fido2 (3)

31084849074?profile=RESIZE_400xRecently, the Federal Bureau of Investigation (FBI) released Operation Winter Shield.   This document outlines critical actions organizations can take to enhance resilience against cyber intrusions, based on FBI recommendations.

Phish-Resistant Authentication:

  • Implement phish-resistant methods like FIDO2 security keys for high-impact accounts and critical systems.
  • Require number-matching and domain display for authenticator apps, avoiding push-only approvals.
  • Eliminate SMS-based multi-factor au

13746979083?profile=RESIZE_400xAccording to CrowdStrike's 2025 Threat Hunting Report, 81% of intrusions were malware free.  That confirms that attackers aren't dropping files anymore, they are logging in.  That's a big change in Tactics, Techniques, and Procedures for 2025.

In 2025, threat hunting is evolving to address increasingly sophisticated adversaries who are moving away from traditional malware-based attacks.  Instead, attackers are leveraging legitimate credentials to gain access and remain undetected, making identit

12304372460?profile=RESIZE_400xWith an estimated damage of US$10.5 trillion annually from cyberattacks projected by 2025, a significant surge from 2015 levels, the demand for stronger cybersecurity methods has never been more pressing.  According to Geoff Schomburgk, the Regional Vice President, Asia Pacific & Japan (APJ) at Yubico, a leading provider of phishing-resistant authentication hardware solutions, this escalating threat is prompting the need to steer away from traditional, insecure password mechanisms.  "Passwords,