This page is fully or partially automatically translated.

Send message to

Do you want to send the message without a subject?
Please note that your message can be maximum 1000 characters long
Special characters '<', '>' are not allowed in subject and message
reCaptcha is invalid.
reCaptcha failed because of a problem with the server.

Your message has been sent

You can find the message in your personal profile at "My messages".

An error occured

Please try again.

Make an appointment with

So that you can make an appointment, the calendar will open in a new tab on the personal profile of your contact person.

Create an onsite appointment with

So that you can make an onsite appointment, the appointment request will open in a new tab.

Header of Eye Security GmbH
Forums it-sa Expo Knowledge Forum A

Is MFA dead? Live hack & defense demo - how hackers bypass MFA

Digital identities are a lucrative target for cybercriminals. How common MFA procedures are circumvented + how to protect yourself against them.

calendar_today Tue, 22.10.2024, 17:00 - 17:30

event_available On site

place Forum, Booth 6-215

Action Video

south_east

Action description

south_east

Themes

Trend topic

Event

This action is part of the event Forums it-sa Expo

Action Video

grafischer Background
close

This video is available to the it-sa 365 community. 
Please register or log in with your login data.

Action description

Today, digital identities are a lucrative target for cybercriminals. They are the gold and oil of the digital age and enable access to a wide range of services, such as online banking, email or direct access to company networks and resources. 

For this reason, various organizations and regulations recommend or require the use of multifactor authentication (MFA) to reduce the threat of compromised credentials. Unfortunately, not all MFA methods used are resistant to attacks. Depending on the method, they are vulnerable to phishing, exploitation of vulnerabilities in System 7 (SS7), push bombing or SIM swap attacks. If these attacks are used successfully, attackers can gain access to MFA credentials or bypass MFA completely to gain access to MFA-protected systems.

In our demonstration, we show how cybercriminals can circumvent common MFA procedures. In addition, you will learn how we at Eye Security ensure the security of our medium-sized customers in connection with MFA-secured yet compromised user accounts. In addition, you will learn how the employees in our SOC recognize and respond to attacks based on alerts from the endpoint detection and response solutions used.
... read more

Language: German

Questions and Answers: No

close

This content or feature is available to the it-sa 365 community. 
Please register or log in with your login data.