#sso

2026-02-05

Redis больше не нужен?! Реализуем реактивный кэш на чистом PostgreSQL и Go

Привет, Хабр! 👋 В современной разработке мы привыкли решать проблемы производительности стандартным набором инструментов. "База не тянет? Поставь Redis!" — это стало почти рефлексом. Но всегда ли оправдано тащить в инфраструктуру лишний сервис, настраивать сетевые хопы и следить за инвалидацией, если ваша задача — это всего лишь быстрый доступ к небольшому справочнику? В нашем Open Source проекте BMSTU-ITSTECH/SSO мы столкнулись именно с таким кейсом. И решение оказалось элегантнее, чем просто "поднять Redis". Рассказываю, как мы сэкономили на инфраструктуре и получили мгновенный отклик, используя скрытую мощь PostgreSQL LISTEN/NOTIFY .

habr.com/ru/articles/992990/

#go #postgresql #redis #кеширование #inmemory_cache #sso #базы_данных #golang #sql #микросервисы

2026-02-02

Part of my work ritual is giving the ol' work laptop a refresh, which means shutting it down completely and powering it back on. But then it runs like slow ass, so I have to give it a reboot and then it's fine. Then once I log in with 853 times to get authenticated I'm off and running!

Gotta love .

Stefan 'stelb' Le Breton 🇪🇺🇺🇦💚stelb
2026-02-01

Turned on SSO for vaultwarden.
I forgot, that the passkey for SSO was in vaultwarden only. Shot myself in the foot. Fixable, but I simply fogot that 😅
I have added hw keys too now ;)

2026-01-30

Match Group confirmed a security incident involving limited user data exposure following unauthorized access via a compromised SSO account.

The company reports no evidence of credential theft, financial data exposure, or private message access. Researchers note this incident aligns with a broader trend of social-engineering-driven access rather than exploitation of technical vulnerabilities.

How are organizations hardening identity systems against vishing and phishing?

Source: bleepingcomputer.com/news/secu

Follow TechNadu for unbiased InfoSec reporting.

#InfoSec #IdentitySecurity #PhishingResistance #SSO #MFA #CyberRisk #DataProtection

Match Group breach exposes data from Hinge, Tinder, OkCupid, and Match
Dawn Tåke 🌙 :sparkletrans:Tourma@tech.lgbt
2026-01-30

So, our library is adopting a #PasswordManager. Not only for our own stuff, (though more and more of that is falling into our SSO,) but also for system or branch wide things so we don't need them written in drawers. This will also (hopefully,) end having to redo our passwords every 6 months. Between SSO and MFA, we're finally starting to modernize.

Maybe I'll be able to stop using Firefox Synch entirely!

I have my own password manager on my work computer that isn't web based for my own accounts, figuring that would be harder to get into than Firefox Synch. Still going to keep that.

They did say they'd also pay for personal accounts with the password manager company for us while we're employees. While a nice perk, the though of having to change or pay after I quit/retire sounds like a pain in the butt, and also, I don't know if this gives them any privilege into looking at my personal logins. That's why I went away from everything in FfS.

#Libraries #TourmaLibrarian #Security #SSO #MFA #2FA

Teddy / Domingo (🇨🇵/🇬🇧)TeddyTheBest@framapiaf.org
2026-01-29

#Fortinet Confirms New #zeroday Behind Malicious SSO Logins. To stop the ongoing attacks, the #cybersecurity vendor took the drastic step of temporarily disabling #FortiCloud single sign-on (#SSO) authentication for all devices.
darkreading.com/vulnerabilitie

Kevin Karhan :verified:kkarhan@infosec.space
2026-01-29
2026-01-28

It's been a busy 24 hours in the cyber world with significant updates on active exploitation of zero-days, widespread cyberattacks from sophisticated threat actors, and important discussions around data privacy and government initiatives. Let's dive in:

Recent Cyber attacks or breaches

ShinyHunters' SSO Vishing Spree Continues ⚠️
- The ShinyHunters group is actively targeting around 100 organisations, including major players like Canva, Atlassian, Epic Games, and Panera Bread, using evolved voice-phishing (vishing) techniques to compromise Okta, Microsoft, and Google SSO credentials.
- These attacks involve real-time phishing kits that mimic legitimate login pages and MFA requests, tricking employees into providing credentials and enrolling threat actor-controlled devices into MFA solutions.
- The group has claimed data theft from SoundCloud (29.8 million accounts), Betterment, Crunchbase, Panera Bread (14 million records), CarMax (500k+), and Edmunds (millions), often followed by extortion demands.
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🕵🏼 The Register | go.theregister.com/feed/www.th
🕵🏼 The Register | go.theregister.com/feed/www.th
🤫 CyberScoop | cyberscoop.com/shinyhunters-vo

Russian Security Firm Delta Hit by Cyberattack 🚨
- Delta, a major Russian provider of alarm and security systems for homes, businesses, and vehicles, suffered a "large-scale, coordinated" cyberattack attributed to an unspecified "hostile foreign state."
- The attack caused widespread service outages, with customers reporting issues like car alarms not deactivating, vehicles locking unexpectedly, and home systems switching to emergency mode.
- While Delta denies personal data compromise, an unidentified Telegram channel claiming responsibility has published an archive of alleged stolen data, the authenticity of which is unverified.
🗞️ The Record | therecord.media/russia-delta-s

Nike Investigates 1.4TB Data Leak by WorldLeaks 👟
- Sportswear giant Nike is investigating a potential cyber incident after the WorldLeaks extortion group claimed to have leaked over 1.4 terabytes of internal company data.
- The alleged stolen data includes internal documents, archives from 2020-2026, R&D assets, product creation details (technical packs, prototypes), supply chain information, and internal business presentations.
- WorldLeaks, believed to be a rebrand of the Hunters International ransomware group, briefly listed Nike on its leak site before removing the entry, suggesting potential negotiations or payment.
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🗞️ The Record | therecord.media/nike-probes-al
🕶️ Dark Reading | darkreading.com/cyberattacks-d

Ploutus ATM Jackpotting Ring Busted 💸
- US authorities have charged an additional 31 individuals, bringing the total to 87 members of the Venezuelan gang Tren de Aragua (TdA), for their involvement in a multi-million dollar ATM jackpotting scheme.
- The gang allegedly stole at least $5.4 million from 63 ATMs by physically accessing machines to replace hard drives or connect USBs, deploying Ploutus malware to force cash dispensing.
- TdA has been designated a Foreign Terrorist Organization by the U.S. Department of the Treasury, highlighting the increasing convergence of transnational organised crime and cyber-enabled financial fraud.
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
🗞️ The Record | therecord.media/dozens-more-ch

China-linked Hackers Accused of Years-Long UK Government Espionage 🇨🇳
- Chinese state-linked hackers, identified as Salt Typhoon, are accused of years-long access to the phones of senior Downing Street officials, potentially exposing private communications.
- The espionage focused on aides to former UK Prime Ministers and leveraged intrusions into telecommunications providers to skim metadata and communications without direct handset installation.
- This incident, discovered in 2024, underscores the persistent threat of nation-state espionage targeting critical government infrastructure and sensitive communications.
🕵🏼 The Register | go.theregister.com/feed/www.th

New Threat Research on Threat Actors/Groups, Ransomware, Malware, or Techniques and Tradecraft

ClickFix Attacks Evolve with App-V and Steganography 🎣
- A new ClickFix campaign is using fake CAPTCHA prompts to trick users into executing a command that abuses the signed Microsoft App-V script, SyncAppvPublishingServer.vbs, as a living-off-the-land (LoL) binary.
- This method proxies PowerShell execution through a trusted Microsoft component, making detection harder, and delivers the Amatera infostealer, which retrieves configuration from a public Google Calendar file and uses steganography to hide payloads in PNG images.
- The campaign is highly evasive, with checks for sandbox environments and a focus on enterprise-managed systems, reflecting a broader trend of ClickFix evolution into variants like GlitchFix and ClearFake, leveraging trusted web infrastructure for malware delivery.
🤖 Bleeping Computer | bleepingcomputer.com/news/secu
📰 The Hacker News | thehackernews.com/2026/01/clic

