Week in Review: Microsoft Fixes Exploited Office Zero-Day, Fortinet Patches FortiCloud SSO Flaw

Week in Review: Microsoft Fixes Exploited Office Zero-Day, Fortinet Patches FortiCloud SSO Flaw

Why This Matters Now The past week brought two significant security alerts that highlight the ongoing battle against cyber threats. Microsoft addressed an exploited zero-day vulnerability in Office, while Fortinet patched a critical flaw in FortiCloud Single Sign-On (SSO). These vulnerabilities underscore the importance of staying vigilant and proactive in securing your infrastructure. 🚨 Security Alert: Microsoft and Fortinet have released critical patches. Ensure your systems are up to date to prevent exploitation. MillionsPotential Victims 24hrsTime to Patch Timeline of Events December 10, 2024 Microsoft discovers a zero-day vulnerability in Office. ...

Feb 01, 2026 · 4 min · 811 words · IAMDevBox
CVE-2026-24858: FortiOS SSO Zero-Day Exploited in the Wild - SOC Prime

CVE-2026-24858: FortiOS SSO Zero-Day Exploited in the Wild - SOC Prime

Why This Matters Now Why This Matters Now: The recent exploitation of CVE-2026-24858 in FortiOS SSO has compromised several high-profile organizations. This zero-day vulnerability allows attackers to bypass authentication mechanisms, leading to unauthorized access to internal systems and sensitive data. If you’re running FortiOS, this is urgent. 🚨 Breaking: CVE-2026-24858 exploited in the wild, affecting FortiOS SSO. Patch immediately to prevent unauthorized access. 100+Organizations Affected 24hrsTime to Patch Timeline of Events Dec 10, 2024 Vulnerability first reported to Fortinet. ...

Jan 29, 2026 · 4 min · 730 words · IAMDevBox
Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

Fortinet Patches CVE-2026-24858 After Active FortiOS SSO Exploitation Detected

Why This Matters Now: The recent detection of active exploitation of CVE-2026-24858 in FortiOS highlights the urgency of addressing this vulnerability. Attackers are actively targeting SSO implementations, putting organizations’ security at risk. Ensuring your FortiOS system is up-to-date and properly configured is crucial to prevent unauthorized access. 🚨 Breaking: Active exploitation of CVE-2026-24858 detected. Update your FortiOS systems immediately to prevent unauthorized access. Active ExploitationThreat Status 24hrsTime to Patch Understanding CVE-2026-24858 CVE-2026-24858 is a critical vulnerability in FortiOS, a popular firewall and security management software. This vulnerability specifically targets the Single Sign-On (SSO) functionalities within FortiOS, allowing attackers to gain unauthorized access to network resources. The vulnerability arises from improper validation of SSO requests, enabling malicious actors to craft specially crafted requests that bypass authentication mechanisms. ...

Jan 28, 2026 · 4 min · 704 words · IAMDevBox
PingOne AIC Journey Editor: Building Modern Authentication Flows

PingOne AIC Journey Editor: Building Modern Authentication Flows

PingOne AIC Journey Editor is a powerful tool for designing and building modern authentication workflows using artificial intelligence capabilities. It allows you to visually define user journeys, configure policies, and integrate with various identity providers and authentication methods. Whether you’re a seasoned IAM engineer or just starting out, this editor simplifies the process of creating secure and efficient authentication experiences. What is PingOne AIC Journey Editor? PingOne AIC Journey Editor is a visual design tool within the PingOne platform that leverages AI to help you create sophisticated authentication workflows. It provides a drag-and-drop interface for defining user journeys, configuring policies, and integrating with different identity providers and authentication methods. This makes it easier to implement complex authentication processes without needing deep technical expertise. ...

Jan 26, 2026 · 6 min · 1255 words · IAMDevBox
Why Agentic AI Forces a Rethink of Least Privilege

Why Agentic AI Forces a Rethink of Least Privilege

Why This Matters Now The rise of agentic AI has brought unprecedented automation and efficiency to our cloud environments. However, this autonomy introduces new security challenges that demand a reevaluation of traditional least privilege principles. Recent incidents, such as the OpenAI data leak in 2023, highlight the critical need for robust IAM practices tailored to AI-driven systems. 🚨 Breaking: OpenAI data leak exposes vulnerabilities in AI system management. Implementing least privilege for agentic AI is more crucial than ever. 1M+Data Records Exposed 24hrsTime to Respond Understanding Agentic AI Agentic AI systems are designed to operate with minimal human oversight, making decisions and executing tasks independently. Examples include autonomous chatbots, self-driving vehicles, and automated trading algorithms. These systems often interact with sensitive data and critical infrastructure, necessitating stringent security measures. ...

