#jwt

[ follow ]
#identity-management
Information security
fromThe Hacker News
6 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Information security
fromThe Hacker News
5 days ago

Shrinking the IAM Attack Surface through Identity Visibility and Intelligence Platforms (IVIP)

Enterprise IAM faces fragmentation, leading to Identity Dark Matter and a significant gap in visibility and security oversight.
Information security
fromThe Hacker News
6 days ago

[Webinar] How to Close Identity Gaps in 2026 Before AI Exploits Enterprise Risk

Identity programs are maturing, yet the risk from disconnected applications and AI agents is increasing for enterprises.
Privacy technologies
fromTechCrunch
4 days ago

WireGuard VPN developer can't ship software updates after Microsoft locks account | TechCrunch

WireGuard is locked out of its Microsoft developer account, preventing critical software updates for Windows users.
Cryptocurrency
fromnews.bitcoin.com
1 week ago

Human Error, Not Hacking, Cited as Top Cause for Crypto Access Loss

Human error is the leading cause of cryptocurrency access loss, affecting 35% of holders, primarily due to forgotten passwords and lost seed phrases.
#ai-governance
#generative-ai
fromBig Think
1 week ago
Digital life

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Digital life
fromBig Think
1 week ago

3 ways to prove you're human online

Generative AI is rapidly increasing information production, leading to a potential scarcity of human-generated content and a need for new human verification methods.
Privacy technologies
fromNextgov.com
3 weeks ago

New methods for assuring digital identity and authenticity

Generative AI is transforming content creation, increasing the need for reliable identity verification and authenticity in digital media.
Privacy technologies
fromComputerWeekly.com
1 week ago

Identity and AI: Questions of data security, trust and control | Computer Weekly

AI-driven identity solutions improve access control but raise compliance, privacy, and ethical concerns that organizations must address.
Information security
fromThe Hacker News
6 days ago

The Hidden Cost of Recurring Credential Incidents

Credential incidents cause significant operational costs and disruptions, impacting IT teams and overall business productivity beyond just breach prevention.
#vpn
fromEngadget
2 months ago
Privacy technologies

How to check if your VPN is working

Verify a VPN is actually connected and encrypting traffic by running specific tests rather than assuming the client is working.
fromCNET
2 months ago
Privacy technologies

Why I Use a VPN Even Though I Have Nothing to Hide

Using a VPN protects online privacy by encrypting traffic, masking IP addresses, and preventing ISPs, administrators, and governments from monitoring activity.
Privacy professionals
fromWIRED
2 weeks ago

Using a VPN May Subject You to NSA Spying

Using commercial VPNs may expose Americans to foreign surveillance laws, risking their constitutional protections against warrantless government spying.
#cybersecurity
Information security
fromThe Hacker News
1 week ago

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

A targeted social engineering campaign by North Korean actors led to a supply chain compromise of the Axios npm package.
Information security
fromThe Hacker News
1 week ago

UNC1069 Social Engineering of Axios Maintainer Led to npm Supply Chain Attack

A targeted social engineering campaign by North Korean actors led to a supply chain compromise of the Axios npm package.
Privacy professionals
fromSecurityWeek
3 weeks ago

Tycoon 2FA Fully Operational Despite Law Enforcement Takedown

Tycoon 2FA continues to operate despite international takedown efforts, facilitating phishing attacks and compromising accounts without alerts.
Information security
fromSiliconANGLE
1 week ago

Hackers compromise popular Axios Javascript library with hidden malware - SiliconANGLE

Axios HTTP client library was hacked to distribute malware via a compromised npm account, affecting multiple operating systems.
#password-managers
Apple
fromZDNET
4 weeks ago

Why I use Apple's and Google's password managers - and don't mind the chaos

Apple and Google offer free, beginner-friendly password managers that securely store passwords across devices, with Apple best for iOS users and Google best for Android or mixed-device environments.
Apple
fromZDNET
4 weeks ago

Why I use Apple's and Google's password managers - and don't mind the chaos

Apple and Google offer free, beginner-friendly password managers that securely store passwords across devices, with Apple best for iOS users and Google best for Android or mixed-device environments.
#reddit
fromThe Verge
2 weeks ago
Privacy technologies

Reddit accounts with 'fishy' bot-like behavior will soon need to prove they're human

Privacy technologies
fromMashable
2 weeks ago

Reddit officially addresses bot problems, ID verification stance

Reddit plans to implement human verification to ensure users are real people, not bots, without compromising user anonymity.
Privacy technologies
fromThe Verge
2 weeks ago

Reddit accounts with 'fishy' bot-like behavior will soon need to prove they're human

Reddit is implementing a bot identification system requiring some users to verify their humanity through methods like fingerprint scanning or ID submission.
Tech industry
fromFast Company
1 month ago

Is it even possible to decentralize social networking?

