The FBI said that the hackers gained access to an NGO cloud by abusing default MFA protocols. They enrolled their own device into the organization’s Duo MFA.
Support the originator by clicking the read the rest link below.
Information about Cyber Security and Threat Intelligence should spread as fast as possible. Our goal is to collect these sources and place them all in one area for quick reading. If the information is important to the viewer and they want more information, we forward them to the direct source. The more people talking about cyber security and the more people sharing the information, the better!
If you have a resource that should be added, please let us know via the contact form. We will review the information and get back to you.