Internet infrastructure company Cloudflare says the same attackers that went after Twilio also sent Cloudflare employees malicious SMS messages with links to phishing sites dressed up as an official company website. Despite employees at both companies taking the bait, Cloudflare said attackers were unable to snatch the full logon credentials of its workers because the company’s second layer of authentication isn’t time-limited one-time codes. Instead, every employee at the company is issued a FIDO2-compliant security key from a vendor like YubiKey. Although the attackers siphoned the credentials, the hard key authentication requirement stopped them from snatching a soft token that fooled employees otherwise would have entered into the phishing site.


More

Business Review: NETOPIA Payments launches Click to Pay: a simpler, faster, and more secure online payment experience

NETOPIA Payments becomes the first online payment processor in the world to implement Click to…

Read More →

Techradar Pro: Millions of Brits to be impacted by UK Gov decision to move away from passwords, 2FA and the replacement is far from perfect

The UK government has said it will roll out passkey technology across its digital services later in…

Read More →

Independent: Government to roll out passwords replacement on Gov.UK to boost cyber security

The National Cyber Security Centre said moving to digital passkeys to log on to Gov.UK…

Read More →


123275 Next