New Open-Source Phishing Tools: IsThisLegit and Phinn
We're excited to announce two new open-source tools designed to help administrators prevent, manage, and respond to phishing attacks against their organization - IsThisLegit and Phinn.
We're excited to announce two new open-source tools designed to help administrators prevent, manage, and respond to phishing attacks against their organization - IsThisLegit and Phinn.
Organizations are exploring how to gain a competitive advantage by integrating information security and privacy with their business strategy, according to a 2017 cybersecurity report from PricewaterhouseCoopers (PwC).
A Gmail phishing attack leveraging OAuth spread quickly to multiple users. Learn what made this attack incredibly successful, as well as ways to protect yourself or your employees.
An attacker can send phishing dialogs to users by writing a few lines of AppleScript, effectively allowing them to steal Apple ID or local user account credentials. Here’s our technical overview of the dangers of AppleScript.
Learn more about the Center for Internet Security’s Security Controls. In this blog, I cover the first control, Inventory of Authorized and Unauthorized Devices in more detail.
Here are 14 remarkable founders, hackers, academics, executives, and investors in cybersecurity you should know.
Learn more about Duo’s integration with Intel to bring hardware-free U2F technology to users as a strong method of two-factor authentication.
How Google secured the perimeterless enterprise with BeyondCorp, and how Duo is now offering this new model of security to organizations everywhere.
Duo’s MSP program ended Year 1 with a bang! Now it’s easier for you to generate recurring revenue by offering multi-factor authentication as a service.
In late July, the U.S. National Institute of Standards and Technology (NIST) declared that SMS-based authentication methods will no longer be considered secure.