#1 Trusted Cybersecurity News Platform
Followed by 4.50+ million
The Hacker News Logo
Subscribe – Get Latest News

Multi-Factor Authentication | Breaking Cybersecurity News | The Hacker News

Category — Multi-Factor Authentication
Locking Out Threats: The Evolving Threat of Account Takeovers

Locking Out Threats: The Evolving Threat of Account Takeovers

Apr 07, 2025
Multi-factor authentication has long been touted to protect accounts. Organizations implement it, feel protected and move on. But today's attackers have evolved and so should defenses. Preventing access is ideal. But in the event a bad actor gets access, containment becomes a priority. Threat actors aren't always spending their time actively forcing their way into accounts. Instead, they're taking the easy route, logging in with stolen credentials and using MFA bypass techniques.  Account takeovers (ATO) lets attackers slip into organizational environments unnoticed , where they can move laterally, escalate privileges, and quietly steal valuable information and data. And now, they're increasingly logging in even with MFA in place. From social engineering to session hijacking, the tactics have become more sophisticated and more dangerous. The Reality: MFA Can Be Bypassed Authentication is still crucial for defense, but standard MFA is quickly being outmaneuvered by bad actors....
How Does Threat Intelligence Apply to SaaS Security? And Why You Should Care

How Does Threat Intelligence Apply to SaaS Security? And Why You Should Care

Sept 16, 2024
In just a few clicks, any SaaS app can turn into a company's go-to system for collaboration, record keeping, CRM, workflow organization, marketing, human resource management, and more. These apps can also act as footholds from which threat actors can pivot into corporate environments and steal critical data.  The rapid adoption of SaaS apps is outpacing the implementation of necessary security measures. The rise in attacks—such as account takeovers and credential leaks—highlights this gap. On the users' end, the responsibilities include taking a security-first approach to account configuration i.e., continuously monitoring for access risks and emerging threats to their data. But with so many users, so many apps and so much data, it's easier said than done.  What leaves companies exposed to data breaches and leaks is the lack of clarity, context, and prompt action. Security teams must make a massive effort to research threats, filter the relevant ones, assess the impact of p...
Cybersecurity Resources