'Stanley' MaaS Guarantees Malicious Chrome Extensions 😈
- A new malware-as-a-service (MaaS) called 'Stanley' is being advertised, promising to bypass Google's review process and publish malicious phishing extensions to the Chrome Web Store.
- These extensions can overlay full-screen iframes with phishing content over legitimate webpages, silently auto-install on Chrome, Edge, and Brave, and support custom tweaks, C2 polling, and geographic targeting.
- This offering highlights the ongoing challenge of securing browser extension platforms and the commoditisation of sophisticated phishing techniques, urging users to be vigilant about extension installations and publishers.
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

Chinese Networks Dominate Illicit Crypto Laundering 💰
- Chinese money laundering networks processed an estimated $16.1 billion in illicit cryptocurrency in 2025, accounting for 20% of all laundered funds globally.
- These operations are highly professionalised, using Telegram groups, "guarantee" platforms for escrow protection, and offering services like "Black U" for hacking proceeds and crypto swapping.
- The continued resilience of these networks, despite crackdowns, underscores the global challenge of combating crypto-enabled financial crime and its links to transnational organised crime groups.
🗞️ The Record | therecord.media/chinese-money-

Vulnerabilities, especially any mentioning Remote Code Exploitation (RCE), Active Exploitation, or Zero-Days

Microsoft Office Zero-Day Under Active Exploitation (CVE-2026-21509) 🚨
- Microsoft has issued an emergency out-of-band patch for CVE-2026-21509, a high-severity security feature bypass zero-day in Microsoft Office that is actively being exploited in the wild.
- The flaw bypasses OLE mitigations, allowing attackers to execute arbitrary code by convincing a user to open a specially crafted Office file; the preview pane is not an attack vector.
- CISA has added this vulnerability to its Known Exploited Vulnerabilities (KEV) catalog, mandating federal agencies to apply patches or implement registry-based mitigations for older Office versions by February 16.
📰 The Hacker News | thehackernews.com/2026/01/micr
🕵🏼 The Register | go.theregister.com/feed/www.th

SmarterMail Servers Vulnerable to RCE via Auth Bypass (CVE-2026-23760) 🛡️
- Over 6,000 SmarterMail servers remain exposed online and are likely vulnerable to automated attacks exploiting CVE-2026-23760, a critical authentication bypass flaw.
- This vulnerability in the password reset API allows unauthenticated attackers to hijack admin accounts and achieve remote code execution (RCE) on affected servers.
- CISA has added CVE-2026-23760 to its KEV catalog, urging federal agencies to patch by February 16, as mass exploitation attempts have already been observed in the wild.
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

Critical Sandbox Escape in vm2 Node.js Library (CVE-2026-22709) 💻
- A critical sandbox escape vulnerability, CVE-2026-22709, has been discovered in the popular vm2 Node.js library, allowing arbitrary code execution on the host system.
- The flaw stems from improper sanitisation of Promise callbacks, enabling attackers to bypass the secure context designed to isolate untrusted JavaScript code.
- Despite the project being previously discontinued due to similar issues, vm2 remains widely used, and users are strongly advised to upgrade to version 3.10.3 immediately due to the trivial nature of exploitation.
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

WinRAR Path Traversal Flaw Actively Exploited (CVE-2025-8088) 📦
- The high-severity WinRAR path traversal vulnerability, CVE-2025-8088, continues to be actively exploited by both state-sponsored and financially motivated threat actors since July 2025.
- Attackers leverage Alternate Data Streams (ADS) to conceal malicious files within decoy archives, dropping payloads like LNK, HTA, or script files into Windows Startup folders for persistence.
- Google Threat Intelligence reports observing groups like RomCom, APT44, TEMP.Armageddon, Turla, and China-linked actors using this flaw to deliver various malware, highlighting the commoditisation of such exploits.
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

Data Privacy

Google Settles Voice Recording Lawsuit for $68 Million 🎤
- Google has agreed to a $68 million settlement in a class-action lawsuit alleging its voice-activated assistant illegally recorded and shared private conversations with third parties for targeted advertising.
- Plaintiffs claimed Google Assistant improperly triggered and recorded their words, leading to unwanted targeted ads, with the settlement funds to be distributed to Google device purchasers since May 2016.
- While Google settled without admitting wrongdoing, the case underscores ongoing concerns about privacy in voice-activated technologies and the use of personal data.
🗞️ The Record | therecord.media/google-settles

WhatsApp Introduces 'Strict Account Settings' for Spyware Protection 🔒
- WhatsApp is rolling out a new "Strict Account Settings" feature designed to combat sophisticated spyware attacks by allowing users to block attachments and media from non-contacts.
- This "lockdown-style" feature is specifically aimed at high-risk users like journalists and public figures, drawing parallels with similar protections offered by Apple and Google.
- The move follows WhatsApp's legal battles against NSO Group over Pegasus spyware, reinforcing the platform's commitment to user privacy and defence against advanced surveillance tools.
🤫 CyberScoop | cyberscoop.com/whatsapp-strict
🗞️ The Record | therecord.media/whatsapp-spywa

#CyberSecurity #ThreatIntelligence #Ransomware #NationState #APT #ZeroDay #Vulnerability #ActiveExploitation #DataPrivacy #InfoSec #CyberAttack #Malware #IncidentResponse #SSO #MFA #Phishing #Vishing #PQC #DigitalSovereignty

🇵🇸 Álvaro GonzálezkAlvaro
2026-01-28

The concept that a login form times out if you take too long to fill it is fascinating.

2026-01-27

📢⚠️ #ShinyHunters hacker group is targeting 100+ organisations with phone-based phishing and fake login pages to bypass SSO and steal credentials, researchers say.

Read: hackread.com/shinyhunters-targ

#Cybersecurity #SLSH #SSO #Vishing #Phishing

2026-01-27

🦊 New post: Modernizing .NET – Part 9
SAML SSO migration to ITfoxtec in .NET Core.
Config, response handling, logging — all covered.
Read it → medium.com/@michael.kopt/moder
#DotNet #SAML #SSO #ITfoxtec #CSharp #Identity #ASPNet #ASPNetCore #Linux #DotNetCore #DotNet8 #DotNet9 #DotNet10

2026-01-27

Guten Morgen, ich hoffe, Eure Anreise nach Bremen zum #univentionsummit wird nicht zu abenteuerlich bei dem Wetter!

Hier ein kleine Reiselektüre für die, die schon mal spicken möchten, was diese Authentication Flows sind, über die ich morgen spreche:

keycloak.org/docs/latest/serve

#keycloak #sso #singlesignon #freesoftware @univention

2026-01-26

OH: „Bitte benutzen Sie Ihr #Rumpfkonto zur Einwahl in die #ViKo.“

#H11leaks #SSO #Webex #Schalte

Der IT Nerd! :logo:admin@blog.dumango.com
2026-01-26

Zentrale Authentifizierung muss kein Overkill sein.

Ich setze mir gerade Authelia ein und mag den Ansatz:
SSO und MFA an einer Stelle, sauber vor dem Reverse Proxy, ohne Cloud-Abhängigkeit.

Open Source, OpenID-Connect-zertifiziert, klar strukturierte Policies.
Einmal anmelden, mehrere Dienste nutzen – ruhig, kontrolliert, nachvollziehbar.

Macht genau das, was es soll.
Nicht mehr, nicht weniger.

#Authelia #SelfHosting #OpenSource #IAM #SSO #Security

2026-01-24

Alright team, it's been a pretty packed 24 hours in the cyber world! We've got updates on some serious threat actor activity, a critical vulnerability under active exploitation, a deep dive into AI agent risks, and some interesting news from CISA. Let's get stuck in:

Recent Cyber Attacks & Threat Actor Activity 💥

- ShinyHunters is claiming responsibility for widespread voice phishing (vishing) attacks targeting Single Sign-On (SSO) accounts across Okta, Microsoft Entra, and Google.
- Attackers impersonate IT support, tricking employees into providing credentials and MFA codes on dynamic phishing sites, then leveraging compromised SSO access to exfiltrate data from connected SaaS platforms like Salesforce for extortion.
- The group uses previously stolen data to enhance social engineering efforts, with recent breaches confirmed at SoundCloud, Betterment, and Crunchbase.
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

- The Russian nation-state group Sandworm attempted a significant cyberattack on Poland's power system in late December 2025, deploying a new wiper malware dubbed DynoWiper.
- While the attack on two combined heat and power plants and renewable energy management systems was unsuccessful, it highlights Sandworm's persistent targeting of critical infrastructure, echoing their 2015 Ukraine power grid attack.
- The use of DynoWiper shows their continued development of destructive capabilities, underscoring the ongoing threat to energy sectors.
📰 The Hacker News | thehackernews.com/2026/01/new-

- A sophisticated multi-stage phishing campaign is targeting Russian users, delivering the Amnesia Remote Access Trojan (RAT) and a Hakuna Matata-derived ransomware.
- The campaign leverages social engineering, LNK files, PowerShell, and public cloud services (GitHub, Dropbox) for resilient payload distribution, notably using 'defendnot' to disable Microsoft Defender.
- Amnesia RAT is a comprehensive tool for data theft (browsers, crypto wallets, Discord, Steam, Telegram) and remote control, while the ransomware encrypts files and modifies clipboard crypto addresses, demonstrating full system compromise without exploiting vulnerabilities.
📰 The Hacker News | thehackernews.com/2026/01/mult

- North Korean threat group Konni (APT37, Kimsuky) is targeting blockchain developers and engineers in the Asia-Pacific region with malware showing strong indications of AI-assisted development.
- The attack chain starts with Discord-hosted links delivering ZIP archives containing PDF lures and malicious LNK files, which execute a PowerShell loader and deploy a backdoor.
- The PowerShell backdoor's structured documentation, modular layout, and specific placeholder comments suggest it was generated or heavily assisted by a Large Language Model (LLM).
🤖 Bleeping Computer | bleepingcomputer.com/news/secu

Critical Vulnerabilities Under Active Exploitation ⚠️

- A critical out-of-bounds write vulnerability, CVE-2024-37079 (CVSS 9.8), in VMware vCenter Server's DCERPC protocol is being actively exploited in the wild.
- Despite being patched by Broadcom in June 2024, CISA has added this flaw to its Known Exploited Vulnerabilities (KEV) catalog, requiring federal agencies to patch by February 13, 2026.
- Attackers with network access can send specially crafted packets to achieve remote code execution, and previous vCenter flaws in the same protocol have been exploited by state-backed groups, underscoring the importance of immediate patching and ensuring vCenter is not exposed to the public internet.
🕵🏼 The Register | go.theregister.com/feed/www.th
📰 The Hacker News | thehackernews.com/2026/01/cisa

AI Agents and Enterprise Security Risk 🤖

- The rapid deployment of AI agents is fundamentally challenging traditional Identity and Access Management (IAM) models, as these autonomous agents often operate with broad, persistent, and ownerless permissions.
- Organisational agents, in particular, pose the highest risk by creating "agentic authorization bypass" paths, allowing users to indirectly perform actions they are not directly permitted to execute.
- Securing AI agents requires a shift towards clear ownership, mapping user-agent interactions, and tracing agent access across all systems to accurately assess risk and prevent misuse.
📰 The Hacker News | thehackernews.com/2026/01/who-

Government Cyber Policy & Engagement 🏛️

- The US Cybersecurity and Infrastructure Security Agency (CISA) has confirmed it will not attend the annual RSA Conference in March, citing a focus on its core mission and "good stewardship of taxpayer dollars."
- This decision follows political tensions, including the recent appointment of former CISA director Jen Easterly as RSAC CEO, and marks a significant departure from CISA's historical active participation and speaking roles at the event.
- The move suggests a potential shift in how federal cyber officials engage with the broader cybersecurity industry under the current administration.
🕵🏼 The Register | go.theregister.com/feed/www.th

#CyberSecurity #ThreatIntelligence #Ransomware #NationState #APT #ZeroDay #Vulnerability #VMware #SSO #Vishing #AI #CyberAttack #Malware #IncidentResponse #CISA #InfoSec

2026-01-23

Fortinet is analyzing SSO abuse on FortiOS, with reports showing admin access via SAML even on fully patched releases.

The situation reinforces long-standing concerns around identity exposure on edge devices and the need for strict access controls alongside patching.

How are you handling SSO risk in firewall and gateway environments?

Source: fortinet.com/blog/psirt-blogs/

Comment, share insights, and follow @technadu for practitioner-focused security updates.

#InfoSec #Fortinet #SSO #NetworkSecurity #IAM #BlueTeam #CyberDefense

Analysis of Single Sign-On Abuse on FortiOS

Client Info

Server: https://mastodon.social
Version: 2025.07
Repository: https://github.com/cyevgeniy/lmst