Best practice when accessing services within the cloud is to use Multi-Factor Authentication (MFA) as a method to authenticate yourself. One of the methods hackers are using to bypass this guardrail is an attack called MFA bombing, manipulate and annoy the target user into approving MFA prompts. In this video, we will review the attack and share how Authomize help organization to detect and respond to the attack.
If you like to secure your organization against identity-based attacks, learn more about our ITDR solution.