machines likely knows secure shell. Without this tool, administering those servers remotely would be quite challenging. It would also become harder to move files back and forth, at least with a modicum of security. That’s where secure copy comes into play. With the SCP command, you can copy files to and from a remote Linux server…

    Read More »
  • Blog

    This Is the Best Authy Alternative for Two-Factor Authentication

    Still looking for an alternative to Authy, the two-factor authenticator that used to have a desktop app? Ente Auth, an open-source application, might be what you’re looking for. Authy, if you don’t know, is a two-factor authentication app that we recommended ages ago—mostly because it offered a desktop app. But in March of 2024 Authy shut down the desktop app.…

    Read More »
  • Blog

    Critical SAP flaw allows remote attackers to bypass authentication

    SAP has released its security patch package for August 2024, addressing 17 vulnerabilities, including a critical authentication bypass that could allow remote attackers to fully compromise the system. The flaw, tracked as CVE-2024-41730 and rated 9.8 as per the CVSS v3.1 system, is a “missing authentication check” bug impacting SAP BusinessObjects Business Intelligence Platform versions 430 and 440 and is…

    Read More »
Back to top button
close