Deep Dive Analysis of Multi-Factor Authentication Request Generation Attacks

Logo
Presented by

Four-time Microsoft MVP Nick Cavalanci, LogRhythm Threat Research Engineers, Sally Vincent and Dan Kaiser

About this talk

With so many phishing attacks targeting credentials, more organizations are realizing they need multi-factor authentication (MFA) for users with access to critical data. In this webinar, four-time Microsoft MVP Nick Cavalanci, along with LogRhythm Threat Research Engineers, Sally Vincent and Dan Kaiser, discuss: • Real-world examples of MFA prompt bombing • Mitigation strategies to thwart this kind of attack Sally and Dan guide you through an analysis of MFA product logs relevant to detect unusual authentication activity. Throughout their threat hunting example, you will observe real-time detection of multi-factor authentication request generation using LogRhythm’s dashboarding, investigation, and real-time analytics capability. Watch this on-demand webinar to gain insight into MFA prompt bombing and mitigation strategies!

Related topics:

More from this channel

Upcoming talks (8)
On-demand talks (227)
Subscribers (71278)
LogRhythm helps busy and lean security operations teams save the day—day after day. There’s a lot riding on the shoulders of security professionals—the reputation and success of their company, the safety of citizens and organizations across the globe, the security of critical resources—the weight of protecting the world. LogRhythm helps lighten this load. The company is on the frontlines defending against many of the world’s most significant cyberattacks and empowers security teams to navigate an ever-changing threat landscape with confidence. As allies in the fight, LogRhythm combines a comprehensive and flexible security operations platform, technology partnerships, and advisory services to help SOC teams close the gaps.