Solutions
Resources
Partners
Company
Contact
EN
FR
Solutions
Passwordless Authentication
Passwordless SSO
Password Management
Next-Gen MFA
Resources
Resource Center
Guides
Data Sheets & Briefs
Blog
Events
White Papers & eBooks
Partners
Partner Program
NFR Program
Partner Portal
Company
About Us
Careers
Contact
Contact
Login
Login
Login
User portal
Admin Dashboard
Get started free
Get started free
Guides
Learn more about next-gen passwordless authentication and the evolving IAM space
Resource Center
Guides
Data Sheets & Briefs
Blog
Events
White Papers & eBooks
< 10 min read
Cyberattack
Man-in-the-Middle Attacks: Risks, Detection, and Defense Strategy
A Man-in-the-Middle (MitM) attack — also known as an on-path attack — occurs when an attacker inserts themselves between two communicating parties. The attacker then intercepts the messages flowing between...
< 10 min read
Cyberattack
Session Hijacking: Unauthorized Control
Websites use the concept of sessions to track a user’s identity as they browse through the site. Without sessions, a user would have to authenticate to each page of a restricted site, which would negatively impact the user experience...
< 9 min read
Cyberattack
WiFi Snooping: Unauthorized Network Surveillance
Wireless networks provide a convenient way to access the Internet. Instead of plugging a computer or phone into a physical network, it’s possible to enter a network’s SSID and (optional) password and connect via WiFi...
< 8 min read
Cyberattack
SSL Stripping: Downgrading Encryption
In recent years, the Internet has increasingly been moving to use encrypted HTTPS for web browsing. In fact, over 90% of web browsing uses HTTPS instead of insecure HTTP. The reason for this trend is that...
< 9 min read
Password Attack
Shoulder Surfing: Stealing Secrets in Plain Sight
In today’s digital world, the passwords and codes people use to access accounts and apps are vulnerable in many ways; one of those ways is shoulder surfing in which malicious individuals observe sensitive...
< 10 min read
Cyberattack
What is DNS Spoofing? Full Guide
The Domain Name System (DNS) is a critical part of the Internet’s infrastructure. It is responsible for converting domain names (like kzero.com) into IP addresses...
< 9 min read
Authentication
What is Single Sign-On (SSO) and How Does It Work?
Single Sign-On (SSO) authentication is a technology that enables a user to authenticate just once and then allows that user access to multiple applications and/or services. While this function seems to indicate that SSO is built...
< 10 min read
Cyberattack
ARP Poisoning: Network Manipulation
A computer has a few different addresses associated with it. A computer will have IP addresses associated with the network(s) that it is connected to. It also has a hardware or MAC address assigned to each...
< 10 min read
Cyberattack
Password Spraying: Strengthening Authentication and User Security
While many online services have upped their game in terms of requiring users to create strong passwords, threat actors frequently hack into accounts using password-based attacks...
< 11 min read
Authentication
Exploring Single Factor Authentication: An In-Depth Overview
Single factor authentication (SFA) is any kind of authentication that only uses one authentication factor. That factor may be something you know, something you have, or something you are. In the early days of...
< 10 min read
Cyberattack
Keylogging: Surveillance and Protecting Sensitive Data
Keylogging is a form of surveillance and data theft. It's designed to 1) spy on users when they enter login credentials and 2) steal those credentials. Once the credentials have been obtained, the...
< 12 min read
Authentication
Multi-Factor Authentication: Comprehensive Guide
Multi-Factor authentication (MFA) is any kind of authentication method that uses two or more authentication factors. Authentication factors may include something you know, something you have,
< 10 min read
Cyberattack
Distributed Denial of Service (DDoS) Attacks: Characteristics and Mitigation
A Distributed Denial of Service (DDoS) attack is performed by a botnet and tries to take down a target system. Several computers will bombard the victim with large volumes of spam traffic with the goal...
< 11 min read
Cyberattack
Exploring Malware: Types, Distribution Methods, and Defense Strategies
Malware is a portmanteau of malicious software. Malware can be designed to achieve various purposes, such as stealing data, sabotaging operations, or providing unauthorized access to computer systems...
< 16 min read
Authentication
Biometric Authentication: Exploring the Various Types
Biometric authentication has fast become one of the most commonly used and accepted methods of authentication. It uses specific characteristics of a person, such as facial features, voice, and fingerprints, to validate one’s identit...
< 9 min read
Cyberattack
Dictionary Attack: Cracking Passwords with Words
A dictionary attack is a method used by hackers to breach user accounts by systematically entering each word from a compiled list of common words and popular combinations that people often...
< 9 min read
Cyberattack
Social Media Phishing: Staying Safe in the Age of Social Engineering
The hyperconnected modern society sparked by social media platforms comes with arguably as many downsides as upsides. One of these drawbacks relates to cybercrime and how threat actors increasingly exploit trust...
< 10 min read
Cyberattack
Clone Phishing: Identifying and Avoiding Duplicate Email Scams
Most people are well aware of the classic phishing scams by now: the Nigerian prince, the lottery they never entered, the estranged relative leaving behind a fortune. Clone phishing, though, is a different beast...
< 8 min read
Cyberattack
Adware: Malicious Ads and Prevention Methods
Adware, or advertising-supported software, is software designed to deliver ads to users. While these ads can be designed to generate revenue for a developer, the term is frequently used to describe a type of malware that profits an attacker or installs...
