two factor authentication

Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins
Daniel Kelley | | 2fa, 2FA bypass, Astaroth, bec, credential theft, cybercrime, Cybersecurity, Email Protection, MFA, Microsoft 365, Phishing, phishing attack, Phishing Attacks, phishing kit, phishing kits, reverse proxy, Session hijacking, social engineering, Threat Discovery, two factor authentication
Phishing attacks continue to evolve, pushing even the most secure authentication methods to their limits. First advertised on cybercrime networks in late January 2025, Astaroth is a brand new phishing kit that ...

Astaroth: A New 2FA Phishing Kit Targeting Gmail, Yahoo, AOL, O365, and 3rd-Party Logins
Daniel Kelley | | 2fa, 2FA bypass, Astaroth, bec, credential theft, cybercrime, Cybersecurity, Email Protection, MFA, Microsoft 365, Phishing, phishing attack, Phishing Attacks, phishing kit, phishing kits, reverse proxy, Session hijacking, social engineering, Threat Discovery, two factor authentication
Phishing attacks continue to evolve, pushing even the most secure authentication methods to their limits. First advertised on cybercrime networks in late January 2025, Astaroth is a brand new phishing kit that ...

Best of 2024: AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again
Richi Jennings | | 2 factor auth, 2-factor authentication, 2fa, ATT, Cloud MFA, Data leak, DUAL FACTOR AUTHENTICATION, MFA, mult-factor authentication, multi-factor authenication, Multi-Factor Authentication, Multi-Factor Authentication (MFA), Multifactor Authentication, NYSE:SNOW, NYSE:T, Privacy, SB Blogwatch, ShinyHunters, snowflake, threats, two factor authentication, UNC5537
Should’ve used MFA: $T loses yet more customer data—this time, from almost all of them ...
Security Boulevard
Roger Grimes on Prioritizing Cybersecurity Advice
This is a good point: Part of the problem is that we are constantly handed lists…list of required controls…list of things we are being asked to fix or improve…lists of new projects…lists ...

Authy Breach: What It Means for You, RockYou 2024 Password Leak
Tom Eston | | 2fa, Authy, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, MFA, Multi-Factor Authentication, Password, password leak, password list, passwords, Phishing, Podcast, Podcasts, Privacy, RockYou, RockYou2024, security, SIM swapping, social engineering, technology, two factor authentication, Weekly Edition
In episode 338, we discuss the recent breach of the two-factor authentication provider Authy and its implications for users. We also explore a massive password list leak titled ‘Rock You 2024’ that ...

AT&T Says 110M Customers’ Data Leaked — Yep, it’s Snowflake Again
Richi Jennings | | 2 factor auth, 2-factor authentication, 2fa, ATT, Cloud MFA, Data leak, DUAL FACTOR AUTHENTICATION, MFA, mult-factor authentication, multi-factor authenication, Multi-Factor Authentication, Multi-Factor Authentication (MFA), Multifactor Authentication, NYSE:SNOW, NYSE:T, Privacy, SB Blogwatch, ShinyHunters, snowflake, threats, two factor authentication, UNC5537
Should’ve used MFA: $T loses yet more customer data—this time, from almost all of them ...
Security Boulevard

Ticketmaster is Tip of Iceberg: 165+ Snowflake Customers Hacked
Richi Jennings | | 2 factor auth, 2-factor authentication, 2fa, Advance Auto Parts, Brad Jones, Breach Forums, BreachForums, Buying event tickets online and cybersecurity, Cloud MFA, Data leak, DUAL FACTOR AUTHENTICATION, Event ticketing industry, infostealer, infostealers, LendingTree, Mandiant, Mandiant report, MFA, mult-factor authentication, multi-factor authenication, Multi-Factor Authentication, Multi-Factor Authentication (MFA), Multifactor Authentication, NYSE:SNOW, Privacy, QuoteWizard, Ransomware, SB Blogwatch, ShinyHunters, snowflake, Taylor Swift, threats, Ticketmaster, two factor authentication, UNC5537
Not our fault, says CISO: “UNC5537” breached at least 165 Snowflake instances, including Ticketmaster, LendingTree and, allegedly, Advance Auto Parts ...
Security Boulevard

Ticketmaster Data Breach and Rising Work from Home Scams
Tom Eston | | Business, Cloud, Cloud Security, Cyber Security, Cybersecurity, Data breach, Data Privacy, Digital Privacy, Episodes, Information Security, Infosec, jobs, Live Nation, LiveNation, Monopoly, Multi-Factor Authentication, Pandemic, Podcast, Podcasts, Privacy, Return to Office, RTO, Scams, security, snowflake, technology, Ticketmaster, two factor authentication, Weekly Edition, WFH, work, work from home
In episode 333 of the Shared Security Podcast, Tom and Scott discuss a recent massive data breach at Ticketmaster involving the data of 560 million customers, the blame game between Ticketmaster and ...

SIM Swappers Try Bribing T-Mobile and Verizon Staff $300
Richi Jennings | | 2fa, 2FA bypass, 2FA Flaws, 2FA policies, 2FA/MFA, bypass 2FA, Industry Insider, Insider, Insider attack, Insider Attacks, insider breach, Insider Fraud, insider risk, malicious social engineering, MFA, MFA hacks, mfa login, MFA Methods, Multi-Factor Authentication, Multi-Factor Authentication (MFA), Multifactor Authentication, SB Blogwatch, SIM swap, sim swap fraud, SIM swap scams, SIM swapping, sms scam, SMS scams, SMS Spam, SMS Spamming, social engineeering, T-Mobile, t-mobile breach, t-mobile data breach, T-Mobile hack, two factor authentication, two-factor-authentication.2fa, verizon, verizon data breach, Verizon Wireless
Not OK: SMS 2FA — Widespread spam targets carrier employees, as scrotes try harder to evade two-factor authentication ...
Security Boulevard
Crypto Phishing Kit Impersonating Login Pages: Stay Informed
Wajahat Raja | | Crypto Fraud Prevention, Crypto Phishing, CryptoChameleon, Cryptocurrency Security, Cybersecurity, Cybersecurity News, Financial Institutions Security, LabHost, LabRat, Phishing, smishing, SMS Spamming, two factor authentication
In the ever-evolving landscape of cybersecurity, a fresh menace has emerged, targeting crypto enthusiasts through a sophisticated phishing kit. This crypto phishing kit, part of an elaborate attack scheme dubbed CryptoChameleon, is ...