Normal view

Received yesterday — 13 February 2026

Examples of SAML Providers

Explore top examples of SAML providers like Okta, Azure AD, and Ping Identity. Learn how to implement SAML SSO for secure enterprise identity management.

The post Examples of SAML Providers appeared first on Security Boulevard.

Demystifying SAML: The Basics of Secure Single Sign-On

Learn the basics of SAML authentication for Enterprise SSO. Understand IdP vs SP roles, XML assertions, and how to secure your B2B infrastructure effectively.

The post Demystifying SAML: The Basics of Secure Single Sign-On appeared first on Security Boulevard.

Understanding Authentication Methods

Deep dive into authentication methods for B2B. Learn about SAML, OIDC, FIDO2, and passwordless flows to secure your enterprise apps and prevent data breaches.

The post Understanding Authentication Methods appeared first on Security Boulevard.

Understanding WS-Trust: A Guide to Secure Token Exchange

Deep dive into WS-Trust for enterprise identity. Learn about STS, token exchange, and secure SSO integration for modern B2B platforms.

The post Understanding WS-Trust: A Guide to Secure Token Exchange appeared first on Security Boulevard.

RFC 4058 – Authentication Protocol Overview

A deep dive into RFC 4058 authentication protocols for software development. Learn about key management, security requirements, and modern ciam implementation.

The post RFC 4058 – Authentication Protocol Overview appeared first on Security Boulevard.

Received before yesterday

Is SSO the Same as SAML?

Confused about sso vs saml? Learn the difference between the authentication process and the XML-based protocol. Essential guide for engineering leaders and ctos.

The post Is SSO the Same as SAML? appeared first on Security Boulevard.

Login Instructions for Various Platforms

Learn how to implement and manage login instructions for various platforms using enterprise SSO, saml, and oidc to prevent data breach risks.

The post Login Instructions for Various Platforms appeared first on Security Boulevard.

How to Prevent Vishing Attacks Targeting Okta and other IDPs

11 February 2026 at 15:57

Vishing as the Front Door to MFA Bypass

Threat reporting tied to ShinyHunters and Scattered Spider-linked activity shows voice phishing (vishing) being operationalized as a coordinated access vector against enterprise identity systems.

Rather than relying solely on email-based phishing, attackers now call employees directly, impersonating IT support, security teams, or identity administrators. These calls are not random — they are tightly coupled with live phishing infrastructure and identity workflows.

The goal is not to “steal a password”; it is to walk the victim through a legitimate authentication event while the attacker intercepts the outcome.

This is why legacy MFA continues to “work,” yet organizations are still getting breached.

The post How to Prevent Vishing Attacks Targeting Okta and other IDPs appeared first on Security Boulevard.

SAML Development Guide

A comprehensive SAML development guide for engineering leaders. Learn about assertions, metadata, and securing single sign-on for enterprise CIAM.

The post SAML Development Guide appeared first on Security Boulevard.

What is User Management in Single Sign-on?

understand how user management integrates with single sign-on (SSO). learn about directory sync, saml, oidc, and managing identities for enterprise apps.

The post What is User Management in Single Sign-on? appeared first on Security Boulevard.

User-Managed Access (UMA) 2.0 Grant for OAuth Protocols

Deep dive into User-Managed Access (UMA) 2.0 grant. Learn how it enhances OAuth 2.0 for asynchronous, party-to-party authorization in enterprise CIAM.

The post User-Managed Access (UMA) 2.0 Grant for OAuth Protocols appeared first on Security Boulevard.

Visa Application Process: Costs and Requirements

A deep dive into the Visa Application Process: Costs and Requirements for developers and tech firms. Learn about B-1/H-1B fees, ds-160 filing, and security protocols.

The post Visa Application Process: Costs and Requirements appeared first on Security Boulevard.

Enabling and Securing Basic Authentication: A Comprehensive Guide

Learn how to enable and secure basic authentication for enterprise systems. Guide covers tls encryption, credential hygiene, and sso migration for ctos.

The post Enabling and Securing Basic Authentication: A Comprehensive Guide appeared first on Security Boulevard.

The Ultimate Guide to Single Sign-On in 2025

Master Enterprise SSO in 2025. Learn about SAML, OIDC, and CIAM strategies for CTOs and VP Engineering to secure B2B platforms and prevent data breach.

The post The Ultimate Guide to Single Sign-On in 2025 appeared first on Security Boulevard.

Single Sign-On with External Security Token Services

Learn how to implement Single Sign-On with External Security Token Services (STS). A deep dive into SAML, OIDC, and token exchange for CTOs and VP Engineering.

The post Single Sign-On with External Security Token Services appeared first on Security Boulevard.

The Future of Single Sign-on: Insights for 2025

Explore the evolution of Enterprise SSO and CIAM in 2025. Insights on SAML, passwordless authentication, and developer-first IAM solutions for CTOs.

The post The Future of Single Sign-on: Insights for 2025 appeared first on Security Boulevard.

Is the Online Account Service Still Available?

Struggling with auth downtime? Learn why your online account service might be failing and how to implement Enterprise SSO and CIAM for 99.9% availability.

The post Is the Online Account Service Still Available? appeared first on Security Boulevard.

Configuring WS-Federation Single Sign-on for Resources

Learn how to configure WS-Federation SSO for enterprise resources. A deep dive into identity delegation, claim mapping, and securing legacy apps for engineering leaders.

The post Configuring WS-Federation Single Sign-on for Resources appeared first on Security Boulevard.

ShinyHunters Leads Surge in Vishing Attacks to Steal SaaS Data

2 February 2026 at 11:39
credentials EUAC CUI classified secrets SMB

Several threat clusters are using vishing in extortion campaigns that include tactics that are consistent with those used by high-profile threat group ShinyHunters. They are stealing SSO and MFA credentials to access companies' environments and steal data from cloud applications, according to Mandiant researchers.

The post ShinyHunters Leads Surge in Vishing Attacks to Steal SaaS Data appeared first on Security Boulevard.

Why Gen Z is Ditching Smartphones for Dumbphones

2 February 2026 at 00:00

Younger generations are increasingly ditching smartphones in favor of “dumbphones”—simpler devices with fewer apps, fewer distractions, and less tracking. But what happens when you step away from a device that now functions as your wallet, your memory, and your security key? In this episode, Tom and Scott explore the dumbphone movement through a privacy and […]

The post Why Gen Z is Ditching Smartphones for Dumbphones appeared first on Shared Security Podcast.

The post Why Gen Z is Ditching Smartphones for Dumbphones appeared first on Security Boulevard.

💾

The Complete Guide to Authentication Implementation for Modern Applications

A comprehensive developer guide to implementing secure authentication in modern applications. Covers OAuth 2.0, OIDC, passwordless authentication, passkeys, and enterprise SSO with production-ready code examples.

The post The Complete Guide to Authentication Implementation for Modern Applications appeared first on Security Boulevard.

💾

10 Best B2B Fintech SSO Solutions in 2026

Discover the best B2B fintech SSO solutions for 2026. Compare SAML, SCIM, SOC2-ready identity providers built for enterprise fintech needs.

The post 10 Best B2B Fintech SSO Solutions in 2026 appeared first on Security Boulevard.

How to Resolve Invalid Security Token Issues

Learn how to debug and fix invalid security token errors in Enterprise SSO, SAML, and CIAM systems. Practical tips for CTOs and VPs of Engineering.

The post How to Resolve Invalid Security Token Issues appeared first on Security Boulevard.

Are Passkeys Safely Synced Across Multiple Devices?

Explore the security of passkey synchronization. Learn how end-to-end encryption and cloud providers keep passwordless authentication secure across devices.

The post Are Passkeys Safely Synced Across Multiple Devices? appeared first on Security Boulevard.

What is SAML and how does SAML Authentication Work?

Deep dive into SAML 2.0 architecture for enterprise SSO. Learn how IdPs and SPs exchange XML assertions for secure B2B authentication and CIAM.

The post What is SAML and how does SAML Authentication Work? appeared first on Security Boulevard.

Single Sign-on Community Help Resources

Discover top community help resources for Single Sign-on, CIAM, and enterprise authentication. Learn where CTOs and VPs of Engineering find technical support.

The post Single Sign-on Community Help Resources appeared first on Security Boulevard.

Methods for Authenticating Devices on a Network

Explore different methods for authenticating devices on a network, from hardware addresses to advanced certificate-based systems for developers.

The post Methods for Authenticating Devices on a Network appeared first on Security Boulevard.

Single Sign-on Account Management in App Stores

Learn how to manage Single Sign-on (SSO) account identities within app stores for enterprise security. Guide for CTOs on OIDC, SAML, and CIAM integration.

The post Single Sign-on Account Management in App Stores appeared first on Security Boulevard.

Top Authentication Methods for Preventing Data Breaches

Authentication determines who gets in and who stays out. Getting this right means fewer breaches, less downtime, and stronger trust with customers.

The post Top Authentication Methods for Preventing Data Breaches appeared first on Security Boulevard.

💾

Infostealers and Lack of MFA Led to Dozens of Major Breaches

7 January 2026 at 15:31

Infostealers and Lack of MFA Led to Dozens of Major Breaches

Infostealer infections compounded by a lack of multi-factor authentication (MFA) have resulted in dozens of breaches at major global companies and calls for greater MFA use. The issue came to light in a Hudson Rock post that detailed the activity of a threat actor operating under the aliases “Zestix” and “Sentap.” The threat actor has auctioned data stolen from the corporate file-sharing portals of roughly 50 major global enterprises, targeting ShareFile, OwnCloud, and Nextcloud instances “belonging to critical entities across the aviation, robotics, housing, and government infrastructure sectors,” the report said, taking pains to note that lack of MFA was the primary cause. “... these catastrophic security failures were not the result of zero-day exploits in the platform architecture, but rather the downstream effect of malware infections on employee devices combined with a critical failure to enforce Multi-Factor Authentication (MFA),” the report said. Cyble’s threat intelligence database contains 56 dark web reports and client advisories on Zestix and Sentap going back to mid-2024, and the threat actor appears be connected to a significantly older X/Twitter account, according to a May 2025 Cyble profile. DarkSignal recently did an extensive profile of the threat actor.

Infostealers and No MFA Make Attacks Easy

The Hudson Rock report looked at 15 data breaches claimed by Zestix/Sentap and noted a common attack flow:
  • Infection: “An employee inadvertently downloads a malicious file. The infostealer executes and harvests all saved credentials and browser history.”
  • Aggregation: “These logs are aggregated in massive databases on the dark web. Zestix parses these logs specifically looking for corporate cloud URLs (ShareFile, Nextcloud).”
  • Access: “Zestix simply uses the valid username and password extracted from the logs. Because the organizations listed below did not enforce MFA, the attacker walks right in through the front door. No exploits, no cookies – just a password.”
“The era where brute-force attacks reigned supreme is waning,” the report said. “In its place, the Infostealer ecosystem has risen to become the primary engine of modern cybercrime. “Contrary to attacks involving sophisticated cookie hijacking or session bypasses, the Zestix campaign highlights a far more pedestrian – yet equally devastating – oversight: The absence of Multi-Factor Authentication (2FA).” Zestix relies on Infostealer malware such as RedLine, Lumma, or Vidar to infect personal or professional devices – and sometimes the gap between malware infection and exploitation is a long one, as old infostealer logs have led to new cyberattacks in some cases. “A critical finding in this investigation is the latency of the threat,” Hudson Rock said. “While some credentials were harvested from recently infected machines, others had been sitting in logs for years, waiting for an actor like Zestix to exploit them. This highlights a pervasive failure in credential hygiene; passwords were not rotated, and sessions were never invalidated, turning a years-old infection into a present-day catastrophe.”

ownCloud Calls for Greater MFA Use

ownCloud responded to the report with a call for greater MFA use by clients. In a security advisory, the company said, “The ownCloud platform was not hacked or breached. The Hudson Rock report explicitly confirms that no zero-day exploits or platform vulnerabilities were involved.” Stolen credentials from infostealer logs were "used to log in to ownCloud accounts that did not have Multi-Factor Authentication (MFA) enabled. As the report notes: ‘No exploits, no cookies—just a password.’” ownCloud said clients should immediately enable MFA on their ownCloud instances if they haven’t done so already. “MFA adds a critical second layer of verification that prevents unauthorized access even when credentials are compromised,” the company said. Recommended steps include:
  • Enabling MFA on all user accounts using ownCloud’s two-factor authentication apps
  • Resetting passwords for all users and requiring “strong, unique credentials”
  • Reviewing access logs for suspicious activity
  • Invalidating active sessions to force re-authentication with MFA
 

Critical IBM API Connect Vulnerability Enables Authentication Bypass

IBM API Connect

IBM has released security updates to address a critical IBM API Connect vulnerability that could allow remote attackers to bypass authentication controls and gain unauthorized access to affected applications. The flaw, tracked as CVE-2025-13915, carries a CVSS 3.1 score of 9.8, placing it among the most severe vulnerabilities disclosed in recent months. According to IBM, the IBM API Connect vulnerability impacts multiple versions of the platform and stems from an authentication bypass weakness that could be exploited remotely without any user interaction or prior privileges. Organizations running affected versions are being urged to apply fixes immediately to reduce exposure.

CVE-2025-13915: IBM API Connect Authentication Bypass Explained

The vulnerability has been classified under CWE-305: Authentication Bypass by Primary Weakness, indicating a failure in enforcing authentication checks under certain conditions. IBM said internal testing revealed that the flaw could allow an attacker to circumvent authentication mechanisms entirely. The CVSS vector (CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H) highlights the seriousness of the issue. The attack can be carried out over the network, requires low attack complexity, and does not depend on user interaction. If exploited, it could result in a complete compromise of confidentiality, integrity, and availability within the affected IBM API Connect environment. IBM warned that a successful attack could grant unauthorized access to API Connect applications, potentially exposing sensitive data and backend services managed through the platform.

Affected IBM API Connect Versions

The IBM API Connect vulnerability affects specific versions within the 10.x release series. IBM confirmed that the following product versions are impacted:
  • IBM API Connect V10.0.8.0 through V10.0.8.5
  • IBM API Connect V10.0.11.0
API Connect is widely deployed in enterprise environments to manage APIs, control developer access, and secure integrations between internal and external services. As a result, vulnerabilities in the platform can have cascading effects across connected systems.

IBM Releases Fixes for IBM API Connect Vulnerability

To remediate CVE-2025-13915, IBM has issued interim fixes (iFixes) for all affected versions and strongly recommends that customers upgrade without delay. For the 10.0.8.x branch, fixes have been released for each affected sub-version, including 10.0.8.1, 10.0.8.2 (iFix1 and iFix2), 10.0.8.3, 10.0.8.4, and 10.0.8.5. IBM has also provided an interim fix for IBM API Connect V10.0.11.0. IBM emphasized that upgrading to the remediated versions is the most effective way to eliminate the authentication bypass risk associated with this vulnerability.

Workarounds and Mitigations for Unpatched Systems

For organizations unable to apply the fixes immediately, IBM has outlined a temporary mitigation to reduce risk. Administrators are advised to disable self-service sign-up on the Developer Portal, if that feature is enabled. While this measure does not fully address the IBM API Connect authentication bypass vulnerability, IBM said it can help minimize exposure until patching is completed. The company cautioned that workarounds should only be used as a short-term solution.

Why the IBM API Connect Vulnerability Matters

Authentication bypass vulnerabilities are particularly dangerous because they undermine one of the most fundamental security controls in enterprise applications. In API-driven environments, such flaws can provide attackers with a direct path to sensitive services, data stores, and internal systems. The vulnerability was published in the National Vulnerability Database (NVD) on December 26, 2025, and last updated on December 31, 2025, with IBM listed as the CNA and source. Given the critical severity rating, security teams are expected to prioritize remediation and review API access logs for any signs of unauthorized activity. Organizations running affected versions of IBM API Connect are urged to assess their deployments immediately and apply the recommended fixes to prevent potential exploitation.

Account Takeover Scams Surge as FBI Reports Over $262 Million in Losses

26 November 2025 at 00:34

Account Takeover fraud

The Account Takeover fraud threat is accelerating across the United States, prompting the Federal Bureau of Investigation (FBI) to issue a new alert warning individuals, businesses, and organizations of all sizes to stay vigilant. According to the FBI Internet Crime Complaint Center (IC3), more than 5,100 complaints related to ATO fraud have been filed since January 2025, with reported losses exceeding $262 million. The bureau warns that cyber criminals are increasingly impersonating financial institutions to steal money or sensitive information. As the annual Black Friday sale draws millions of shoppers online, the FBI notes that the surge in digital purchases creates an ideal environment for Account Takeover fraud. With consumers frequently visiting unfamiliar retail websites and acting quickly to secure limited-time deals, cyber criminals deploy fake customer support calls, phishing pages, and fraudulent ads disguised as payment or discount portals. The increased online activity during Black Friday makes it easier for attackers to blend in and harder for victims to notice red flags, making the shopping season a lucrative window for ATO scams.

How Account Takeover Fraud Works

In an ATO scheme, cyber criminals gain unauthorized access to online financial, payroll, or health savings accounts. Their goal is simple: steal funds or gather personal data that can be reused for additional fraudulent activities. The FBI notes that these attacks often start with impersonation, either of a financial institution’s staff, customer support teams, or even the institution’s official website. To carry out their schemes, criminals rely heavily on social engineering and phishing websites designed to look identical to legitimate portals. These tactics create a false sense of trust, encouraging account owners to unknowingly hand over their login credentials.

Social Engineering Tactics Increase in Frequency

The FBI highlights that most ATO cases begin with social engineering, where cyber criminals manipulate victims into sharing sensitive information such as passwords, multi-factor authentication (MFA) codes, or one-time passcodes (OTP). Common techniques include:
  • Fraudulent text messages, emails, or calls claiming unusual activity or unauthorized charges. Victims are often directed to click on phishing links or speak to fake customer support representatives.
  • Attackers posing as bank employees or technical support agents who convince victims to share login details under the guise of preventing fraudulent transactions.
  • Scenarios where cyber criminals claim the victim’s identity was used to make unlawful purchases—sometimes involving firearms, and escalate the scam by introducing another impersonator posing as law enforcement.
Once armed with stolen credentials, criminals reset account passwords and gain full control, locking legitimate users out of their own accounts.

Phishing Websites and SEO Poisoning Drive More Losses

Another growing trend is the use of sophisticated phishing domains and websites that perfectly mimic authentic financial institution portals. Victims believe they are logging into their bank or payroll system, but instead, they are handing their details directly to attackers. The FBI also warns about SEO poisoning, a method in which cyber criminals purchase search engine ads or manipulate search rankings to make fraudulent sites appear legitimate. When victims search for their bank online, these deceptive ads redirect them to phishing sites that capture their login information. Once attackers secure access, they rapidly transfer funds to criminal-controlled accounts—many linked to cryptocurrency wallets—making transactions difficult to trace or recover.

How to Stay Protected Against ATO Fraud

The FBI urges customers and businesses to take proactive measures to defend against ATO fraud attempts:
  • Limit personal information shared publicly, especially on social media.
  • Monitor financial accounts regularly for missing deposits, unauthorized withdrawals, or suspicious wire transfers.
  • Use unique, complex passwords and enable MFA on all accounts.
  • Bookmark financial websites and avoid clicking on search engine ads or unsolicited links.
  • Treat unexpected calls, emails, or texts claiming to be from a bank with skepticism.

What To Do If You Experience an Account Takeover

Victims of ATO fraud are advised to act quickly:
  1. Contact your financial institution immediately to request recalls or reversals, and report the incident to IC3.gov.
  2. Reset all compromised credentials, including any accounts using the same passwords.
  3. File a detailed complaint at IC3.gov with all relevant information, such as impersonated institutions, phishing links, emails, or phone numbers used.
  4. Notify the impersonated company so it can warn others and request fraudulent sites be taken down.
  5. Stay informed through updated alerts and advisories published on IC3.gov.
❌