< 14 min read
Cyberattack
Botnets: Covert Networks and Countermeasures
Botnets are responsible for many large-scale cyber attacks. That includes Distributed Denial of Service (DDoS) attacks and spam/phishing campaigns. They're also behind credential-stuffing...
< 12 min read
Cyberattack
Watering Hole Attacks: Exploiting Trusted Websites for Cyber Intrusion
A watering hole attack is a cunning type of cyber intrusion that involves compromising trusted websites to deliver malicious payloads to its visitors. This attack draws inspiration from watering holes in the natural world...
< 10 min read
Cyberattack
Vishing: Voice-Based Phishing Attacks and Prevention Strategies
At their core, all social engineering tactics exploit psychological principles to manipulate individuals into taking certain actions or divulging confidential information. Vishing, or voice-based phishing, leverages the trust that people tend...
< 8 min read
Cyberattack
Spear Phishing: Targeted Deception in the Digital Age
< 8 min read
Cyberattack
Smishing: Understanding SMS-based Phishing Threats
SMS phishing or smishing is a social engineering attack that uses SMS to send phishing messages to a user. Often, these messages are designed to induce a user to click on a link that takes them to a phishing site...
< 17 min read
Cyberattack
Types of Phishing Attacks: Detection and Prevention
A joint law enforcement sting coordinated by Interpol brought down the notorious phishing-as-a-service platform ‘16shop’ in August 2023. Exemplifying the extent of the threat posed by phishing attacks...
< 10 min read
Cyber Security
Blockchain Security: Protecting Distributed Ledger Technology
Blockchain technology - and more generally distributed ledger technology - has rapidly gained adoption and investment in recent years. Blockchain-based solutions such as Decentralized Finance (DeFi) have reached...
< 9 min read
Cyberattack
Spyware: Silent Intruders and Mitigation Techniques
The word spyware is a portmanteau of spying and malware. In essence, spyware is a malicious program designed to collect various sensitive information from a user’s device. This data may be login credentials, personal...
< 9 min read
Cyberattack
Whaling Phishing: Protecting High-Level Executives from Targeted Attacks
Whaling attacks take phishing techniques and target the “big fish” in the organization (hence the name). These attacks use deception, manipulation, and similar techniques to trick high-level executives into doing something that...
< 14 min read
Cyberattack
Business Email Compromise: Detecting and Preventing Email Fraud
Business Email Compromise (BEC) is a sophisticated social engineering attack in which cybercriminals impersonate executives, employees, or business partners by using, compromising, or spoofing their...
< 14 min read
Cyber Security
Enterprise Cybersecurity: Effective Strategies for Threat Prevention
< 14 min read
Authentication
API Authentication: An Overview of Securing API Access
API authentication is the process of verifying the identities of users, individual devices, or platforms seeking access to APIs (Application Programming Interface). It acts as a digital guardian, protecting the...
< 15 min read
Authentication
Understanding SAML Authentication: A Comprehensive Overview
Most of the time, when browsing the web, we’re not communicating with one website and its services at a time but with several. Often, this happens behind the scenes to make life easier for users and for the many companies that provide services to them...
< 13 min read
Authentication
Token Authentication: Secure Authorization Mechanisms
In today’s digital landscape, the need for strong authentication mechanisms is a critical component of sound organizational cybersecurity. Think of it as the first line of defense in safeguarding the invaluable resource of sensitive data...
< 11 min read
Authentication
Adaptive Authentication: A Practical Guide
Passwordless-based authentication has a lot of advantages and is the underpinning of any robust cybersecurity program. While it's far more secure than using passwords to access important information, it can be burdensome for employees to learn a new...
< 17 min read
Authentication
Understanding Password Authentication from A to Z
Password-based authentication protocols are established series of steps and processes that use passwords to verify the identity of someone accessing a service or resource...
< 8 min read
Authentication
Gait Recognition: The Unique Biometric Trait for User Verification
Biometrics is an increasingly popular form of biometric authentication. Instead of using something that a user knows or has to identify them, biometrics uses something unique to them as a person. Many forms of biometric authentication...
< 11 min read
Authentication
Two-Factor Authentication Unveiled
We’ve all seen the headlines in the past couple of years. Large companies get hacked, data breaches occur daily, and users run the risk of having their data exposed—often having to face financial consequences for the lack of security...
< 13 min read
Authentication
Fingerprint Biometrics: Understanding Biometric Authentication
Fingerprint biometrics verify user identities when logging into a system by using the unique patterns of whirls and loops that distinguish a person's fingerprints. As a biometric authentication method,...
< 10 min read
Authentication
CAPTCHA: Human Verification in Online Interactions
Most of you reading this article will have already stumbled upon CAPTCHA, just think back on that bus or stop sign you had to identify to prove that you are a human. But what’s behind this digital test and how...
< 10 min read
Authentication
Voice Recognition: Advancements in Biometric Authentication
Everyone has a different voice. Each person’s voice includes a unique set of pitches, tones, frequencies, and other attributes. This is what makes it possible to recognize the voice of someone that you know...
< 22 min read
Authentication
Types of Authentication: Comprehensive Guide
< 8 min read
Authentication
Out of Band Authentication: An Overview of Alternate Verification Channels
Out-of-band authentication (OOBA) requires signals from two different communication channels. For example, imagine that an employee in the finance department receives an email claiming to be from the CEO that instructs them to...
Categories:
All
All
Authentication
Authentication
Cyber Security
Cyber Security
Cyberattack
Cyberattack
Password Attack
Password Attack
Share the page: