[HackerNews] CISA Adds Single-Factor Authentication to the List of Bad Practices

The U.S. Cybersecurity and Infrastructure Security Agency (CISA) on Monday added single-factor authentication to the short list of “exceptionally risky” cybersecurity practices that could expose critical infrastructure as well as government and the private sector entities to devastating cyberattacks.
Single-factor authentication is a method of signing in users to websites and remote systems by

Source: Read More (The Hacker News)

You might be interested in …

[ThreatPost] Banking Attacks Surge Along with Post-COVID Economy

All posts, ThreatPost

FinTech fraud spikes 159 percent in Q1 2021 along with stimulus spending. Source: Read More (Threatpost)

Read More

[SANS ISC] Hancitor campaign abusing Microsoft’s OneDrive, (Wed, Sep 15th)

All posts, Sans-ISC

Introduction Malicious spam (malspam) pushing Hancitor malware (AKA: Chanitor, MAN1, Moskalvzapoe, or TA551) sometimes changes tactics when delivering malware .  Since June 2021, this campaign stopped using docs.google.com links in their malspam and began using feedproxy.google.com to kick off an infection chain.  Criminals behind Hancitor have been abusing Google services since October 2020. These Google […]

Read More

[ZDNet] Apple, Microsoft and Amazon chiefs to meet Biden over critical infrastructure cyber attacks

All posts, ZDNet

US President invites CEOs of US tech giants to discuss how critical infrastructure can be protected from foreign cyber attackers. Source: Read More (Latest topics for ZDNet in Security)

Read More

Leave a Reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.