What security measures does YubiKey take to secure its hardware from malicious firmware tampering? [closed]

We’ve all certainly heard about the widely overhyped BadUSB exploits on the Physon microcontrollers.
There’s certainly a high potential of gaining something by targeting such a specific device, which is designed to only contain secrets.
Ev… Continue reading What security measures does YubiKey take to secure its hardware from malicious firmware tampering? [closed]

Can a website access your browser password vault using a button that the user clicks? [duplicate]

I’m asking this question because almost all new websites ask us to click Accept Cookies button. So I click it reluctantly.
I am afraid that the Accept Cookies button action would trigger some script written on that website or its server th… Continue reading Can a website access your browser password vault using a button that the user clicks? [duplicate]

Bypassing Two-Factor Authentication

These techniques are not new, but they’re increasingly popular:

…some forms of MFA are stronger than others, and recent events show that these weaker forms aren’t much of a hurdle for some hackers to clear. In the past few months, suspected script kiddies like the Lapsus$ data extortion gang and elite Russian-state threat actors (like Cozy Bear, the group behind the SolarWinds hack) have both successfully defeated the protection.

[…]

Methods include:

  • Sending a bunch of MFA requests and hoping the target finally accepts one to make the noise stop.

Continue reading Bypassing Two-Factor Authentication

If the connection is encrypted, is it still unsafe to login at a public network?

It’s common knowledge that one shouldn’t login to personal or bank accounts on public wifi such as in a starbucks or a hotel. However, assuming that the connection is HTTPS and the passwords itself are encrypted, how is it not secure? Beca… Continue reading If the connection is encrypted, is it still unsafe to login at a public network?

The security gaps that can be exposed by cybersecurity asset management

Cybersecurity asset management does not come with the excitement following the metaverse, blockchain, or smokescreen detection technologies, but it is essential for the protection of corporate infrastructure. It is no secret that just one vulnerable, u… Continue reading The security gaps that can be exposed by cybersecurity asset management