Cisco Talos Reports Microsoft Windows Policy Loophole Being Exploited by Threat Actor

Image: SomYuZu/Adobe Stock Cisco Talos discovered a new Microsoft Windows policy loophole that allows a threat actor to sign malicious kernel-mode drivers executed by the operating system. The threat actor…

Continue ReadingCisco Talos Reports Microsoft Windows Policy Loophole Being Exploited by Threat Actor

Anonymous Sudan’s Attack of European Investment Bank: Money, Politics and PR

Image: Adobe Stock/Sandsun Last week, Anonymous Sudan, identified by Flashpoint and others as a Russia-aligned threat actor spoofing an Islamicist hacktivist group, attacked another western financial institution. This time, it…

Continue ReadingAnonymous Sudan’s Attack of European Investment Bank: Money, Politics and PR

Okta vs. Duo (2023): Which IAM tool is best for your business?

Identity and access management solutions like Okta and Duo are extremely valuable for maintaining organizational data security. While both Okta and Duo offer strong identity management features like multifactor authentication,…

Continue ReadingOkta vs. Duo (2023): Which IAM tool is best for your business?