Tag: 2fa
-
Hackers can steal 2FA codes and private messages from Android phones
Malicious app required to make “Pixnapping” attack work requires no permissions. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/10/no-fix-yet-for-attack-that-lets-hackers-pluck-2fa-codes-from-android-phones/
-
‘Aggressive’ Akira Ransomware Blitz Clubs SonicWall 2FA to DEATH
Strange factors: Yet another security problem plaguing SonicWall customers. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/sonicwall-akira-ransomware-richixbw/
-
Cybersecurity Snapshot: CISA Highlights Vulnerability Management Importance in Breach Analysis, as Orgs Are Urged To Patch Cisco Zero-Days
Tags: 2fa, access, advisory, api, attack, authentication, breach, business, cisa, cisco, cloud, control, credentials, crime, cve, cyber, cybersecurity, data, defense, endpoint, exploit, fido, finance, firewall, framework, github, grc, guide, identity, incident response, infrastructure, Internet, ISO-27001, kev, law, lessons-learned, malicious, malware, mfa, mitigation, monitoring, network, open-source, phishing, privacy, ransomware, risk, saas, scam, security-incident, service, soc, software, supply-chain, tactics, threat, update, vpn, vulnerability, vulnerability-management, worm, zero-dayCISA’s takeaways of an agency hack include a call for timely vulnerability patching. Plus, Cisco zero-day bugs are under attack, patch now. Meanwhile, the CSA issued a framework for SaaS security. And get the latest on the npm breach, the ransomware attack that disrupted air travel and more! Here are six things you need to…
-
Avoiding 2FA for Local Accounts: Best Practices
Explore best practices for avoiding 2FA on local accounts while maintaining strong security. Learn about alternative authentication methods and robust security policies. First seen on securityboulevard.com Jump to article: securityboulevard.com/2025/09/avoiding-2fa-for-local-accounts-best-practices/
-
GitHub moves to tighten npm security amid phishing, malware plague
Hundreds of compromised packages pulled as registry shifts to 2FA and trusted publishing First seen on theregister.com Jump to article: www.theregister.com/2025/09/23/github_npm_registry_security/
-
GitHub tightens npm security with mandatory 2FA, access tokens
GitHub is introducing a set of defenses against supply-chain attacks on the platform that led to multiple large-scale incidents recently. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/github-tightens-npm-security-with-mandatory-2fa-access-tokens/
-
GitHub Mandates 2FA and Short-Lived Tokens to Strengthen npm Supply Chain Security
GitHub on Monday announced that it will be changing its authentication and publishing options “in the near future” in response to a recent wave of supply chain attacks targeting the npm ecosystem, including the Shai-Hulud attack.This includes steps to address threats posed by token abuse and self-replicating malware by allowing local publishing with required two-factor…
-
How npm Security Collapsed Thanks To a 2FA Exploit
Billions (No, that’s not a typo, Billions with a capital B) of files were potentially compromised. If you thought Node Package Manager (npm), the JavaScript runtime environment Node.js’s default package manager, had finally stopped having serious security problems, you thought wrong. This time, a two-factor authentication (2FA) phishing attack left developers frustrated, angry, and in..…
-
Phishing schlägt 2FA: Massiver Angriff auf npm-Pakete legt die Schwachstelle Mensch offen
First seen on t3n.de Jump to article: t3n.de/news/npm-supply-chain-angriff-phishing-malware-1706449/
-
Phishing schlägt 2FA: Massiver Angriff auf npm-Pakete legt die Schwachstelle Mensch offen
First seen on t3n.de Jump to article: t3n.de/news/npm-supply-chain-angriff-phishing-malware-1706449/
-
Supply chain attack targets npm, +2 Billion weekly npm downloads exposed
