SolarView Critical Authentication Vulnerability

SolarView Critical Authentication Vulnerability

Security researchers have discovered the exploitation of vulnerabilities in the SolarView Series, an industrial control systems (ICS) hardware widely used for monitoring solar power generation and storage. The vulnerability tracked…
PyPi adds 2FA for its Critical repositories

PyPi adds 2FA for its Critical repositories

The PyPI is rolling out two-factor authentication for “critical projects” in the form of physical security keys. The repository is distributing 4,000 Titan Security Keys sponsored by Google’s open-source security…
Authentication Bypass – NetGear Switches

Authentication Bypass – NetGear Switches

Networking, storage and security solutions provider Netgear issued patches to address three security vulnerabilities affecting its smart switches that could be abused by an adversary to gain full control of a…
GIT Operations Need 2FA

GIT Operations Need 2FA

GitHub is urging its base of users to enable two-factor authentication as the platform shakes up how it protects accounts from compromise.GitHub stopped accepting account passwords when authenticating Git operations.…
Message Mirroring Threat

Message Mirroring Threat

Recent study highlighted more than 80% of all hacking-related breaches happen due to compromised and weak credentials, with three billion username/password combinations stolen.The implementation of two-factor authentication (2FA) has become…