Internet infrastructure company Cloudflare says the same attackers that went after Twilio also sent Cloudflare employees malicious SMS messages with links to phishing sites dressed up as an official company website. Despite employees at both companies taking the bait, Cloudflare said attackers were unable to snatch the full logon credentials of its workers because the company’s second layer of authentication isn’t time-limited one-time codes. Instead, every employee at the company is issued a FIDO2-compliant security key from a vendor like YubiKey. Although the attackers siphoned the credentials, the hard key authentication requirement stopped them from snatching a soft token that fooled employees otherwise would have entered into the phishing site.


More

Biometric Update: 10 million passkeys registered for Mercari market app amid phishing crisis

Mercari, the Japanese e-commerce company behind the Mercari marketplace, has surpassed 10 million registered users of…

Read More →

Biometric Update: Yubico simplifies passwordless

Yubico, a provider of hardware authentication security keys, has announced the expanded availability of YubiKey…

Read More →

PYMNTS: Entersekt and Stanchion Team to Enhance Payment Integration

Authentication software company Entersekt has launched a partnership with South Africa-based PayTech solution provider Stanchion. The partnership is…

Read More →


123276 Next