Artwork

Content provided by Threatscape. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Threatscape or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.
Player FM - Podcast App
Go offline with the Player FM app!

Dr Nestori Syynimaa on Key Defence Strategies Against Token Theft

32:53
 
Share
 

Manage episode 473427032 series 3569217
Content provided by Threatscape. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Threatscape or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

🔒 How Attackers Steal Tokens & Bypass MFA – What You Need to Know!

Cybercriminals are evolving—and token theft is now one ofthe biggest threats in identity security. In this episode of the Threatscape Podcast, Ru Campbell sits down with Dr Nestori Syynimaa to uncover how attackers steal authentication tokens, bypass MFA, and infiltrate organisations undetected.

🔹 The rise of token theft & identity attacks🔹 How adversaries use AiTM phishing & post-issuance token theft🔹 Real-world insights from Microsoft’s security research🔹 Best practices to protect against identity compromise

💡 Want to stay ahead of cyber threats? Watch now and learn how to secure your organisation against token-based attacks.

📌 Resources & Links:
🔗 Follow Dr Nestori Syynimaa: https://www.linkedin.com/today/author/nestori
🔗 More cybersecurity insights: https://www.threatscape.com/cyber-security-insights/
🔗 Subscribe for more security content!

👍 Like & Share this video to spread awareness!

💬 Comment below: What’s your biggest concern about token security?

  continue reading

23 episodes

Artwork
iconShare
 
Manage episode 473427032 series 3569217
Content provided by Threatscape. All podcast content including episodes, graphics, and podcast descriptions are uploaded and provided directly by Threatscape or their podcast platform partner. If you believe someone is using your copyrighted work without your permission, you can follow the process outlined here https://ppacc.player.fm/legal.

🔒 How Attackers Steal Tokens & Bypass MFA – What You Need to Know!

Cybercriminals are evolving—and token theft is now one ofthe biggest threats in identity security. In this episode of the Threatscape Podcast, Ru Campbell sits down with Dr Nestori Syynimaa to uncover how attackers steal authentication tokens, bypass MFA, and infiltrate organisations undetected.

🔹 The rise of token theft & identity attacks🔹 How adversaries use AiTM phishing & post-issuance token theft🔹 Real-world insights from Microsoft’s security research🔹 Best practices to protect against identity compromise

💡 Want to stay ahead of cyber threats? Watch now and learn how to secure your organisation against token-based attacks.

📌 Resources & Links:
🔗 Follow Dr Nestori Syynimaa: https://www.linkedin.com/today/author/nestori
🔗 More cybersecurity insights: https://www.threatscape.com/cyber-security-insights/
🔗 Subscribe for more security content!

👍 Like & Share this video to spread awareness!

💬 Comment below: What’s your biggest concern about token security?

  continue reading

23 episodes

All episodes

×
 
Loading …

Welcome to Player FM!

Player FM is scanning the web for high-quality podcasts for you to enjoy right now. It's the best podcast app and works on Android, iPhone, and the web. Signup to sync subscriptions across devices.

 

Quick Reference Guide

Listen to this show while you explore
Play