article thumbnail

How to enable 2FA for groups in Nextcloud

Tech Republic Security

Nextcloud allows you to enforce groups to use two-factor authentication. Let's find out how to create a group and then add them to 2FA enforcement.

Groups 380
article thumbnail

Okta authentication company’s customer data targeted by the Lapsus$ gang

Tech Republic Security

The Lapsus$ cybercriminal group exposed screenshots and messages showing it had successfully breached identify platform Okta. The post Okta authentication company’s customer data targeted by the Lapsus$ gang appeared first on TechRepublic. Read about it and see how to protect yourself from this threat.

Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Chinese cyber espionage growing across all industry sectors

CIO Business Intelligence

Researchers at the firm also identified seven new Chinese-origin cyber espionage groups in 2024, many of which exhibited specialized targeting and toolsets. The report also highlighted that Chinese groups continue to share malware tools a long-standing hallmark of Chinese cyber espionage with the KEYPLUG backdoor serving as a prime example.

Industry 330
article thumbnail

More than one-third of cloud environments are critically exposed, says Tenable

Network World

End-user organizations have their part in the blame for this, said Jeremy Roberts, senior research director at Info-Tech Research Group, and unconnected with the study. This situation is in part down to human nature, according to Scott Young, principal advisory director at Info-Tech Research Group.

Cloud 505
article thumbnail

How to enable 2FA for groups in Nextcloud

Tech Republic Security

Nextcloud allows you to enforce groups to use two-factor authentication. Let's find out how to create a group and then add them to 2FA enforcement.

Groups 303
article thumbnail

Red Hat unveils Kubernetes connectivity solution to tame multi-cloud chaos

Network World

For example, it is role oriented, which will allow cluster operators to define how shared infrastructure can be used by many different groups, Ferreira noted. That said, Ferreira argued that the Gateway API is much more than just a new ingress controller standard. The Gateway API also has more expressiveness, according to Ferreira.

Cloud 474
article thumbnail

Uber exposes Lapsus$ extortion group for security breach

Tech Republic Security

The post Uber exposes Lapsus$ extortion group for security breach appeared first on TechRepublic. In last week’s security breach against Uber, the attackers downloaded internal messages from Slack as well as information from a tool used to manage invoices.

Groups 384