Internet infrastructure company Cloudflare says the same attackers that went after Twilio also sent Cloudflare employees malicious SMS messages with links to phishing sites dressed up as an official company website. Despite employees at both companies taking the bait, Cloudflare said attackers were unable to snatch the full logon credentials of its workers because the company’s second layer of authentication isn’t time-limited one-time codes. Instead, every employee at the company is issued a FIDO2-compliant security key from a vendor like YubiKey. Although the attackers siphoned the credentials, the hard key authentication requirement stopped them from snatching a soft token that fooled employees otherwise would have entered into the phishing site.


More

New Scientist: Passwords will be on the way out in 2026 as passkeys take over

Can you remember all your passwords off the top of your head? If so, you…

Read More →

Biometric Update: NIST announces new mDL use case, resources to support financial sector adoption

A webinar on mobile driver’s licenses (mDLs), presented by the National Cybersecurity Center of Excellence…

Read More →

Cyber Insider: Telegram adds passkey support for secure frictionless logins

Telegram has introduced support for passkeys in its latest update, marking a significant shift away…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.