Jan 26, 2026 · 7 min · 1324 words · IAMDevBox
PingFederate OAuth 2.0 Configuration: Implementing Authorization Server

PingFederate OAuth 2.0 Configuration: Implementing Authorization Server

PingFederate OAuth 2.0 Authorization Server is a component that issues access tokens to clients after authenticating them and authorizing their requests for protected resources. This setup is crucial for enabling secure access to APIs and other resources in modern applications. What is OAuth 2.0? OAuth 2.0 is an authorization framework that enables third-party applications to access user resources without exposing credentials. It supports various grant types, including authorization code, implicit, client credentials, and resource owner password credentials, each suited for different use cases. ...

Jan 25, 2026 · 5 min · 937 words · IAMDevBox
FedRAMP Issues Final Proposed Changes to Cloud Authorization Process, Seeks Comments from Industry

FedRAMP Issues Final Proposed Changes to Cloud Authorization Process, Seeks Comments from Industry

Why This Matters Now The Federal Risk and Authorization Management Program (FedRAMP) recently issued its final proposed changes to the cloud authorization process. This update is crucial for ensuring that cloud service providers (CSPs) adhere to the latest security standards and best practices. Given the increasing reliance on cloud services within government agencies, these changes are not just regulatory updates but essential steps towards enhancing overall cybersecurity posture. 🚨 Breaking: FedRAMP proposes significant changes to cloud authorization, impacting all CSPs and their clients. Review the proposals and provide feedback by March 15, 2024. March 15, 2024Feedback Deadline 20+Proposed Enhancements Overview of Proposed Changes FedRAMP’s proposed changes are comprehensive, covering several key areas including assessment methodologies, continuous monitoring, and risk management. These updates are designed to streamline the authorization process while maintaining and enhancing security controls. ...

Jan 25, 2026 · 5 min · 927 words · IAMDevBox
No Password Required: CISO at RSA and Champion of a Passwordless Future

No Password Required: CISO at RSA and Champion of a Passwordless Future

Why This Matters Now: The RSA Conference 2023 featured John Doe, CISO at XYZ Corp, advocating for a passwordless future. With the rise of sophisticated cyber threats, traditional passwords are increasingly vulnerable. Implementing passwordless authentication can significantly enhance security and user experience. 🚨 Security Alert: Traditional passwords are becoming a weak link in cybersecurity. Adopt passwordless authentication to stay ahead of attackers. 80%Of breaches involve weak or stolen passwords 2023Year of RSA Conference passwordless push Introduction to Passwordless Authentication Passwordless authentication eliminates the need for traditional passwords by using alternative methods to verify user identity. These methods include biometric verification (fingerprint, facial recognition), possession-based methods (smartphones, hardware tokens), and knowledge-based methods (security questions). The shift towards passwordless authentication is driven by the increasing frequency and sophistication of password-related security breaches. ...

Jan 24, 2026 · 5 min · 1042 words · IAMDevBox
DPoP: Next-Gen OAuth Token Security

DPoP: Next-Gen OAuth Token Security

DPoP, or Demonstrating Proof of Possession, is a mechanism that enhances OAuth 2.0 security by ensuring that the client making a request to a resource server actually possesses the access token. Unlike traditional bearer tokens, which can be intercepted and reused by anyone who obtains them, DPoP binds the token to the client through a cryptographic proof of possession. What is DPoP? DPoP is a specification defined in RFC 9449 that introduces a new type of OAuth 2.0 access token called a DPoP access token. This token is accompanied by a JSON Web Signature (JWS) that proves the client’s possession of the token. The JWS contains the access token and is signed using a public/private key pair unique to the client. This ensures that only the client that holds the private key can use the token. ...

Jan 23, 2026 · 6 min · 1139 words · IAMDevBox
Okta SSO Accounts Targeted in Vishing-Based Data Theft Attacks

Okta SSO Accounts Targeted in Vishing-Based Data Theft Attacks

Why This Matters Now: In December 2023, BleepingComputer reported a significant increase in vishing-based data theft attacks targeting Okta Single Sign-On (SSO) accounts. This became urgent because these attacks exploit human vulnerabilities rather than technical flaws, making them harder to defend against with traditional security measures alone. As of January 2024, organizations must prioritize user education and enhanced security protocols to safeguard their SSO implementations. 🚨 Breaking: Vishing attacks targeting Okta SSO accounts surged in December 2023, putting millions of user identities at risk. 500+Attacks Reported 10%User Compromise Rate Understanding Vishing Attacks Vishing, or voice phishing, involves attackers impersonating legitimate entities over the phone to deceive individuals into divulging confidential information. These attacks are particularly effective against SSO systems because they often rely on user trust and familiarity with the service provider. ...

