by Ymir Vigfusson | Sep 10, 2024 | Publication
Multi-factor authentication (MFA) has long been seen as a strong defense against unauthorized access. But attackers have learned to exploit the weakest link in the chain: human behavior. Social engineering tactics have grown more sophisticated, rendering MFA systems...
by Ymir Vigfusson | Aug 26, 2024 | Publication
Date: September 12, 2024 Time: 16:00 – 18:00 Location: Bullseye 🎯, Snorrabraut 37, 105 Reykjavik It’s time for an informal Icelandic forum for cybersecurity. We are pleased to announce Skjaldtorg: Iceland’s Cybersecurity Meetup, aimed at professionals...
by Ymir Vigfusson | Aug 20, 2024 | Publication
Multi-factor authentication (MFA) is viewed as a key component of modern cybersecurity, but it’s far from invincible. As threats evolve, so do the techniques used to bypass even the most robust MFA implementations. We’ve categorized MFA vulnerabilities based on...
by Ymir Vigfusson | Aug 6, 2024 | Publication
For all its merits, over reliance on Multi-Factor Authentication (MFA) has become a real security problem. Like all security controls, MFA suffers from limitations, but unlike most security controls, MFA’s limitations are less well understood by security teams, which...
by Ymir Vigfusson | Jun 4, 2024 | Publication
At Keystrike nothing is more important to us than customer success, and success is built upon trust. In order to help our customers secure remote desktop connections, we must have stringent security practices internally. To demonstrate our commitment to the highest...
by Ymir Vigfusson | Apr 25, 2024 | Publication
Lateral movement is a stealthy and dangerous technique employed by cybercriminals to infiltrate and exploit secure networks. As organizations continue to strengthen their cybersecurity measures, it becomes imperative to understand the intricacies of lateral movement...
by Árni Thor Árnason | Apr 16, 2024 | Publication
Cybercriminals employ various methods and techniques to exploit vulnerabilities and gain unauthorized access to sensitive information. Two commonly used tactics are social engineering and phishing. While they may seem similar, it is crucial to understand the...
by Ymir Vigfusson | Apr 7, 2024 | Publication
Remote desktop protocol (RDP) has become an integral part of modern computing. It allows users to connect to and control remote computers, providing seamless access to resources and applications. However, with the increasing reliance on RDP, the security of this...
by Árni Thor Árnason | Mar 21, 2024 | Publication
Cyber threats are becoming increasingly sophisticated, and one of the methods employed to achieve social engineering is through exploiting MFA (Multi-Factor Authentication) fatigue. As individuals and organizations bolster their cybersecurity measures, it is essential...
by Ymir Vigfusson | Mar 18, 2024 | Publication
The commonly known term social engineering refers to the act of manipulating people to gain access to confidential information or to influence their behavior. While traditional social engineering involves the attacker posing as someone else to deceive the target,...