
How Threat Actors Bypass Multi-Factor Authentication
The Defender's Advantage Podcast
00:00
Exploiting Vulnerabilities: The Art of Cyber Intrusion
This chapter investigates a year-long cyber intrusion by a financially motivated threat actor, emphasizing their methods of exploiting an organization's virtual desktop environment to access sensitive financial data. It further discusses the vulnerabilities in access policies and the critical role of stolen credentials and session tokens in circumventing security measures.
Transcript
Play full episode