The AI Forgery Epidemic: The Growing Threat of AI-Generated Fake Documents

The AI Forgery Epidemic: The Growing Threat of AI-Generated Fake Documents

As CEO of HYPR, I spend a lot of time thinking about the future of identity security. And right now, one of the most significant shifts we're witnessing is driven by the ...
Why Probabilistic Security is Failing: The Case for Deterministic Identity Assurance

Why Probabilistic Security is Failing: The Case for Deterministic Identity Assurance

When Security Experts Get Phished Even the most seasoned cybersecurity professionals can fall victim to sophisticated phishing attacks. The phishing attack that gained access to Troy Hunt's Mailchimp account isn't just another ...
HYPR and IDEMIA Partner to Extend Smart ID Badge Security

HYPR and IDEMIA Partner to Extend Smart ID Badge Security

Unlock Seamless Security: Combining Physical and Digital Access with HYPR and IDEMIA Your organization spans a physical and a virtual environment, but how well aligned are your strategies for securing both? With ...
Top Passwordless Identity Assurance Trends for 2025

Top Passwordless Identity Assurance Trends for 2025

“The Renaissance Man” was attributed to Leonardo da Vinci because he symbolized the focus of the Renaissance era: boundless human potential. The 2025 State of Passwordless Identity Assurance Report revolves around the ...
HYPR QR Demo

Beyond SMS: HYPR’s Perspective on Gmail’s Shift to QR Code Authentication

SMS-based, two-factor authentication (2FA) has long been a staple security measure for many online services, including Gmail. However, as the tech industry shifts towards more secure authentication methods, it has become evident ...
Implementing FIDO2 Authentication: A Developer's Step-by-Step Guide

Implementing FIDO2 Authentication: A Developer’s Step-by-Step Guide

Discover the essentials of FIDO2 authentication implementation in this developer-focused guide. We'll walk you through the process step-by-step, covering key concepts, best practices, and code examples to help you integrate secure, passwordless ...
Evilginx Attack Demo: How Hackers Bypass Microsoft MFA

How to Prevent Evilginx Attacks Targeting Entra ID

Attackers continually refine their methods to compromise user identities and gain unauthorized access to sensitive systems. One particularly insidious threat is Evilginx, a phishing framework designed to bypass traditional multi-factor authentication (MFA) ...
What Is Phishing-Resistant MFA and How Does it Work?

What Is Phishing-Resistant MFA and How Does it Work?

Phishing, despite its somewhat innocuous name, remains one of the foremost security threats facing businesses today. Improved awareness by the public and controls such as multi-factor authentication (MFA) have failed to stem ...
A YubiKey 5

Yikes, YubiKey Vulnerable — ‘EUCLEAK’ FIDO FAIL?

USB MFA SCA😱: Infineon hardware and software blamed for timing side-channel attack on popular auth tokens ...
Security Boulevard
HYPR and Microsoft Partner on Entra FIDO2 Provisioning APIs

HYPR and Microsoft Partner on Entra FIDO2 Provisioning APIs

Yesterday at the Black Hat conference, Microsoft announced the public preview of Entra FIDO2 provisioning APIs. HYPR worked closely with Microsoft on these critical enhancements, which make it easier for Entra customers ...