Cloudflare employees were recently targeted by a “sophisticated” cyberattack, and even though some fell for the scheme, the DDoS protection company managed to successfully defend itself. 

In a blog post(opens in new tab), Cloudflare co-founder Matthew Prince, together with team members Daniel Stinson-Diess and Sourov Zaman, explained how the attack happened and what made the difference between success and failure.

The threat actor made a couple of key preparations ahead of the attack: they registered a domain that looked legitimate and would fool many victims: cloudflare-okta.com. Okta is Cloudflare’s identity provider. They also managed to somehow obtain the phone numbers of almost 80 Cloudflare employees, as well as family members for some.


More

The Wall Street Journal: Hate passwords? It’s time to try passkeys

I no longer need a password to sign into Google. From now on, it’s “Adios,…

Read More →

Wired: Google is rolling out password-killing tech to all accounts

Google’s announcement of its passkey rollout comes on the eve of World Password Day on…

Read More →

PC Mag: Misinformation, MFA Doubts, and AI: Everything We Saw at RSAC 2023

The RSA Conference further proved that passwords are a problem. The solution, we’re told, lies in…

Read More →


Subscribe to the FIDO newsletter

Stay Connected, Stay Engaged

Receive the latest news, events, research and implementation guidance from the FIDO Alliance. Learn about digital identity and fast, phishing-resistant authentication with passkeys.