saml

  1. CVE-2025-40758: Mendix SAML Module Allows Remote Account Hijack (CVSS 8.7)

    Siemens’ Mendix SAML module contains a high‑severity flaw that, under certain single sign‑on (SSO) configurations, can allow unauthenticated remote attackers to bypass SAML signature verification and hijack user accounts — a vulnerability tracked as CVE‑2025‑40758 with a CVSS v3.1 base score of...
  2. Custom SSO Claims with Entra ID Directory Extensions: A Five-Step Guide

    Microsoft’s recent how‑to on issuing custom SSO claims from Entra ID using directory extension attributes gives administrators a practical, low‑friction way to inject organization‑specific data into SAML and OIDC tokens — and to do so only for selected user groups during sign‑in. The documented...
  3. SendQuick Conexa earns FIDO2 server certification for phishing-resistant sign-ins

    SendQuick says its Conexa authentication platform has achieved FIDO2 server certification from the FIDO Alliance, a milestone the company claims will help enterprises cut password risk with phishing‑resistant, standards‑based sign‑ins. While this announcement signals a strategic shift toward...
  4. Duo Single Sign-On for Windows: Enhance Security and User Access

    In today’s world of increasing cyber threats and the growing need for seamless user access, Duo Single Sign-On (SSO) emerges as a solid solution for robust identity management. If you’re a Windows administrator or a tech enthusiast looking to enhance security while minimizing password fatigue...
  5. Releasing Windows 10 Build 19044.1263 (21H2) to Release Preview Channel

    Hello Windows Insiders, today we are releasing 21H2 Build 19044.1263 (KB5005611) to the Release Preview Channel. This update will be offered automatically for Windows Insiders already on Windows 10, version 21H2 in the Release Preview Channel. For Insiders not yet on Windows 10, version 21H2 –...
  6. AA20-352A: Advanced Persistent Threat Compromise of Government Agencies, Critical Infrastructure, and Private Sector Organizations

    Original release date: December 17, 2020 Summary This Alert uses the MITRE Adversarial Tactics, Techniques, and Common Knowledge (ATT&CK®) version 8 framework. See the ATT&CK for Enterprise version 8 for all referenced threat actor tactics and techniques. The Cybersecurity and Infrastructure...