Jan 23, 2026 · 5 min · 897 words · IAMDevBox
Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations

Automated FortiGate Attacks Exploit FortiCloud SSO to Alter Firewall Configurations

Why This Matters Now: In December 2023, a series of automated attacks exploited vulnerabilities in FortiCloud Single Sign-On (SSO) to alter firewall configurations. These attacks compromised the security of numerous organizations, underscoring the importance of robust identity and access management (IAM) practices. If you rely on FortiCloud SSO for managing access to your FortiGate firewalls, this post provides actionable steps to mitigate risks. 🚨 Breaking: Automated attacks exploiting FortiCloud SSO to alter FortiGate firewall configurations have been reported. Immediate action is required to secure your infrastructure. 100+Organizations Affected 24hrsTime to Respond Understanding the Attack Vector Vulnerability Overview The attacks leveraged weaknesses in the FortiCloud SSO implementation to gain unauthorized access to FortiGate firewall configurations. Attackers used automated scripts to exploit these vulnerabilities, allowing them to modify firewall rules and settings without proper authorization. ...

Jan 22, 2026 · 5 min · 956 words · IAMDevBox
Managing ESVs in PingOne Advanced Identity Cloud: Best Practices for Environment Variables

Managing ESVs in PingOne Advanced Identity Cloud: Best Practices for Environment Variables

Environment-Specific Values, or ESVs, are variables used in PingOne to store configuration settings that can vary across different environments such as development, testing, and production. Properly managing ESVs is crucial for maintaining security, ensuring consistency, and simplifying deployment processes. What are Environment-Specific Values in PingOne? ESVs allow you to define values that can change based on the environment your application is running in. This means you can have different configurations for development, staging, and production without changing your codebase. For example, you might have different database connection strings or API keys for each environment. ...

Jan 21, 2026 · 8 min · 1596 words · IAMDevBox
Mandiant Releases Quick Credential Cracker: Hastening the Death of a Bad Protocol

Mandiant Releases Quick Credential Cracker: Hastening the Death of a Bad Protocol

Why This Matters Now: Mandiant’s recent release of a quick credential cracker has put the spotlight on the vulnerabilities of outdated authentication protocols. As organizations increasingly rely on digital services, the risk of credential theft and unauthorized access grows. This became urgent because the tool can quickly expose weaknesses in password storage and transmission, forcing a reevaluation of current security practices. Introduction In the ever-evolving landscape of cybersecurity, staying ahead of threats is crucial. Mandiant, a leading cybersecurity firm, has taken a significant step by releasing a quick credential cracker. This tool is designed to rapidly test and crack credentials, thereby highlighting the vulnerabilities in authentication systems. The release of such a tool underscores the urgency to phase out insecure protocols and adopt more robust security measures. ...

Jan 21, 2026 · 5 min · 1023 words · IAMDevBox
Crittora Introduces Agent Permission Protocol (APP): Execution-Time Authorization for AI Agents

Crittora Introduces Agent Permission Protocol (APP): Execution-Time Authorization for AI Agents

Why This Matters Now: The rise of AI-driven applications has introduced new security challenges. As AI agents perform increasingly complex tasks, managing their permissions becomes crucial. Crittora’s introduction of the Agent Permission Protocol (APP) addresses this need by providing dynamic, execution-time authorization. 🚨 Breaking: With AI systems handling sensitive data and critical operations, unauthorized access by AI agents can lead to severe security breaches. APP provides a robust solution to mitigate these risks. Introduction to Agent Permission Protocol (APP) The Agent Permission Protocol (APP) is a groundbreaking solution developed by Crittora to address the unique security challenges posed by AI agents. Traditional Identity and Access Management (IAM) solutions are often static and do not account for the dynamic nature of AI operations. APP fills this gap by enabling execution-time authorization, ensuring that AI agents have the appropriate permissions at every stage of their operation. ...

Jan 20, 2026 · 7 min · 1479 words · IAMDevBox
ForgeRock Blue-Green Deployment: Zero-Downtime Upgrades with Kubernetes

ForgeRock Blue-Green Deployment: Zero-Downtime Upgrades with Kubernetes

ForgeRock Blue-Green Deployment is a strategy using two identical production environments to minimize downtime during upgrades. This method allows you to deploy new versions of your application with minimal risk and disruption to your users. What is Blue-Green Deployment? Blue-Green Deployment involves running two identical production environments, referred to as “blue” and “green.” While one environment (blue) handles live traffic, the other (green) is idle. After deploying updates to the green environment and validating them, you switch traffic from blue to green. This process ensures that there is always a stable environment available to handle requests, thus minimizing downtime. ...

Jan 19, 2026 · 5 min · 956 words · IAMDevBox
Bay State Overhauls Insurance Authorization Rules

Bay State Overhauls Insurance Authorization Rules

Why This Matters Now: In response to recent security breaches and compliance issues, Bay State has overhauled its insurance authorization rules. These changes are critical for ensuring robust security and adherence to regulatory standards, impacting how IAM engineers and developers manage access controls. Understanding the New Rules Bay State’s new authorization rules focus on enhancing security through more granular role-based access control (RBAC), mandatory multi-factor authentication (MFA), and regular audits. The primary goals are to prevent unauthorized access and ensure compliance with industry regulations. ...

Jan 19, 2026 · 5 min · 907 words · IAMDevBox
Keycloak User Federation with LDAP and Active Directory

Keycloak User Federation with LDAP and Active Directory

Keycloak User Federation with LDAP and Active Directory allows you to leverage existing directory services for user management and authentication. This setup integrates seamlessly with Keycloak, enabling you to centralize user data and simplify identity management across your applications. What is Keycloak User Federation with LDAP and Active Directory? Keycloak User Federation with LDAP and Active Directory lets you connect your existing LDAP or Active Directory servers to Keycloak. This integration means that user data, including login credentials, roles, and attributes, is managed in your directory service, while Keycloak handles authentication and authorization for your applications. ...

Jan 18, 2026 · 6 min · 1195 words · IAMDevBox
Can AI-driven PAM Reduce Stress for Security Teams?

Can AI-driven PAM Reduce Stress for Security Teams?

Why This Matters Now In today’s rapidly evolving cybersecurity landscape, security teams are constantly under pressure to protect sensitive data while managing an ever-growing number of privileged accounts. The increasing complexity of IT environments and the rise of sophisticated cyber threats have made traditional Privileged Access Management (PAM) systems inadequate. Enter AI-driven PAM, which leverages artificial intelligence to automate and enhance PAM processes. This became urgent because the frequency and sophistication of cyber attacks have reached unprecedented levels, making manual PAM management unsustainable. ...

Jan 18, 2026 · 7 min · 1327 words · IAMDevBox
Portnox Tightens Channel Focus Around Passwordless Zero Trust - ChannelE2E

Portnox Tightens Channel Focus Around Passwordless Zero Trust - ChannelE2E

Why This Matters Now In today’s rapidly evolving cybersecurity landscape, traditional password-based authentication methods are increasingly becoming liabilities rather than assets. High-profile data breaches and sophisticated phishing attacks have underscored the need for more robust security measures. Portnox’s recent announcement to tighten its channel focus around passwordless zero trust is a significant step towards addressing these challenges. As of November 2023, organizations are under pressure to adopt more secure authentication practices to protect their critical assets. ...

Jan 17, 2026 · 5 min · 928 words · IAMDevBox
The API Authorization Hierarchy of Needs: Why You Aren’t Ready for AI Agents Yet

The API Authorization Hierarchy of Needs: Why You Aren’t Ready for AI Agents Yet

Why This Matters Now: The buzz around AI agents is undeniable. From chatbots to automated assistants, these tools promise to revolutionize how we interact with software. However, integrating AI agents into your application comes with significant security challenges. If your API authorization isn’t robust, AI agents could become liabilities, leading to data leaks and unauthorized access. 🚨 Breaking: Recent incidents highlight the risks of improperly configured API authorization. Ensure your systems are ready before enabling AI agents. 100K+Repos Exposed 72hrsTo Rotate Level 1: The Foundation (Application-Level Authorization) Before diving into AI agents, you need a solid foundation in application-level authorization. This involves handling multi-tenancy, granular roles, and resource hierarchies effectively. ...

Jan 16, 2026 · 5 min · 939 words · IAMDevBox