-
News Article Jun 04, 2024
Cloud data warehousing giant Snowflake has disclosed a major security breach affecting an unknown number of its corporate customers, including entertainment titans Ticketmaster and Live Nation.
-
Blog Post Jun 04, 2024
Digital certificates play a vital role in driving today's powerful system of identity-based security — from securing online communications and transactions to encrypting software developer code and much more.
-
Podcast Jun 04, 2024
Root Causes 391: 20 Percent of Web Visits Are PQC Enabled Today
Cloudflare engineer Bas Westerbaan shares insights on post-quantum cryptography, its real-world uses, and timelines for PQC certificate availability.
-
News Article May 31, 2024
A cross-origin authentication feature in Okta’s customer identity cloud (CIC) is open to credential-stuffing attacks, the identity and access management company said in a security advisory.
-
News Article May 31, 2024
Okta notified its customers that the cross-origin authentication feature in its Customer Identity Cloud is now prone to being targeted by threat actors conducting credential stuffing attacks.
-
Podcast May 31, 2024
Root Causes 390: Chrome Boosts Its Root Distrust Agility
A root trust deprecation highlights new Chrome functionality that enables more agile and less disruptive distrust events.
-
News Article May 29, 2024
In the late 1990s, the world held its breath as the infamous Y2K bug loomed over the horizon, threatening to disrupt every facet of modern life. Businesses across the globe scrambled to prepare, often spending exorbitant amounts to safeguard against potential fallout.
-
News Article May 29, 2024
Attackers were observed targeting remote-access VPNs from “various cybersecurity vendors” as a way to gain entry and exploit vulnerabilities in enterprise networks, according to Check Point Software.
-
News Article May 29, 2024
Threat actors are targeting Check Point Software Technologies’ remote-access VPN devices in an ongoing campaign to breach enterprise networks.
-
News Article May 29, 2024
Threat actors are targeting Check Point Remote Access VPN devices in an ongoing campaign to breach enterprise networks, the company has warned in a new advisory.
-
News Article May 29, 2024
In recent months, researchers have observed an increase in attackers using remote access virtual private networks (VPNs) as a golden ticket for initial network access. Multiple cybersecurity vendors' solutions have been compromised, according to a recent Check Point blog post, prompting them to look into their own gear and whether it's being targeted.
-
News Article May 29, 2024
Cybersecurity company Check Point Software Technologies Ltd. is warning that it’s seeing a rise in threat actors exploiting remote-access virtual private network environments to gain authorized access to enterprises.