Machine learning (ML) and generative AI have rapidly lowered the technical bar for sophisticated attacks: easier access to large language models, open-source ML tooling, and on-demand compute mean attackers can prototype scams and evasion techniques faster than before. Government and industry reports highlight that AI is now a material factor in criminal tactics and that […] The post Machine Learning for Cybercriminals appeared first on Rublon.| Rublon
Business-critical SAP components can be used as a vector to deliver ransomware by abusing client-side vulnerabilities, exposed services, or poor segmentation. The specific mechanics vary, but the defensive priorities are constant: patching, segmentation, strong authentication, monitoring, and isolated backups. Protect your SAP Environment With MFA Interested? Try our phishing-resistant multi-factor authentication for 30 days for […] The post Can SAP Be Affected by Ransomware? appeared first...| Rublon
Point-of-sale (POS) systems remain high-value targets because they sit on the payments path and connect to many back-office and edge components. This short guide groups recurring classes of weaknesses you should monitor in SAP POS environments and gives quick, low-effort mitigations, including where multi-factor authentication (MFA) helps. Phishing-Resistant FIDO MFA Interested? Try our phishing-resistant multi-factor […] The post Hacking SAP POS: Top 5 Critical Vulnerabilities You Must Kno...| Rublon
Rublon integrates with your SOGo to add Two-Factor Authentication (2FA/MFA) to open source webmail logins.| Rublon
Read the latest news and insights about Two-Factor Authentication (MFA/2FA), secure access, adaptive authentication, SSO, and more.| Rublon
APIs (Application Programming Interfaces) and SDKs (Software Development Kits) are two pillars of modern software engineering, but they serve different purposes. An API exposes a clearly defined contract for interacting with existing functionality, while an SDK bundles everything you need (libraries, documentation, tooling, and example code) to create functionality for a given platform. Phishing-Resistant FIDO […] The post API vs. SDK: What’s the Difference? appeared first on Rublon.| Rublon
Learn the difference between RSA vs. AES. Compare RSA and AES: differences, features, key length, and security.| Rublon
Overview of MFA for Zabbix This documentation describes how to integrate Rublon MFA with Zabbix using the LDAP(S) protocol to enable multi-factor authentication for logins to Zabbix. Supported Authentication Methods Before You Start Configuring MFA for Zabbix Using LDAP(S) Before configuring Rublon MFA for Zabbix: Required Components 1. User Identity Provider (IdP) – You need […] The post Multi-Factor Authentication (2FA/MFA) for Zabbix – LDAP(S) appeared first on Rublon.| Rublon
2FA/MFA for Zabbix The post Multi-Factor Authentication (2FA/MFA) for Zabbix – SAML appeared first on Rublon.| Rublon
Learn how to synchronize users from Active Directory using Directory Sync, a new feature in the Rublon Authentication Proxy.| Rublon
This guide describes how to enroll a FIDO2 Passkey to protect your applications with phishing-resistant multi-factor authentication (MFA).| Rublon
This guide describes how to add a WebAuthn/U2F Security Key to protect your Rublon account with strong FIDO2 standard MFA key.| Rublon
Learn how to use Administrator Roles in the Rublon Admin Console to delegate certain tasks to people with certain administrative rights.| Rublon
Rublon Admin Console is a management tool for your Rublon Multi-Factor Authentication system. Control your company, applications and users.| Rublon
Multi-Factor (MFA) and Two-Factor Authentication (2FA) for Dell iDRAC The post Multi-Factor Authentication (2FA/MFA) for Dell iDRAC appeared first on Rublon.| Rublon
Multi-Factor (MFA) and Two-Factor Authentication (2FA) for Zimbra Collaboration The post Multi-Factor Authentication (2FA/MFA) for Zimbra Collaboration appeared first on Rublon.| Rublon
A step-by-step guide to deploying admin-enrolled pre-provisioned user passkeys saved in enterprise password managers.| Rublon
Learn what attestation is and check the table containing each FIDO2 security key mode that's eligible for attestation with Rublon MFA.| Rublon
Learn what vishing is, how it works, and how to prevent vishing attacks and protect your personal information.| Rublon
Step-by-step guide to configure Rublon Authentication Proxy in high availability mode for scalable, resilient multi-instance security.| Rublon
Explore our guide on configuring Rublon Authentication Proxy as an LDAP Proxy Server for a successful setup.| Rublon
Explore our guide on configuring Rublon Authentication Proxy as a RADIUS Proxy Server for a successful setup.| Rublon
This page describes how you can use Rublon Prompt to confirm your identity by selecting one of the available methods of authentication.| Rublon
Turn your users’ mobile devices into secure authentication tokens with Rublon Authenticator. Free & available for Android and iOS.| Rublon
Rublon Authenticator generates a new Mobile Passcode every 30 seconds, even when offline. Verify your identity with time-based passcodes.| Rublon
Mobile Push is a one-tap, fast and secure way for users to verify their identities, using push notifications sent to their phones.| Rublon
Rublon Authentication Proxy is an on-premise RADIUS and LDAP(S) proxy server that enables Multi-Factor Authentication (MFA) for VPNs and services.| Rublon