Tycoon 2FA and the Collapse of Legacy MFA
As seen in Bleeping Computer The Tycoon 2FA phishing kit signals a turning point in the battle...
By Kevin Surace | 3 minute read
CISA, NSA, NIST, and others agree. Legacy MFA no longer stops attacks. See why phishing proof, hardware based identity is now required.
Keep up to date with phishing and ransomware news.
Token will never sell, trade, or rent your data to any third parties.
By Kevin Surace | 2 minute read
As seen in Bleeping Computer The Tycoon 2FA phishing kit signals a turning point in the battle...
By Kevin Surace | 2 minute read
Ransomware attacks are rising faster than ever, and most share a common weakness — authentication...
By Kevin Surace | 3 minute read
A newly published academic paper introduces a new hacker tool called PixSnapping (download PDF), an...
By Kevin Surace | 4 minute read
A new study from UC San Diego Health should make every security leader stop and think. Researchers...
By Kevin Surace | 4 minute read
Last week, BleepingComputer reported on a clever new phishing campaign targeting Microsoft users....
By Kevin Surace | 4 minute read
How “ん” And Clever Domain Spoofing Are Bypassing Legacy MFA — And Why Only Token Shuts The Door In...
By Kevin Surace | 2 minute read
CSO Online just dropped a staggering stat: ransomware attacks have jumped 179% in the first half of...
By Kevin Surace | 2 minute read
CISA just dropped a bombshell. In its latest alert (dated July 25, 2025), the U.S. Cybersecurity...
By Kevin Surace | 2 minute read
Another day. Another preventable breach. This time it’s a major UK based insurance company, Allianz...