
How Threat Actors Bypass Multi-Factor Authentication
The Defender's Advantage Podcast
00:00
Securing Multi-Factor Authentication
This chapter explores the vulnerabilities of mobile-based multi-factor authentication methods, focusing on threats like SIM swapping and push notification phishing. It advocates for stronger alternatives, emphasizing the need for robust MFA solutions for privileged users to counteract exploitation techniques like MFA fatigue and man-in-the-middle attacks.
Transcript
Play full episode