Multiple popular npm packages were compromised in a supply chain attack after a maintainer fell for a phishing email targeting 2FA credentials. A supply chain attack compromised multiple popular npm packages with 2B weekly downloads after a maintainer fell for a phishing email mimicking npm, targeting 2FA credentials. Threat actors targeted Josh Junon’s (Qix) to…
-
How One Phishing Email Compromised 18 npm Packages and Billions of Installs
On September 8, 2025, a single phishing email triggered one of npm’s most damaging supply chain attacks, compromising 18 popular JavaScript packages with over 2.6 billion weekly downloads. By tricking a maintainer into revealing credentials and 2FA codes, attackers injected crypto-stealing malware into widely used libraries. This blog unpacks how it happened, which packages were…
-
Axios Abuse and Salty 2FA Kits Fuel Advanced Microsoft 365 Phishing Attacks
Threat actors are abusing HTTP client tools like Axios in conjunction with Microsoft’s Direct Send feature to form a “highly efficient attack pipeline” in recent phishing campaigns, according to new findings from ReliaQuest.”Axios user agent activity surged 241% from June to August 2025, dwarfing the 85% growth of all other flagged user agents combined,” the…
-
Fake npm 2FA reset email led to compromise of popular code packages
Malicious versions of at least 18 widely used npm packages were uploaded to the npm Registry on Monday, following the compromise of their maintainer’s account. … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/09/09/npm-packages-supply-chain-compromise/
-
Fremde Anmeldungen an Microsoft Konten trotz 2FA Teil 2
Es ist ein kruder Sachverhalt, auf den ich mir noch keinen endgültigen Reim machen kann. Seit einigen Wochen finden Zugriffe auf Microsoft Konten durch Dritte statt, die im Aktivitätsverlauf zu sehen ist. Dabei haben die Nutzer die Zweifaktor-Authentifizierung für die … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/09/05/fremde-anmeldungen-an-microsoft-konten-trotz-2fa-teil-2/
-
Forscher warnen: Android-Malware klaut 2FA-Codes aus Google Authenticator
Eine Android-Malware namens Brokewell erweist sich als äußerst kompetent. Sie sammelt allerhand vertrauliche Daten – inklusive 2FA-Codes. First seen on golem.de Jump to article: www.golem.de/news/forscher-warnen-android-malware-klaut-2fa-codes-aus-google-authenticator-2509-199708.html
-
REWE Bonus der Punkteklau geht in die nächste Runde!
Tags: 2faMan hatte vollmundig angekündigt, die Accounts der REWE Bonus-Kunden mittels 2FA ordentlich schützen zu wollen. Doch das ist nicht passiert. First seen on tarnkappe.info Jump to article: tarnkappe.info/kommentar/rewe-bonus-der-punkteklau-geht-in-die-naechste-runde-320075.html
-
Ups, Password Manager-Schwachstelle in 11 Produkten ermöglichen Datenklau
Viele Nutzer verwalten ihre Kennwörter in Passwort-Managern. Sicherheitsforscher haben sich 11 beliebte Erweiterungen (1Password, LastPass, iCloud und weitere) genauer angesehen. Dabei wurden diese als anfällig identifiziert wodurch Anmeldedaten, 2FA-Codes und Kreditkartendaten gefährdet sind. Die Meldung wurde bereits vorige Woche … First seen on borncity.com Jump to article: www.borncity.com/blog/2025/08/24/ups-password-manager-schwachstelle-in-11-produkten-ermoeglichen-datenklau/
-
Major password managers can leak logins in clickjacking attacks
Six major password managers with tens of millions of users are currently vulnerable to unpatched clickjacking flaws that could allow attackers to steal account credentials, 2FA codes, and credit card details. First seen on bleepingcomputer.com Jump to article: www.bleepingcomputer.com/news/security/major-password-managers-can-leak-logins-in-clickjacking-attacks/
-
New Salty 2FA PhaaS Platform Targets Microsoft 365 Users to Steal Login Credentials
The majority of events globally are caused by phishing, which continues to be the most common vector for cyberattacks in the constantly changing world of cyber threats. The proliferation of affordable Phishing-as-a-Service (PhaaS) platforms such as Tycoon2FA, EvilProxy, and Sneaky2FA has exacerbated this issue, enabling even novice attackers to deploy sophisticated campaigns. These services are…
