Identity & Access Management

14
Mar
Cloudflare Deploys Account Abuse Shield to Thwart Bot and Human Attacks

Cloudflare Deploys Account Abuse Shield to Thwart Bot and Human Attacks

Cloudflare has rolled out a new service called Account Abuse Protection, which uses proprietary machine‑learning models to spot and
1 min read
12
Mar
Cloudflare Deploys AI‑Powered Account Abuse Shield

Cloudflare Deploys AI‑Powered Account Abuse Shield

Cloudflare has rolled out Account Abuse Protection, an AI‑driven system that continuously models API call patterns across its global
1 min read
12
Mar
Critical Android Lock‑Screen Race Condition Lets Malware Bypass 12‑13 Security

Critical Android Lock‑Screen Race Condition Lets Malware Bypass 12‑13 Security

A new critical flaw uncovered by Malwarebytes exploits a race condition in Android’s UI handling code. The bug allows
1 min read
12
Mar
Cloudflare Deploys AI‑Driven Account Abuse Protection Across Its Network

Cloudflare Deploys AI‑Driven Account Abuse Protection Across Its Network

Cloudflare has rolled out a new service called Account Abuse Protection that leverages machine‑learning models to continuously profile API
1 min read
12
Mar
Microsoft Authenticator Leak Exposes MFA Codes Until App Update

Microsoft Authenticator Leak Exposes MFA Codes Until App Update

A vulnerability was discovered in the Microsoft Authenticator mobile app that could unintentionally reveal the time‑based one‑time passwords
1 min read
12
Mar
IoT Devices Using Default Admin Logins Pose Critical Lateral Movement Risk

IoT Devices Using Default Admin Logins Pose Critical Lateral Movement Risk

A recent SANS diary entry highlighted that a large number of Internet‑of‑Things devices are still deployed with administrative
1 min read
12
Mar
Microsoft Authenticator Leak Lets Apps Sniff One‑Time Codes

Microsoft Authenticator Leak Lets Apps Sniff One‑Time Codes

Security researchers found that specific builds of Microsoft Authenticator unintentionally broadcast the generated one‑time password (OTP) to any app
1 min read
12
Mar
Default IoT Admin Accounts: Silent Doorways for Immediate Compromise

Default IoT Admin Accounts: Silent Doorways for Immediate Compromise

IoT devices are shipped with factory‑set administrative usernames and passwords that are rarely changed during rollout. Attackers scanning a
1 min read
12
Mar
Spike in SSH Scans Signals Imminent Credential‑Theft Campaigns

Spike in SSH Scans Signals Imminent Credential‑Theft Campaigns

The Internet Storm Center’s daily report shows a sharp increase in SSH scanning traffic over the past 48 hours,
1 min read
12
Mar
New Android Timing Flaw Lets Attackers Unlock Phones in Under 60 Seconds

New Android Timing Flaw Lets Attackers Unlock Phones in Under 60 Seconds

A recently disclosed Android vulnerability exploits a timing mismatch in the lock‑screen authentication module. By sending specially crafted authentication
1 min read