Articles tagged with: #identity Clear filter
DOGE Accused of Mimicking Country's Social Security Info in Unsecured Cloud

DOGE Accused of Mimicking Country's Social Security Info in Unsecured Cloud

Cyber Security News cybersecuritynews.com

A whistleblower disclosure filed today alleges that the Department of Government Efficiency (DOGE) within the Social Security Administration (SSA) covertly created a live copy of the nation's entire Social Security dataset in an unsecured cloud environment. Chief Data Officer Charles Borges warned that, if malicious actors gain access, over 300 million Americans could face identity

Securing and governing the rise of autonomous agents​​

Securing and governing the rise of autonomous agents​​

Microsoft Security Blog www.microsoft.com

​In this blog you will hear directly from Corporate Vice President and Deputy Chief Information Security Officer (CISO) for Identity, Igor Sakhnov, about how to secure and govern autonomous agents. This blog is part of a new ongoing series where our Deputy CISOs share their thoughts on what is most important in their respective domains. In this series you will get practical advice, forward-looking commentary on where the industry is going, things you should stop doing, and more. ​

Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab

Aembit Extends Secretless CI/CD with Credential Lifecycle Management for GitLab

Cyber Security News cybersecuritynews.com

Aembit, the workload identity and access management (IAM) company, today announced new capabilities for GitLab designed to reduce the security risks of long-lived personal access tokens (PATs) and other secrets needed to automate software delivery, while making it easier to deploy and manage pipelines. With the introduction of Credential Lifecycle Management and the availability of

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

Google to Verify All Android Developers in 4 Countries to Block Malicious Apps

The Hacker News thehackernews.com

Google has announced plans to begin verifying the identity of all developers who distribute apps on Android, even for those who distribute their software outside the Play Store. "Android will require all apps to be registered by verified developers in order to be installed by users on certified Android devices," the company said. "This creates crucial accountability, making it much harder for

Linkage Attacks Expose Identity Risks in Public ECG Data Sharing

Linkage Attacks Expose Identity Risks in Public ECG Data Sharing

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.15850v1 Announce Type: new Abstract: The increasing availability of publicly shared electrocardiogram (ECG) data raises critical privacy concerns, as its biometric properties make individuals vulnerable to linkage attacks. Unlike prior studies that assume idealized adversarial capabilities, we evaluate ECG privacy risks under realistic conditions where attackers operate with partial knowledge. Using data from 109 participants across diverse real-world datasets, our approach achieves...

Veridas Expands in Brazil & Southern Cone, Names Anders Hartington

Veridas Expands in Brazil & Southern Cone, Names Anders Hartington

Cyber Security - AI-Tech Park ai-techpark.com

Veridas, the global identity company behind some of the most advanced biometric deployments in the world, is reinforcing its commitment to Brazil and the Southern Cone with the appointment of Anders Hartington as Regional Director. After years of successful operations in the region, supporting key players across banking, telcos, and major sporting events, Veridas is...

Socure Wins 2025 Datos Awards for ID Verification & Fraud Solutions

Socure Wins 2025 Datos Awards for ID Verification & Fraud Solutions

Cyber Security - AI-Tech Park ai-techpark.com

Industry-leading identity verification platform recognized for its overall approach to fraud prevention and mitigation, as well as its first-party fraud solution designed to combat the $100 billion "friendly fraud" crisis Socure, the leading provider of artificial intelligence for digital identity verification, compliance, sanctions screening, and fraud prevention in over 190...

Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft

Scattered Spider Hacker Gets 10 Years, $13M Restitution for SIM Swapping Crypto Theft

The Hacker News thehackernews.com

A 20-year-old member of the notorious cybercrime gang known as Scattered Spider has been sentenced to ten years in prison in the U.S. in connection with a series of major hacks and cryptocurrency thefts. Noah Michael Urban pleaded guilty to charges related to wire fraud and aggravated identity theft back in April 2025. News of Urban's sentencing was reported by Bloomberg and Jacksonville news

Okta Security Releases Auth0 Event Logs for Proactive Threat Detection

Okta Security Releases Auth0 Event Logs for Proactive Threat Detection

Cyber Security News cybersecuritynews.com

Okta has announced the launch of the Auth0 Customer Detection Catalog, a comprehensive open-source repository designed to enhance proactive threat detection capabilities for Auth0 customers. This strategic release represents a significant advancement in identity and access management security, providing security teams with sophisticated detection rules to identify and respond to emerging threats across their authentication

How to Build a Secure iOS App with MFA

How to Build a Secure iOS App with MFA

Okta Developer developer.okta.com

Modern mobile applications require robust security solutions, especially when handling sensitive user data or enterprise-level access. Okta offers a powerful identity platform, and with the BrowserSignIn module from its Swift SDK, adding secure login to your iOS app becomes scalable and straightforward. In this post, you'll learn how to: Set up your Okta developer account Configure your iOS app for authentication using best practices Customize the authentication experience with MFA policies...

SAM and LSA Secrets Dump Attacks

SAM and LSA Secrets Dump Attacks

CrowdStrike www.reddit.com

Using Falcon EDR, is it possible to configure a prevention policy that would prevent SAM and LSA Secrets dump attacks, or would the identity module be required? We're using a phase 3 prevention policy set to the current recommended settings and during a recent test, local hashes and LSA secrets were successfully extracted from a Windows host. I'd like to get some guidance and preventing that. submitted by /u/RobotCarWash [link] [comments]

Microsoft Defender AI to Uncover Plain Text Credentials Within Active Directory

Microsoft Defender AI to Uncover Plain Text Credentials Within Active Directory

Cyber Security News cybersecuritynews.com

Microsoft has unveiled a groundbreaking AI-powered security feature that addresses one of cybersecurity's most persistent vulnerabilities: plain text credentials stored in Active Directory (AD) free-text fields. The new posture alert in Microsoft Defender for Identity leverages artificial intelligence to detect exposed credentials with unprecedented precision, helping organizations identify and remediate identity misconfigurations before they can

Adjustable AprilTags For Identity Secured Tasks

Adjustable AprilTags For Identity Secured Tasks

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.12304v1 Announce Type: new Abstract: Special tags such as AprilTags that facilitate image processing and pattern recognition are useful in practical applications. In close and private environments, identity security is unlikely to be an issue because all involved AprilTags can be completely regulated. However, in open and public environments, identity security is no longer an issue that can be neglected. To handle potential harm caused by adversarial attacks, this note advocates...

Securing Sideways: Thwarting Lateral Movement by Implementing Active Directory Tiering

Securing Sideways: Thwarting Lateral Movement by Implementing Active Directory Tiering

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.11812v1 Announce Type: new Abstract: The advancement of computing equipment and the advances in services over the Internet has allowed corporations, higher education, and many other organizations to pursue the shared computing network environment. A requirement for shared computing environments is a centralized identity system to authenticate and authorize user access. An organization's digital identity plane is a prime target for cyber threat actors. When compromised, identities can...

Privacy-Aware Detection of Fake Identity Documents: Methodology, Benchmark, and Improved Detection Methods (FakeIDet2)

Privacy-Aware Detection of Fake Identity Documents: Methodology, Benchmark, and Improved Detection Methods (FakeIDet2)

cs.CR updates on arXiv.org arxiv.org

arXiv:2508.11716v1 Announce Type: new Abstract: Remote user verification in Internet-based applications is becoming increasingly important nowadays. A popular scenario for it consists of submitting a picture of the user's Identity Document (ID) to a service platform, authenticating its veracity, and then granting access to the requested digital service. An ID is well-suited to verify the identity of an individual, since it is government issued, unique, and nontransferable. However, with recent...