• Blog
  • Search results shown for:

"compromise"

7 of 7 results

identity & security

Jul 3, 2023 • 9 min read

What Is Credential Stuffing? How To Prevent Credential Stuffing Attacks

Compromised credentials are a threat to your business and customers. Here’s how to reduce the risk.

Diego Poza

developers

Dec 8, 2020 • 8 min read

Preventing HTTPS Downgrade Attacks

HTTPS downgrade attacks compromise your web application security by switching to HTTP. Learn how to prevent them.

Andrea Chiarelli

engineering

Nov 28, 2018 • 17 min read

How To Have a Successful IDM Project (Part 2)

Learn how to plan for failures and changes in your identity project.

Yvonne Wilson

identity & security

Oct 1, 2018 • 4 min read

Early Look at Facebook Access Token Security Breach

Almost 90 millions Facebook users were affected by a breach that compromised access tokens to the platform.

Diego Poza

announcements

Apr 6, 2018 • 5 min read

Take a No-Compromise Approach to the Login Experience Using Custom Domains

Auth0 now provides your own custom domain for login with a central authorization server.

Justin Hinerman

identity & security

Sep 8, 2017 • 3 min read

Equifax Data Breach Compromises 143 Million People

Personal identifying information was compromised for 143 million Americans in a massive Equifax data breach from May to July, 2017.

Kim Maida

identity & security

Feb 24, 2017 • 4 min read

SHA-1 Has Been Compromised In Practice

The CWI Institute and Google have successfully demonstrated a practical SHA-1 collision attack by publishing two unique PDF files that produce the same hash value.

Ado Kukic