Hacking 2FA: 5 basic attack methods explained

Probe It référencé cybermalveillance.gouv

Multi-factor authentication (MFA) continues to embody both the best and worst of business IT security practice. As Roger Grimes wrote in this article about two-factor hacks three years ago, when MFA is done well it can be effective, but when IT managers take shortcuts it can be a disaster.

Source : Hacking 2FA: 5 basic attack methods explained