AI-powered
podcast player
Listen to all your favourite podcasts with AI-powered features
Cloning Concerns: Yubikey Vulnerabilities
This chapter delves into the recent cloning vulnerabilities found in Yubikeys, particularly focusing on the Yubikey 5 and its cryptographic weaknesses linked to an Infineon software library. It also discusses CrowdStrike's challenges in maintaining customer trust amidst competition and highlights a cybercrime case involving novice criminals exploiting one-time passwords.