-
9 things CISOs need know about the dark web
Tags: 2fa, access, ai, attack, automation, backup, blockchain, botnet, breach, captcha, ceo, ciso, communications, corporate, credentials, crypto, cyber, cybercrime, cybersecurity, dark-web, data, data-breach, ddos, deep-fake, defense, detection, dns, exploit, extortion, finance, fraud, group, guide, hacking, identity, incident, incident response, infrastructure, intelligence, international, jobs, law, leak, lockbit, malicious, malware, marketplace, mfa, monitoring, network, open-source, phishing, privacy, ransomware, resilience, risk, russia, saas, scam, service, strategy, tactics, technology, threat, tool, training, vpn, vulnerability, zero-dayNew groups form after major marketplaces are disrupted: International takedown efforts damage infrastructure and curb cybercrime operations by disrupting larger operations, removing major players from the ecosystem and scattering user bases.However, the dark web is highly adaptive and sophisticated actors often maintain contingency plans, including mirrors, backups, and alternative forums, according to Edward Currie, associate…
-
Open Source: Proton bringt eigene Authenticator-App auf den Markt
Die quelloffene App ermöglicht sichere Log-ins per 2FA, eine verschlüsselte Synchronisation und ist ab sofort für alle gängigen Systeme verfügbar. First seen on golem.de Jump to article: www.golem.de/news/open-source-proton-bringt-eigene-authenticator-app-auf-den-markt-2508-198716.html
-
Android Malware-as-a-Service Gets Cheaper, Packing 2FA Interception
Malware-as-a-service (MaaS) platforms like PhantomOS and Nebula are democratizing Android device attacks because they provide pre-built, subscription-based malware kits for as little as $300 per month, marking a fundamental shift in the cybercrime scene. These services eliminate the need for coding expertise, providing cybercriminals with fully functional Android trojans equipped with advanced capabilities like two-factor…
-
Critical CitrixBleed 2 vulnerability has been under active exploit for weeks
Exploits allow hackers to bypass 2FA and commandeer vulnerable devices. First seen on arstechnica.com Jump to article: arstechnica.com/security/2025/07/critical-citrixbleed-2-vulnerability-has-been-under-active-exploit-for-weeks/
-
Qwizzserial Android Malware Masquerades as Legit Apps to Steal Banking Data and Intercept 2FA SMS
A new and alarming Android malware family, dubbed Qwizzserial, has emerged as a significant threat, particularly targeting users in Uzbekistan. Discovered by Group-IB in March 2024, this SMS stealer is designed to intercept two-factor authentication (2FA) codes and steal sensitive banking information, posing a severe risk to personal and financial security. Disguised as legitimate applications…
-
Aegis Authenticator: Free, open-source 2FA app for Android
Aegis Authenticator is an open-source 2FA app for Android that helps you manage login codes for your online accounts. The app features strong encryption and the ability to … First seen on helpnetsecurity.com Jump to article: www.helpnetsecurity.com/2025/07/07/aegis-2fa-authenticator-free-open-source-android/
-
APT42 impersonates cyber professionals to phish Israeli academics and journalists
Iran-linked APT42 targets Israeli experts with phishing attacks, posing as security professionals to steal email credentials and 2FA codes. Iran-linked group APT42 (aka Educated Manticore, Charming Kitten, and Mint Sandstorm) is targeting Israeli journalists, cybersecurity experts, and academics with phishing attacks, posing as security professionals to steal email credentials and 2FA codes, according to Check Point.…
-
BSI warnt: Immer weniger Menschen nutzen 2FA und sichere Passwörter
Eine neue Untersuchung des BSI zeigt einen bedenklichen Trend. Menschen verhalten sich im Netz trotz hoher Bedrohungslage immer unvorsichtiger. First seen on golem.de Jump to article: www.golem.de/news/bsi-warnt-immer-weniger-menschen-nutzen-2fa-und-sichere-passwoerter-2506-197389.html

