The Defender's Advantage Podcast cover image

How Threat Actors Bypass Multi-Factor Authentication

The Defender's Advantage Podcast

00:00

Exploiting Vulnerabilities: The Art of Cyber Intrusion

This chapter investigates a year-long cyber intrusion by a financially motivated threat actor, emphasizing their methods of exploiting an organization's virtual desktop environment to access sensitive financial data. It further discusses the vulnerabilities in access policies and the critical role of stolen credentials and session tokens in circumventing security measures.

Transcript
Play full episode

The AI-powered Podcast Player

Save insights by tapping your headphones, chat with episodes, discover the best highlights - and more!
App store bannerPlay store banner
Get the app