Security | Threat Detection | Cyberattacks | DevSecOps | Compliance

Okta Cross-origin Authentication Feature in Customer Identity Cloud Targeted in Credential Stuffing Attacks

On May 28, 2024, Okta disclosed that the cross-origin authentication feature in Customer Identity Cloud (CIC) is being targeted by credential-stuffing attacks. These attacks involve threat actors using large lists of stolen usernames and passwords to gain unauthorized access to online services. Suspicious activity has been observed starting from April 15, prompting Okta to notify affected customers and provide guidance to mitigate the issue.

"Largest Botnet Ever" Disrupted. 911 S5's Alleged Mastermind Arrested

A vast network of millions of compromised computers, being used to facilitate a wide range of cybercrime, has been disrupted by a multinational law enforcement operation. The 911 S5 botnet, described as "likely the world's largest botnet ever" by FBI Director Christopher Wray, has had its infrastructure and assets seized and its alleged mastermind arrested and charged. 35-year-old YunHe Wang, a dual citizen of China and St.

5 tips for adopting AI code assistance securely

There’s been a lot of excitement around generative AI technology over the past few years, especially in software development. Developers of all levels are turning to AI tools, such as GitHub Copilot, Amazon CodeWhisperer, and OpenAI’s ChatGPT, to support their coding efforts. In fact, GitHub found that 92% of developers use AI coding tools. However, many businesses are realizing that they need to be more cautious when using AI in software development.

These 5 Critical Capabilities Enhance DevSecOps Effectiveness

Implementation of a DevSecOps approach is the most impactful key factor in the total cost of a data breach, according to IBM’s Cost of a Data Breach Report 2023. DevSecOps, security practices integrated in DevOps, represents an advanced practice where the choice of tools is crucial for maximum risk reduction.

DNS, Powered by Intelligence: The Centripetal Advantage

We are trusted by the world’s most iconic brands with protecting their valuable business assets. Being named The Official Cyber Network Provider of The Boston Red Sox and Fenway Park demonstrates the importance for companies to adopt intelligence powered cybersecurity. When you have millions in revenue on the line like the Red Sox, you can’t afford to ignore intelligence.

Breaking Barriers: Demystifying Zero Trust with Chase Cunningham & Keeper Security

Zero trust is a powerful cybersecurity approach, but its implementation remains a challenge for many organizations. In this webinar, renowned expert Chase Cunningham demystifies the concept of zero trust and provides practical strategies to overcome the barriers to its adoption. Cunningham explores the core principles of zero trust, dispelling common misconceptions and highlighting its benefits in protecting against modern cyber threats. Drawing from real-world experiences, he'll guide you through the process of implementing robust zero-trust architectures tailored to your organization's needs.

Keeper 101 | Enterprise - How to Set Role-based Access and Controls in Keeper

Learn how to set role-based access and controls in Keeper with our step-by-step guide. In Keeper’s architecture, Roles and Teams are separate concepts. A Role defines permissions, policies and what features and security settings apply to users. Roles also define the administrative capabilities of those users. Teams are specifically used for sharing privileged accounts among users within the vault. Teams and Roles can be linked to automatically assign a role policy to all members of a team.

Keeper 101 | Enterprise - How Keeper's Advanced Reporting & Alerts Module Works

Learn how Keeper's Advanced Reporting & Alerts Module works within Keeper Enterprise. This module provides insight to assess vulnerabilities related to administrative changes, password reuse, unauthorized access, password stuffing attacks and insider threats.. The “Reporting Dashboard” provides a quick view of top events, the “Recent Activity” and "All Security Events” reports and any saved custom reports. Monitoring these events can assist in the detection of several threat vectors and help establish enforcement policies around vault and privileged account access.

KeeperMSP

KeeperMSP is the most secure, cybersecurity and password management platform for preventing password-related data breaches and cyberthreats. Designed exclusively for Managed Service Providers, KeeperMSP provides a powerful, easy-to-use platform to protect you and your customers’ passwords and sensitive data in secure, encrypted vaults. Web Vault Keeper’s Web Vault is where each provisioned user will securely store and access their passwords, credentials, files and any private data.