Can your MFA implementations stymie MFA bypass attacks?

Shay Nahari, Head of Red-Team services at CyberArk, says that they’ve been increasingly asked by customers to probe their multi-factor authentication (MFA) defenses, which lead them to pinpoint four main attack vectors used by threat actors to circumvent MFA controls, by exploiting: architectural and design flaws, insecure channels, side channel attacks and insufficient attack surface coverage. Why MFA is a good choice The cybersecurity industry has been extolling the virtues of MFA use for years. … More

The post Can your MFA implementations stymie MFA bypass attacks? appeared first on Help Net Security.

click here to read full Article

Read More on latest Security Updates

You may also like...

Leave a Reply

Your email address will not be published. Required fields are marked *