Skip to main content

The WiKID Blog

The WiKID Blog, musings on two-factor authentication, information security and some other stuff.

Blast-RADIUS attack

We are currently working on a fix for the Blast-RADIUS attack.  It promises to be problematic and may take some time.

The latest WiKID version includes an SBOM

As of 6.2 and 5.4, we are including an SBOM in the WiKID RPM. It is located in /opt/WiKID.  We have embedded the process in our build system so we can quickly see if any of the libraries we use have any known vulnerabilities.  Needless to say, this greatly enhances the security of our product.  Even if you never look at the SBOM file, we do! 

WiKID 6 is released!

We are pleased to announce the release of Version 6 of the WiKID Strong Authentication server.  The new ISO is based on Rocky 9.  It offers unparalleled security and scalability.  All the supporting packages for WIKID have been upgraded as well.

Log4j CVE-2021-44228

We are fairly confident that we are not vulnerable to the Log4J bug, but we will be releasing an update soon with an updated version of Log4J.  Stay tuned.

Questions about 2FA for AD admins

We've recently had more questions about deploying WiKID for two-factor authentication for AD admins to thwart potential privilege escalation in ransomware attacks.  We've done a proof-of-concept showing that WiKID can make privilege escalation quite difficult.  We realized that we missed a key question about deploying two-factor authentication for admins:  how do I know I won't lock out all my admins?  That's a damn good question.  And here's the answer:

Recent Posts

Archive

2024
2022
2021
2019
2018
2017
2016
2015
2014
2013
2012
2011
2010
2009
2008

Categories

Tags

Authors

Feeds

RSS / Atom