Episode Four of Phish Stories
The Cybersecurity & Infrastructure Security Agency (CISA) issued a warning in early 2021 that hackers are using the cloud to bypass MFA. According to a recent Osterman study, 74% of security professionals from mid to large-sized organizations believe MFA is the most effective mitigation against credential stealing.
Hackers are abusing the trust in authenticated services that many organizations rely on heavily for protection. Understanding and preparing for how these silent but dangerous attacks are hacking into human vulnerabilities are imperative for protecting your organization.
Join SlashNext’s founder and cybersecurity expert, Atif Mushtaq, and CEO Patrick Harr to learn about the multitude of techniques hackers are using to bypassing MFA and explore real-life examples of how these attacks are challenges organizations.
Host Scott D. Lowe Partner, ActualTech Media
Special Guest Patrick Harr CEO, SlashNext
Special Guest Atif Mushtaq Founder & Chief Product Officer, SlashNext
What You'll Learn
- How hackers are using the cloud, AI, and behavioral targeting to increasing success
- Latest MFA attacks that are targeting users now through compromised cloud infrastructure, rogue software, man-in-the-middle attacks, fake 2FA request, and security warnings
- Recommendations and resources for protecting your environment from MFA compromise