Remove Accountability Remove Authentication Remove Consumer Services Remove Phishing
article thumbnail

The Original APT: Advanced Persistent Teenagers

Krebs on Security

“They would just keep jamming a few individuals to get [remote] access, read some onboarding documents, enroll a new 2FA [two-factor authentication method] and exfiltrate code or secrets, like a smash-and-grab,” the CXO said. “Someone was trying to phish employee credentials, and they were good at it,” Wired reported.

article thumbnail

NEW TECH: ‘Passwordless authentication’ takes us closer to eliminating passwords as the weak link

The Last Watchdog

Compromised logins continue to facilitate cyber attacks at all levels, from phishing ruses to credential stuffing to enabling hackers to probe deep inside of a breached network. The hitch, of course, is that password-enabled account logins are too deeply engrained in legacy network infrastructure.

Passwords 164