Cyber Defense Magazine Features Token on Real Time Phishing Relay Attacks
Cyber Defense Magazine’s December issue includes a new article by Kevin Surace, Chair at Token,...
By Kevin Surace | 4 minute read
AI deepfakes are rising fast and make voice and video verification unreliable. Learn why device based biometrics are the only way to restore real identity trust.
Keep up to date with phishing and ransomware news.
Token will never sell, trade, or rent your data to any third parties.
By Kevin Surace | 1 minute read
Cyber Defense Magazine’s December issue includes a new article by Kevin Surace, Chair at Token,...
By Kevin Surace | 3 minute read
Another Preventable Breach Another week. Another preventable breach. This time it is Doordash,...
By Kevin Surace | 3 minute read
What do CISA, NSA, NIST, OMB, DHS, the Department of Defense, Gartner, Microsoft, Google, the FIDO...
By Kevin Surace | 2 minute read
As seen in Bleeping Computer The Tycoon 2FA phishing kit signals a turning point in the battle...
By Kevin Surace | 2 minute read
Ransomware attacks are rising faster than ever, and most share a common weakness — authentication...
By Kevin Surace | 3 minute read
A newly published academic paper introduces a new hacker tool called PixSnapping (download PDF), an...
By Kevin Surace | 4 minute read
A new study from UC San Diego Health should make every security leader stop and think. Researchers...
By Kevin Surace | 4 minute read
Last week, BleepingComputer reported on a clever new phishing campaign targeting Microsoft users....
By Kevin Surace | 4 minute read
How “ん” And Clever Domain Spoofing Are Bypassing Legacy MFA — And Why Only Token Shuts The Door In...