OneLogin Bug Let Attackers Use API Keys to Steal OIDC Secrets and Impersonate Apps
Oct 01, 2025Ravie LakshmananVulnerability / API Security A high-severity security flaw has…
How to Gain Control of AI Agents and Non-Human Identities
We hear this a lot: "We've got hundreds of service accounts and…
The Wild West of Shadow IT
Everyone's an IT decision-maker now. The employees in your organization can install…
Watch This Webinar to Uncover Hidden Flaws in Login, AI, and Digital Trust — and Fix Them
Jul 24, 2025The Hacker News Is Managing Customer Logins and Data Giving…
Microsoft Removes Password Management from Authenticator App Starting August 2025
Jul 01, 2025Ravie LakshmananMobile Security / Privacy Microsoft has said that it's…
A Pragmatic Approach To NHI Inventories
Identity-based attacks are on the rise. Attacks in which malicious actors assume…
nOAuth Vulnerability Still Affects 9% of Microsoft Entra SaaS Apps Two Years After Discovery
Jun 25, 2025Ravie LakshmananSaaS Security / Vulnerability New research has uncovered continued…
FedRAMP at Startup Speed: Lessons Learned
Jun 18, 2025The Hacker NewsDevSecOps / Security Architecture For organizations eyeing the…
Why Non-Human Identity Management is the Next Cybersecurity Frontier
Modern enterprise networks are highly complex environments that rely on hundreds of…