Discussion about this post

User's avatar
Interisle Consulting Group's avatar

The volumetric nature of the MFA attacks shows that old tricks fool new dogs. Here, you're stressing the human not the device or perimeter.

How many times have we seen cyberattackers use volumetric or stress attacks in the past 3 decades? Compare to how common testing whether these attacks will succeed against your organization or users.

Expand full comment
ANDREEA LEONTE's avatar

Excellent analysis, this deep dive into high-touch attacks really highlights a crucial and often overlooked cybersecurity threat, and thank you for shedding light on these insidious methods that exploit human trust and system vulnerabilties.

Expand full comment

No posts