RivanorthProblog.rivanorth.comΒ·Jul 8, 2024Responding to the Twilio Authy HackEarly July 2024, Twilio has disclosed that hackers took advantage of an unauthenticated endpoint in Authy's API to enumerate data associated with Authy accounts, including phone numbers. Following the compromise of Twilio's Authy multi factor authent...DiscussSecurity AdvisorySecurity
Haiman Sherhaimanshercloud.hashnode.devΒ·Jul 3, 2024Security Enhancement Tips: AWS IAM and MFA ExplainedIn the fast-paced world of cloud computing, ensuring robust security and efficient access management is paramount. AWS Identity and Access Management (IAM) and Multi-Factor Authentication (MFA) provide essential tools to meet these needs. Hereβs a de...DiscussAWS
Caroline Johnsoncarolinejohnsoncj.hashnode.devΒ·Jun 28, 2024Secure and Simple: The Future of Authentication with Push Notification MFAIntroduction In the ever-evolving digital landscape, ensuring secure and seamless customer authentication is paramount. Traditional password-based authentication has long been the standard but comes with significant security risks. Weak passwords, re...DiscussMFA
David Nguyeneplus.devΒ·Jun 21, 2024[Knowledge check] Describe Azure identity, access, and securityThis module covers some of the authorization and authentication methods available with Azure. Learning objectives By the end of this module, you will be able to: Describe directory services in Azure, including Microsoft Entra ID and Microsoft Entra ...DiscussTip & TricksAzure
Baruch MettlerforPangea Blogpangea.cloudΒ·Jun 17, 2024Find Exposed Users with Credential Leak MonitoringBusinesses face a growing number of security threats, however, despite wide rollout of multi-factor authentication (MFA) and a wide compliance level focus on password policies, credential compromise remains a significant threat. Monitoring for creden...DiscussΒ·433 readsMFA
Henri Cookblog.henricook.comΒ·Jun 16, 2024Finally Getting Away from Authy for 2FAAs an experienced Software Engineer, keeping my systems secure is crucial. However, when the tools I rely on stop meeting my needs, itβs time for a change. Recently, I faced this dilemma with Authy. Authy, a popular two-factor authentication (2FA) ap...Discussauthentication
Shaileshshaileshpashte.hashnode.devΒ·Jun 13, 2024Day 3: Understanding AWS IAM β: Users πββοΈ, Groups π₯, Policies β π«, and MFA (Multi Factor Authentication) π‘π πIntroduction Welcome to Day 3 3οΈβ£ **of our AWS learning journey!**ππ Today, we delve into one of the foundational services of AWS: Identity and Access Management (IAM)π‘π. In simple words, it is user management utility of AWS through which you can...DiscussΒ·33 readsAWS
Jackson Markrealtech.hashnode.devΒ·Jun 11, 2024How Does Multi-Factor Authentication (MFA) Work?In today's digital age, securing sensitive information has become more critical than ever. As cyber threats evolve and become increasingly sophisticated, relying solely on passwords is no longer sufficient to protect your online accounts. This is whe...DiscussMFA
Jackson Markrealtech.hashnode.devΒ·Jun 6, 2024A Comprehensive Guide to Implementing Multi-Factor Authentication (MFA)In the evolving digital landscape, securing sensitive information has never been more critical. Cyber threats are increasingly sophisticated, making traditional single-factor authentication methods, such as passwords, inadequate. Multi-Factor Authent...DiscussMFA
Ketty C.cyberjournal.ioΒ·Jun 4, 2024Brute Force Attacks: Definition and Prevention TipsWe're currently in the final phase of our school project, focusing on configuring and safeguarding virtual machines for an organisation to equip its employees for remote work. I'm specifically handling the implementation of brute force protection and...Discuss#cybersecurity