
Passkeys: Their Impact & Their Vulnerabilities
With the shift from passwords to passkeys, security posture stands a chance at optimization. But it’s still susceptible to compromise. We examine how.
With the shift from passwords to passkeys, security posture stands a chance at optimization. But it’s still susceptible to compromise. We examine how.
We explore two-factor authentication (2FA) and multi-factor authentication (MFA) and why these added layers of security are critical to protecting your organization.
Our survey of IT security leaders found organizations are investing in layers of defense against authentication-based attacks, but it still isn’t enough. Here we discuss the issues with passwords, passkeys, and MFA + additional steps beyond these measures security teams can take to close the gaps in their defenses.
Session cookies siphoned from unmanaged devices infected with malware pose a significant threat to enterprises. Learn how criminals use stolen web session cookies to access enterprises and launch cyberattacks.
The SpyCloud Research team takes an in-depth look at anti-detect browsers and how they are being leveraged alongside stolen credentials and cookies to bypass MFA and easily log into targeted accounts.
A look back at the threat landscape that experts were predicting over the last five years to see how the industry has changed – and what could be ahead.
Increased adoption of MFA is a good thing for cybersecurity, especially as remote work grows in popularity – and preference – but humans remain the weakest link.
MFA keeping you up at night? It probably should. Check out these common MFA bypass techniques and why another layer of account protection is necessary.
Understand MFA implementation and adoption challenges and learn steps you can take to strengthen its effectiveness.