Get Started

The Cybersecurity Industry Has a Terrifying Problem — and Most CISOs Are Not Scared Enough

A new summary of the MITRE ATT&CK Enterprise Round 7 evaluation reveals that the highest protection score any tested vendor achieved was a mere 31 percent — meaning that 69% of attacks went entirely undetected by even the best-performing vendor in the field.

Kevin Surace
4 minute read

The FBI Just Said the Quiet Part Out Loud: Phishing-Resistant Authentication Is Job One

For years, security leaders have debated frameworks, tools, awareness programs, and incremental improvements to authentication workflows, while attackers continued to succeed through the same predictable path: logging in with stolen or relayed credentials rather than breaking through hardened infrastructure.

Kevin Surace
2 minute read

The Betterment Breach Should Have Ended the Debate. It Didn’t.

The Betterment breach should not have surprised anyone paying attention, and it certainly should have ended the long-running argument about whether modern MFA is sufficient against today’s attacks. Instead, it became just another entry in a growing list of incidents that organizations explain away as bad luck, poor training, or unfortunate human error.

Kevin Surace
3 minute read

Are Passwords Putting Your Business at Risk?

Attackers Are Not Hacking In. They Are Logging In. Ransomware, phishing, and credential-based attacks are hitting small and midsize businesses every day because attackers have learned the easiest trick in the book. They do not need to hack in. They simply log in with stolen credentials. The moment an employee enters a password or approves a code, the attacker has everything.

Kevin Surace
2 minute read

Your MFA Is Costing You Millions. It Doesn't Have To.

Most organizations still think of authentication as a cost of doing business.

Kevin Surace
1 minute read

AI Deepfakes Are Breaking Trust.

Device Based Biometrics Are the Only Way to Restore It.

Kevin Surace
2 minute read

Cyber Defense Magazine Features Token on Real Time Phishing Relay Attacks

Cyber Defense Magazine’s December issue includes a new article by Kevin Surace, Chair at Token, explaining why real time phishing relay attacks have become the most effective method for bypassing legacy MFA. These attacks are now driving many of the ransomware incidents and data breaches affecting organizations worldwide.

Kevin Surace
1 minute read

Doordash Was Breached for the Same Reason Everyone Is: Legacy MFA

Another Preventable Breach Another week. Another preventable breach. This time it is Doordash, confirming that a social engineering scam gave attackers access to sensitive customer and driver information. But the real story is not the scam. The real story is the failure behind it.

Kevin Surace
3 minute read

Everyone Who Matters Says Move to Phishing Resistant/Proof MFA Now

What do CISA, NSA, NIST, OMB, DHS, the Department of Defense, Gartner, Microsoft, Google, the FIDO Alliance, and the entire cyber insurance industry know that so many organizations are still ignoring?

Kevin Surace
2 minute read

Tycoon 2FA and the Collapse of Legacy MFA

As seen in Bleeping Computer The Tycoon 2FA phishing kit signals a turning point in the battle against account takeover. This is not a tool built for elite attackers. It is a plug-and-play phishing kit that anyone can deploy, with zero coding skill required. Tycoon automates everything: setup, fake login pages, reverse proxy servers, real-time credential capture, and full MFA relay.

Kevin Surace
1 minute read

Breaking the Ransomware Kill Chain: Why Legacy MFA is Failing

Ransomware attacks are rising faster than ever, and most share a common weakness — authentication that trusts too much. In his session from the recent Security Buzz webinar, Kevin Surace, Chairman of Token, explains why MFA apps and codes have become attackers’ favorite weapon instead of a defense.

Kevin Surace
1 minute read
PixSnapping - steals screen pixels from Android devices

PixSnapping: The Android Exploit That Turns 2FA Into an Open Book—and Why Token Stops It Cold

A newly published academic paper introduces a new hacker tool called PixSnapping (download PDF), an advanced attack that can steal screen pixels from Android devices and reconstruct sensitive data like 2FA codes in real time. The research demonstrates that an attacker-controlled app can capture or infer the digits displayed by authenticator apps such as Google Authenticator in under thirty seconds.

Kevin Surace
2 minute read
1 2 3

Stay Identity Assured

Subscribe to The Assured Identity Brief for sharp insights on identity security, authentication, and the threats security leaders must stay ahead of.