Jay Graber stepped down as Bluesky CEO to become chief innovation officer, with venture capitalist Toni Schneider taking the interim CEO role to help scale the platform's growth.
Information security
fromTheregister
2 weeks ago

Security boffins harvest bumper crop of API keys from web

Almost 2,000 API credentials were found exposed on 10,000 webpages, posing significant security risks to organizations and critical infrastructure.
Privacy professionals
fromWIRED
4 weeks ago

If You Don't Have One, I Recommend a Free Dark Web Monitoring Service

Dark web monitoring services track compromised data across public hacker forums and databases to alert users when their personal information appears in breaches, though most breached data is found on the clear web rather than the dark web itself.
Deliverability
fromWIRED
1 month ago

How to Avoid Getting Locked Out of Your Google Account

Set up Recovery Contacts and two-factor authentication to protect your Google account and regain access if locked out.
Privacy professionals
fromWIRED
4 weeks ago

Do You Need an Identity Protection Service for Safe Browsing?

Identity theft protection services function as insurance products offering reactive compensation for damages rather than active prevention, with coverage details and sub-benefit caps critically affecting actual protection value.
Privacy technologies
fromAzure DevOps Blog
3 weeks ago

Authentication Tokens Are Not a Data Contract - Azure DevOps Blog

Authentication tokens should only validate authorization, not serve as data interfaces; upcoming encryption will make token payloads unreadable, breaking applications that decode token claims.
#ai-agent-security
Information security
fromTheregister
3 weeks ago

Okta made a nightmare micromanager for your AI agents

Okta launched Okta for AI Agents, enabling organizations to discover, monitor, and disable AI agents through centralized identity and access management controls.
Information security
fromTechzine Global
4 weeks ago

Okta launches platform to secure AI agents

Okta for AI Agents provides organizations with discovery, access management, and immediate revocation capabilities to secure non-human identities and address the 88 percent of organizations experiencing AI agent security incidents.
Information security
fromTheregister
3 weeks ago

Okta made a nightmare micromanager for your AI agents

Okta launched Okta for AI Agents, enabling organizations to discover, monitor, and disable AI agents through centralized identity and access management controls.
Information security
fromTechzine Global
4 weeks ago

Okta launches platform to secure AI agents

Okta for AI Agents provides organizations with discovery, access management, and immediate revocation capabilities to secure non-human identities and address the 88 percent of organizations experiencing AI agent security incidents.
Privacy technologies
fromArs Technica
3 weeks ago

World ID wants you to put a cryptographically unique human identity behind your AI agents

World ID's Agent Kit enables AI agents to prove human authorization through iris-verified identity tokens, allowing websites to distinguish legitimate automated requests from malicious Sybil attacks.
fromInfoQ
1 month ago

Platforms for Secure API Connectivity With Architecture as Code

Building APIs is so simple. Caveat, it's not. Actually, working with tools with no security, you've got a consumer and an API service, you can pretty much get that up and running on your laptop in two or three minutes with some modern frameworks. Then, authentication and authorization comes in. You need a way to model this.
Web frameworks
Information security
fromZDNET
3 weeks ago

As AI agents spread, 1Password's new tool tackles a rising security threat

AI agents require credentials to access systems, creating enterprise security risks similar to managing human employee access, necessitating unified credential management solutions.
Information security
fromSecurityWeek
4 weeks ago

Threat Actor Targeting VPN Users in New Credential Theft Campaign

Storm-2561 uses SEO poisoning and GitHub hosting to distribute trojans impersonating VPN software, stealing credentials through signed malware that evades detection.
Privacy professionals
fromwww.socialmediatoday.com
1 month ago

