How to better secure user authentication protocols
CyberSecurity Insiders
OCTOBER 4, 2021
The vulnerability, dubbed ProxyToken, lets attackers bypass the authentication process to access victims’ emails and configure their mailboxes. Normally, Exchange uses two sites, a front and back end, to authenticate users. ProxyToken sends an authentication request with a non-empty SecurityToken cookie to trigger this feature.
Let's personalize your content