phishing-resistant authentication

Business

Okta Users Targeted by Advanced Phishing & Vishing Kits

New phishing kits enable real-time credential interception and control of authentication flows, targeting users of major identity platforms like Google…

Read More »
AI & Tech

AI and Complexity: The New Identity Protection Challenge

Identity security is now a strategic cybersecurity pillar due to remote work, cloud adoption, and digital ecosystems, demanding greater organizational…

Read More »
AI & Tech

Phishing-Resistant Authentication: How Hackers Still Bypass It

Phishing-resistant authentication methods like passkeys and FIDO2-based systems (e.g., YubiKeys) improve security, but attackers exploit weaknesses such as downgrade attacks…

Read More »