July 21, 2021

Consent phishing: the emerging phishing technique that can bypass 2FA

I wrote a blog post about how consent phishing is being used to bypass 2FA and allow attackers to maintain stealthy persistent access without even needing a users credentials – [https://pushsecurity.com/s?c=consent-phishing](https://pushsecurity.com/s?c=consent-phishing-u)

Full disclosure, I work for Push but thought you might find the content interesting.

Leave a Reply

Your email address will not be published. Required fields are marked *

Note: By filling this form and submitting your commen, you acknowledge, agree and comply with our terms of service. In addition you acknowledge that you are willingly sharing your email address with AiOWikis and you might receive notification emails from AiOWikis for comment notifications. AiOWiksi guarantees that your email address WILL NOT be used for advertisement or email marketting purposes.

This site uses Akismet to reduce spam. Learn how your comment data is processed.