Hackers exposed personal data from 967,200 Figure accounts in a social engineering attack, including names, addresses, emails and dates of birth.
SecurityTech company Giesecke+Devrient (G+D) has taken a decisive step in its international growth strategy with the acquisition of XTec Incorporated, a U.S.-based leader in secure authentication ...
IDEMIA Public Security, a global leading provider of secure digital identity and trusted biometric-based solutions, and Proof, the trusted platform for securing the digital economy with ...
A new mobile espionage campaign exploiting civilian fears during the ongoing Israel-Iran conflict has been identified, with attackers distributing a trojanized version of Israel's official Red Alert ...
Authenticating workloads is becoming more and more complex, particularly given things like AI agents and the wide range of identity permissions they need. Organizations need to be thinking ahead on ...
Unlike conventional gates that rely on physical keys or manual operation, smart access gates function as integrated entry systems that connect with broader smart home or business infrastructure.
OAuth redirection is being repurposed as a phishing delivery path. Trusted authentication flows are weaponized to move users from legitimate sign‑in pages to attacker‑controlled infrastructure.
Broken authorization is one of the most widely known API vulnerabilities.  It features in the OWASP Top 10, AppSec conversations, and secure coding guidelines. Broken Object Level Authorization (BOLA) ...
GPGI manufactures metal payment cards and advanced industrial equipment for financial and manufacturing clients across multiple sectors.
Google is working on making HTTPS certificates in Chrome quantum-safe, based on Merkle Tree Certificates (MTCs).
Employees hate having to login to websites, search for invoices in hidden or remote sections, then download and upload them, which typically takes about 3 minutes per invoice. Payhawk’s AI agents ...
Master WS-Federation for enterprise SSO. Learn how Passive Requestor Profiles bridge legacy ASP.NET, SharePoint, and ADFS ...