Internet infrastructure company Cloudflare says the same attackers that went after Twilio also sent Cloudflare employees malicious SMS messages with links to phishing sites dressed up as an official company website. Despite employees at both companies taking the bait, Cloudflare said attackers were unable to snatch the full logon credentials of its workers because the company’s second layer of authentication isn’t time-limited one-time codes. Instead, every employee at the company is issued a FIDO2-compliant security key from a vendor like YubiKey. Although the attackers siphoned the credentials, the hard key authentication requirement stopped them from snatching a soft token that fooled employees otherwise would have entered into the phishing site.


More

BetaNews: Research confirms consumers are turning to passkeys to protect their accounts

As you’ll already know, today is World Passkey Day and the FIDO Alliance has released an independent study of…

Read More →

Cyber Security News: 15 Billion User Gain Passwordless Access to Microsoft Account Using Passkeys

As the first-ever World Passkey Day replaces the traditional World Password Day, Microsoft joins the…

Read More →

Forbes: Microsoft Warns All Windows Users—Delete Your Password

Microsoft is on a mission to delete passwords for a billion users, given that “the password era…

Read More →