In April 2021, Yubico announced “YK-VAL, YK-KSM and YubiHSM 1 End-of-Life”, referencing that the libraries used outdated/vulnerable technologies. As an alternative - ...
- Jeremy Cruz
- No Comment
SolarWinds Hack Highlights The Importance of Multi-Factor Authentication
A large-scale cyber-attack was confirmed earlier this week that includes breaches into United States federal government agencies. On Monday, SolarWinds confirmed that Orion ...
- Thomas
- No Comment
A GreenRADIUS Two-Factor Authentication Plugin for WordPress
Weak passwords and cross-site password reuse are two of the most common ways to break into a WordPress installation. Fortunately, WordPress plugins ...
- Jeremy Cruz
- No Comment
“Tycoon” Ransomware, Protection with GreenRADIUS MFA for RDP
A new ransomware has been uncovered by Blackberry that has been "in-the-wild" since at least December 2019. Named "Tycoon", it targets Windows and ...
- Kurt
- No Comment
Green Rocket Security introduces our GRS ADFS Plugin enabling MFA in ADFS environments
Microsoft ADFS (Active Directory Federation Service) offers a Single Sign On (SSO) solution to users for applications, services and resources inside the ...
- Thomas
- No Comment
2FA for GNOME Desktop for Linux
Did you know that the GNOME Desktop Manager supports two-factor authentication for protection? The GNOME Desktop Manager (GDM) performs its user authentication through ...
- Jeremy Cruz
- No Comment
YubiRADIUS No Longer Works With YubiCloud v1 Protocol
As Yubico announced a few months ago, Yubico is no longer supporting the YubiCloud v1 protocol. This took full effect on February ...
- Michael
- No Comment
Windows 2FA has never been so simple… until now
Finding an efficient and easy-to-deploy 2FA solution may be challenging today. Mostly, the challenge comes when looking for an authentication system with ...
- Kurt
- No Comment
2FA for Palo Alto Networks Firewalls in FIPS Mode Supported by GreenRADIUS
Palo Alto Networks (PAN) firewalls are FIPS-140-2 certified. FIPS certification is generally required for use of firewalls in the government space. Equally ...
- Jeremy Cruz
- No Comment
Fake phishing scheme shows the value of corporate data to hackers
A recent faux phishing scheme designed to track the activity of hackers accessing the "leaked" data confirms what we already know -- ...