Did you know that Evilginx allows Hackers to Defeat 2FA

This title could be clearer and more informative.Try out Clickbait Shieldfor free (5 uses left this month).

A cybersecurity expert explains the limitations of 2FA/MFA, covering attack vectors like SIM swapping, MFA bombing, and session token/cookie theft. The discussion highlights how tools like Evilginx (a reverse proxy) can intercept authentication tokens even when MFA is properly used. Best practices for password hygiene, authenticator apps vs SMS, hardware keys, and threat modeling are covered. The conversation also introduces ThreatLocker's zero trust cloud access product, which routes traffic through trusted infrastructure to block stolen-cookie attacks by enforcing IP-based conditional access policies.

38m watch time

Sort: