Previously on... In my previous post, I stated that I will begin a series that will give the reader insight into my journey of protecting my data. I summed up multiple subjects I want to explore. I already put my IoT devices on my guest network. But ...
dotnet.kriebbels.me5 min read
The 2FA protection they used, asked for approval. The senior developer approved the login, so the hackers were able to access the vault.
Jeepers. I didn't read up on the breach at LastPass before. That's crazy.
Kristof Riebbels
Software Development
Could not believe that either. 🫣