Last Wednesday I published my MFA Primer series and part two looks at this type of cyber attack against multi-factor authentication. In brief when the threat actors have a valid set of credentials they repeatedly try and access the service with them, generating multiple MFA requests to your authenticator app. …
Microsoft takes a stand
This one action is not going to stop cyber-crime, but Microsoft has seized rogue domains in the past and there is no doubt that it has an impact on the threat actor’s illicit infrastructure. Microsoft seizes websites used to sell phony email accounts • The Register Your takeaway from this …
MFA – A Primer
For the Wednesday Bit this week I am going to point you at a series I recently wrote about multi-factor authentication (MFA) – whilst I go out and do some Christmas Shopping! MFA is an important part of any cyber security plan and you should at least understand the basics …
Back to passwords. Again!
It looks like I cannot get away from articles about passwords, which is not really a bad thing as passwords are still fundamental to everyone’s cyber security. I often read in the cyber security technical press that cyber attacks on even the biggest organisations start with the compromise of a …
When someone writes code for you…
…do you get it checked? It may seem a strange thing to think about, surely the programmers know how to produce secure code? But recent research has shown that even the biggest organisations have coders who continuously leave valuable credentials embedded in their public facing apps. These transgressions often arise …