Author: Liv Stanzer Back to HomeHome Archives for Liv Stanzer Select Category API Penetration TestAWSAzureBest PracticeCertificationsCloudCloud SecurityCompany NewsComparisionCore ValuesCostCurrent EventsDeliverablesEducationExternal Penetration TestFirewall Configuration ReviewGDPR ComplianceHIPAAHITRUSTHost Compliance AuditIncident ResponseInternal Penetration TestIoT Penetration TestingMobile Application Penetration TestingNIST/DFARS ComplianceOracle CloudOSINTPassword AuditPCI CompliancePenetration TestPhysical Penetration TestProblemsQuick TipsRansomwareRed TeamRegulatorySecure SLCSecurity Awareness TrainingSecurity ConsultingSensitive Data MappingSmall BusinessSocial EngineeringTabletop ExercisesUncategorizedVulnerability ManagementVulnerability WalkthroughWeb Application Penetration TestWireless Penetration Test Social Engineering How Attackers Bypass MFA: Anatomy of a Modern Phish Using Token Theft Multi-Factor Authentication (MFA) is one of the most widely recommended security controls out there. And for good reason. Requiring a … By: Liv Stanzer April 7, 2026 6 Min Read Load more
Social Engineering How Attackers Bypass MFA: Anatomy of a Modern Phish Using Token Theft Multi-Factor Authentication (MFA) is one of the most widely recommended security controls out there. And for good reason. Requiring a … By: Liv Stanzer April 7, 2026 6 Min Read