Out Of Band Authentication (OOBA) is a type of two-factor authentication (2FA) that demands a secondary verification method delivered over a different communication channel (call or text) in addition to the typical user ID and password. The possibility of compromising the transaction/account decreases by splitting the process into two channels, employing both the user's internet and [...] Read More →
Every day, data breaches, identity theft, and online fraud become increasingly widespread. Every year, millions of credentials are stolen or phished. In this climate, it is evident that more than password-based protection is required for employees, partners, and customers to access essential online resources. Risk-Based Authentication (RBA), also known as Adaptive Authentication, is an authentication [...] Read More →
On September 2021, an attacker published credentials for 87,000 FortiGate SSL VPN devices online and created a huge threat to VPN Security by exploiting a known, old vulnerability. Investigators concluded that the credential was obtained by exploiting CVE-2018-13379, a vulnerability that allows unauthenticated attackers to download system files via specially crafted HTTP resource requests. Its [...] Read More →
With the rise in cloud storage and the advent of the internet, more and more businesses are moving their operations/data online. This has greatly reduced storage costs and eased business operations. Individual users have also greatly benefited from the internet to send text messages, post stories on social media sites, or learn a new skill. [...] Read More →
What is Atlassian Data Center? Let’s lay out the foundation on what exactly is Data Center first. In comparison, Server and Data Center differ in that, Data Center allows multiple application servers to run simultaneously, while Server only allows one application server. For this reason, Atlassian Data Center provides high availability and performance for critical [...] Read More →
Every day, you read about data breaches and password leaks in the news. You might believe that this only happens to people who have outdated systems or poor security. What about you though? Cybercriminals can easily gain access to your organization's confidential data using unprotected passwords used by your employees or customers. But the battle [...] Read More →