Remove Authentication Remove Blog Remove Mobile Remove VPN
article thumbnail

Revolutionizing Cisco VPN Access with Duo SSO

Duo's Security Blog

Secure Cisco VPN logins in less than an hour Authenticate users in seconds Verify user + device posture Blog unmanaged devices Mitigate modern security threats with phishing-resistant authentication Join the thousands of Cisco firewall customers who take advantage of protecting Cisco VPN logins with Cisco Duo Single Sign-On via SAML 2.0

VPN 92
article thumbnail

Legacy Authentication Protocols: Why RADIUS Is (Still) Important

Duo's Security Blog

When reading the title of this blog, you might be wondering to yourself why RADIUS is being highlighted as a subject — especially amidst all of the advancements of modern authentication we see taking place recently. It is commonly used for network access into VPNs, wireless access points, and other devices (more on this later).

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

T-Mobile confirms Lapsus$ had access its systems

Security Affairs

Telecommunication giant T-Mobile confirmed the LAPSUS$ extortion group gained access to its networks in March. Telecom company T-Mobile on Friday revealed that LAPSUS$ extortion gang gained access to its networks. ” LAPSUS$ leader White/Lapsus Jobs looking up the Department of Defense in T-Mobile’s internal Atlas system.

Mobile 96
article thumbnail

What to do if you suspect your personal mobile has been hacked

BH Consulting

But what happens if you think your mobile has been breached? In this blog, we’ll look at how you can minimise the impact of your personal mobile being compromised. Check and protect what you value most Identify the important apps or files on your mobile phone. (Do Encrypt the data stored on your mobile phone.

Mobile 105
article thumbnail

Modernizing Secure Remote Access: A VPN-less Future for Hybrid Work

Duo's Security Blog

Nevertheless, VPN-less solutions are gaining momentum due to their benefits over traditional VPNs. However, adoption of a VPN-less secure remote access solution varies by industry, an organization’s knowledge, skills, and comfort level with configuring and managing the solution, and cultural factors including executive buy-in.

VPN 76
article thumbnail

Duo’s Data-Driven Defense: Combatting Cyber Threats in Higher Education

Duo's Security Blog

If successful, the bad actor register malicious devices on the student’s account for continued access to the student’s account and the university’s VPN. Duo Data Scientist, Becca Lynch, wrote about these attacks in the blog, Identity Threat Trends for Higher Education. A typical device might be linked to a small number of Duo accounts.

article thumbnail

A Closer Look at the LAPSUS$ Data Extortion Group

Krebs on Security

In a blog post published Mar. For a fee, the willing accomplice must provide their credentials and approve the MFA prompt or have the user install AnyDesk or other remote management software on a corporate workstation allowing the actor to take control of an authenticated system. ” LAPSUS$ leader Oklaqq a.k.a.