Security researchers have uncovered a malicious npm package that poses as a legitimate WhatsApp Web API library while quietly stealing messages, credentials,…
Browsing CategoryUncategorized
Agentic AI already hinting at cybersecurity’s pending identity crisis
Making the most of agentic AI is a top agenda item for many enterprises the coming year, as business executives are keen…
Scammers use AI to make fake art seem real
Fraudsters have started using AI to create fake documents claiming that artworks are genuine or legally owned, the Financial Times reports. According…
Pirate activists have copied Spotify’s entire music library
A collective of pirate activists say they gained access to 256 million rows of metadata and 86 million audio files, equivalent to…
Think you can beat ransomware? RansomHouse just made it a lot harder
A recent upgrade to the RansomHouse ransomware operation has added new concerns for enterprise defenders, introducing a multi-layered encryption update to the…
Hackers exploit Microsoft OAuth device codes to hijack enterprise accounts
Cybercriminals and state-sponsored hackers are increasingly exploiting Microsoft’s legitimate OAuth 2.0 device authorization process to hijack enterprise accounts, bypassing multifactor authentication protections…
What CISOs should know about the SolarWinds lawsuit dismissal
The US Securities and Exchange Commission’s Nov. 30 decision to dismiss its lawsuit against SolarWinds and its CISO, Tim Brown, was met…
Iranian APT Prince of Persia returns with new malware and C2 infrastructure
Researchers have discovered new activity from a threat actor dubbed Prince of Persia that’s believed to be tied to the Iranian government….
Identity Management and Information Security News for the Week of December 19th: 1Kosmos, Prove, Opal Security, and More
The editors at Solutions Review have curated this list of the most noteworthy Identity Management and Information Security news from the week…
How to Stop Identity Fraud Before It Starts: Building Trust in a Synthetic World
Patrick Harding, Chief Product Architect at Ping Identity, explains how companies can prevent identity fraud before it occurs. This article originally appeared in Insight Jam,…