Concerns with third party partner could derail LinkedIn's verification push

LinkedIn implements expanded verification requirements for company, workplace, and executive-level roles to combat scams and misrepresentation, though concerns about verification partner Persona may hinder progress.
Privacy technologies
fromZDNET
1 month ago

I switched password managers without losing a single login - here's how

Switching password managers involves exporting passwords to CSV and importing them into a new app, then reviewing settings before deleting the old manager.
fromTheregister
2 months ago

Matrix messaging gaining ground in government IT

FOSDEM 2026 Amid growing interest in digital sovereignty and getting data out of the corporate cloud and into organizations' ownership, the Matrix open communication protocol is thriving. The project was co-founded by Matthew Hodgson and Amandine le Pape, and The Reg FOSS desk met both at this year's FOSDEM for a chat about what's happening with Matrix. The Register has covered Matrix and its commercial Element side quite a few times over the years,
Software development
fromblog.logrocket.com
2 months ago

What are the key challenges in scaling MFA for large organizations? - LogRocket Blog

Most design specs break down in development because they're built for designers, not developers. This article shows how to write specs that reflect real-world logic, states, constraints, and platform behavior not just pixels. Rafael Basso Jan 20, 2026 11 min read A practical guide to AI in UX design, covering predictive UX, generative assistance, personalization, automation, and the risks of overusing AI. Shalitha Suranga Jan 14, 2026 11 min read
UX design
Privacy technologies
fromTheregister
1 month ago

Microsoft tightens Authenticator checks on Android and iOS

Microsoft automatically removes Entra credentials from jailbroken and rooted iOS and Android devices, with enforcement beginning on Android now and iOS in April 2026, completing by July 2026.
Information security
fromThe Hacker News
1 month ago

Where Multi-Factor Authentication Stops and Credential Abuse Starts

Many Windows authentication paths bypass MFA protections, allowing attackers to compromise networks using valid credentials despite MFA deployment on cloud applications.
Information security
fromComputerworld
1 month ago

OAuth phishers make 'check where the link points' advice ineffective

Attackers use phishing emails with malicious OAuth links containing broken parameters to redirect users to attacker-controlled destinations through legitimate identity providers.
#discord
Information security
fromTheregister
1 month ago

Microsoft OAuth scams abuse redirects for malware delivery

Microsoft warns of ongoing OAuth abuse scams using phishing emails and URL redirects to deliver malware and compromise organizational devices, primarily targeting government and public-sector entities.
#whatsapp
fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

fromThe Verge
2 months ago
Privacy technologies

WhatsApp's new 'lockdown' settings add another layer of protection against cyberattacks

fromTechCrunch
2 months ago
Privacy technologies

WhatsApp is rolling out a new stricter security setting to protect users from cyber attacts | TechCrunch

fromThe Verge
2 months ago
Privacy technologies

WhatsApp's new 'lockdown' settings add another layer of protection against cyberattacks

Information security
fromThe Hacker News
1 month ago

Microsoft Warns OAuth Redirect Abuse Delivers Malware to Government Targets

Microsoft warns of phishing campaigns exploiting OAuth redirect mechanisms to bypass email and browser defenses, targeting government and public-sector organizations to deliver malware without stealing credentials.
Privacy professionals
fromThe Hacker News
2 months ago

Filling the Most Common Gaps in Google Workspace Security

Prioritize hardened Google Workspace configurations—especially Gmail protections and access controls (MFA and beyond)—then augment native tooling where capabilities fall short.
#age-verification
Information security
fromSecurityWeek
2 months ago

Webinar Today: Identity Under Attack - Strengthen Your Identity Defenses

Adopt an identity-first security strategy to protect sensitive data, meet compliance requirements, and balance security, user experience, and operational efficiency against identity threats.
fromNieman Lab
1 month ago

Why "magic links" and passcodes are taking over news logins

Passwords get hacked all the time, but they can't be hacked if they don't exist...this allows a small team like 404 to spend less time managing security administration, and more time investing in bringing you stories you care about.
Privacy technologies
Information security
fromThe Hacker News
1 month ago

Malicious StripeApi NuGet Package Mimicked Official Library and Stole API Tokens

A malicious NuGet package named StripeApi.Net impersonated Stripe's legitimate library to steal financial sector developers' API tokens and sensitive data.
fromWIRED
1 month ago

