2fa
Cybersecurity Insights with Contrast CISO David Lindner | 8/30/24
Insight #1: North Korean IT spies The threat of state-sponsored cyber espionage is real and evolving. Recent reports reveal North Korean IT professionals are using stolen identities and advanced tactics to infiltrate ...
Cybersecurity Insights with Contrast CISO David Lindner | 7/19/24
Insight #1 It's been a while since I reminded everyone that one of the single greatest controls to implement to prevent account compromise is multifactor authentication (MFA). Do it today! ...
Authy Breach: What It Means for You, RockYou 2024 Password Leak
In episode 338, we discuss the recent breach of the two-factor authentication provider Authy and its implications for users. We also explore a massive password list leak titled ‘Rock You 2024’ that ...
AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again
Should’ve used MFA: $T loses yet more customer data—this time, from almost all of them ...
‘Russia’ Breaches TeamViewer — ‘No Evidence’ Billions of Devices at Risk
SolarWinds hackers strike again: Remote access service hacked—by APT29, says TeamViewer ...
Ticketmaster is Tip of Iceberg: 165+ Snowflake Customers Hacked
Not our fault, says CISO: “UNC5537” breached at least 165 Snowflake instances, including Ticketmaster, LendingTree and, allegedly, Advance Auto Parts ...
SIM Swappers Try Bribing T-Mobile and Verizon Staff $300
Not OK: SMS 2FA — Widespread spam targets carrier employees, as scrotes try harder to evade two-factor authentication ...
Apple OTP FAIL: ‘MFA Bomb’ Warning — Locks Accounts, Wipes iPhones
Rethink different: First, fatigue frightened users with multiple modal nighttime notifications. Next, call and pretend to be Apple support ...
Telegram Privacy Nightmare: Don’t Opt In to P2PL
Scary SMS shenanigans: Avoid Telegram’s new “Peer-To-Peer Login” program if you value your privacy or your cellular service ...
Key Differences Between Two-Factor Authentication (2FA) and Multi-Factor Authentication (MFA)
Two-factor authentication and multi-factor authentication are often used interchangeably; however, that’s not the case. Both authentication methods aim to strengthen security protocols and fortify security, but they differ. With this blog, let’s ...