How Token Would Have Stopped the Qantas Breach Cold
Last week, Qantas joined a growing list of high-profile companies breached by Scattered Spider, a...
By Kevin Surace | 2 minute read
Amazon warns about phishing, but legacy 2SV like authenticator apps still fall short. Learn why phishing-proof MFA is the solution that actually works.
Keep up to date with phishing and ransomware news.
Token will never sell, trade, or rent your data to any third parties.
By Kevin Surace | 3 minute read
Last week, Qantas joined a growing list of high-profile companies breached by Scattered Spider, a...
By Kevin Surace | 3 minute read
When Hawaiian Airlines confirmed a recent cyberattack that disrupted its internal systems, it...
By Kevin Surace | 4 minute read
The Aflac breach last week wasn’t pulled off by elite hackers—it was enabled by the same outdated...
By Token | 15 minute read
Every moment of every day, a quiet army of IT professionals, CISOs, and MSSPs are working...
By Token | 2 minute read
What is Legacy MFA? Legacy MFA are solutions such as OTP over SMS and OTP via mobile apps that are...
By Token | 5 minute read
As cybersecurity threats evolve, enterprises must stay ahead with advanced solutions. Our report,...
By Token | 5 minute read
In today’s digital landscape, identity security is not just a concern—it’s a critical defense...
By John Gunn, CEO, Token | 12 minute read
The cybersecurity landscape has recently seen a staggering surge in ransomware payments, with a...
By Kevin Surace | 4 minute read
With the rise of AI-generated deepfakes, which are becoming more convincing and widespread in video...