Password Managers Share a Hidden Weakness

An FBI informant helped run the Incognito dark web market and allegedly approved the sale of fentanyl-laced pills, including those from a dealer linked to a confirmed death, WIRED reported this week. Meanwhile, Jeffrey Epstein's ties to Customs and Border Protection officers sparked a Department of Justice probe. Documents say that CBP officers in the US Virgin Islands were still friendly with Epstein years after his 2008 conviction, illustrating the infamous sex offender's tactics for cultivating allies.
Information security
fromLogRocket Blog
1 month ago

How to design 2FA: Comparing methods, user flows, and recovery strategies - LogRocket Blog

2FA or two-factor authentication is a specific type of multi-factor authentication. As the name suggests, 2FA requires two distinct forms of user verification factors to access a specific protected, registered user-only software system. In the past, software teams used only a one-factor authentication strategy with users' passwords, but nowadays, with growing security concerns and user authentication evolution, every digital product uses 2FA with password-based authentication, starting from simple SMS OTPs (One Time Tokens) to futuristic AI-powered adaptive 2FA methods and high-security hardware keys.
Information security
Information security
fromThe Hacker News
2 months ago

[Webinar] Securing Agentic AI: From MCPs and Tool Access to Shadow API Key Sprawl

Agentic AI that can execute code expands attack surface through Machine Control Protocols; securing MCPs, APIs, and shadow keys is essential to prevent automation-driven breaches.
#password-security
fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

fromFast Company
2 months ago
Information security

What if everything you think you know about passwords is wrong? Here's what really makes a strong password in 2026

Information security
fromKotaku
1 month ago

Hackers Raise The Alarm About Discord's Recent Age-Verification Partner - Kotaku

Persona's weak security enabled hackers to access biometric data and revealed extensive surveillance, including facial scanning against watchlists, raising privacy and government-collaboration concerns.
fromThe Hacker News
2 months ago

Password Reuse in Disguise: An Often-Missed Risky Workaround

Near-identical password reuse occurs when users make small, predictable changes to an existing password rather than creating a completely new one. While these changes satisfy formal password rules, they do little to reduce real-world exposure. Here are some classic examples: Adding or changing a number Summer2023! → Summer2024! Appending a character Swapping symbols or capitalization Welcome! → Welcome? AdminPass → adminpass Another common scenario occurs when organizations issue a standard starter password to new employees, and instead of replacing it entirely, users make incremental changes over time to remain compliant.
Information security
fromComputerworld
1 month ago

11 steps to smarter Google account security

While you're thinking about third-party add-ons for your computer and phone, take a moment to review everything you have installed on both fronts and consider how many of those programs you actually still use. The fewer cracked windows you allow on your Google account, the better - and if you aren't even using something, there's no reason to keep it connected.
Information security
fromThe Hacker News
1 month ago

Malicious npm Packages Harvest Crypto Keys, CI Secrets, and API Tokens

"The sample retains Shai-Hulud hallmarks and adds GitHub API exfiltration with DNS fallback, hook-based persistence, SSH propagation fallback, MCP server injection with embedded prompt injection targeting AI coding assistants, and LLM API Key harvesting," the company said. The packages, published to npm by two npm publisher aliases, official334 and javaorg, are listed below - Also identified are four sleeper packages that do not incorporate any malicious features -
Information security
Information security
fromEmptywheel
2 months ago

"Tor Stinks" ... because It Requires Manual (Digital) Tails

Tor resists systematic de-anonymization; NSA can de-anonymize only a very small fraction manually and cannot reliably combine Tor attacks with passive SIGINT.
fromDataBreaches.Net
2 months ago

Cloudflare whacks WAF bypass bug that opened side door for attackers - DataBreaches.Net

Cloudflare has fixed a flaw in its web application firewall (WAF) that allowed attackers to bypass security rules and directly access origin servers, which could lead to data theft or full server takeover. FearsOff security researchers reported the bug in October through Cloudflare's bug bounty program, and the CDN says it has patched the vulnerability in its ACME (Automatic Certificate Management Environment) validation logic with no action required from its customers.
Information security
Information security
fromTechRepublic
7 months ago

This 'Lethal Trifecta' Can Trick AI Browsers Into Stealing Your Data

AI-enabled browsers that combine web access, account access, and external communication can be exploited to steal accounts via hidden instructions in webpages.
[ Load more ]