article thumbnail

Top Trending CVEs of February 2024

NopSec

Finally, we cover a Microsoft Exchange privilege escalation vulnerability that could enable motivated threat actors to steal your NTLM password hash. The research endeavored to edit the grub boot loader to force a shell to boot, but the grub password was password protected. CVE-2024-22107 (RCE) High Low 7.2

article thumbnail

Passwords vs. Passkeys: The State of Passkeys on User Endpoints

Duo's Security Blog

And when it comes to managing access for this plethora of devices, password security just isn’t cutting it anymore. In our recent passkey blog series , we’ve been unpacking the difference between new passkey technology and more conventional password security in light of some of the most critical authentication scenarios.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Intro to Phishing: How Dangerous Is Phishing in 2023?

Duo's Security Blog

In many rnodern phishing attacks, malicious links send employees to copies of otherwise farniliar websites—like an internal payroll portal login page where it’s quick to muscle-rnemory a username and password. Strong security practices layer to protect against phishing attacks. Additional IT service headcount ended up being unnecessary.

article thumbnail

Phishing: What Everyone in Your Organization Needs to Know

NopSec

Attackers can then determine the IP range of their victim’s domains, WHOIS records which sometimes contain information on the technical contacts in the company, or subdomains that may contain the victim’s webmail portal, VPN login page, or a company’s Intranet. The education sector, for instance, has seen its fair share.

article thumbnail

Authentication Alone Is Failing: Introducing Continuous Identity Security

Duo's Security Blog

The security industry has diligently battled compromised credentials, evolving from passwords to multifactor authentication (MFA) to passwordless — our most secure and phishing-resistant method to date — and one that is fully supported in Duo. Despite these advancements, we still see many identity-based breaches year over year.

article thumbnail

Charting a Course to Zero Trust Maturity: 5 Steps to Securing User Access to Apps

Duo's Security Blog

TL,DR: Check out our on-demand webinar Your Zero Trust Roadmap , where we outline the five key steps to secure user access to apps. For more information, check out our on-demand webinar Your Zero Trust Roadmap. So how does one go from MFA to full zero trust maturity? What does that journey look like?

article thumbnail

Australia Stresses Cybersecurity Precautions in Wake of Ukraine Conflict

Duo's Security Blog

Firewall status, drive encryption status, password status and whether an antivirus or anti-malware agent is running can all contribute to improved security resilience. Adding multi-factor authentication to your virtual private network (VPN) can increase protection against credential theft.