Get Started

Clorox is Suing for $380M Over a Password. Seriously. WTF?

Kevin Surace
1 minute read
Identity-Based Attacks

What’s Behind the Recent Rise in Identity-Based Attacks?

BetaNews recently asked this question in a detailed Q&A. The answers should concern every enterprise leader. The rise of identity-based attacks isn’t just a trend; it’s now the primary way cybercriminals get in. Attackers are no longer brute-forcing firewalls or cracking encryption. They’re simply logging in as you.

Kevin Surace
1 minute read

Chasing Hackers Inside Your Network is Pointless if You Stop Them at the Door

Microsoft’s recent advisory on Octo Tempest should make every CISO lose sleep. This group isn’t just hacking software vulnerabilities. They’re hacking people, impersonating employees, tricking help desks into resetting passwords, stealing session cookies, and bypassing legacy MFA with social engineering.

Kevin Surace
1 minute read

AI Makes Phishing Instant. Legacy MFA is Now Obsolete.

Generative AI just made phishing so easy that anyone can do it—and do it convincingly. According to Axios, researchers demonstrated that in just 30 seconds, a simple natural-language prompt was all it took to build a pixel-perfect spoofed login site. No coding. No technical skills. Just type “build a copy of the website login.okta.com,” and a convincing clone appears, ready to trick anyone into handing over credentials.

Kevin Surace
2 minute read
Stolen credentials are the new front door

Stolen Credentials Are the New Front Door. Token Deadbolts It Shut.

The cybersecurity world has a new consensus: credentials are no longer a weak point—they’re the entire attack surface.

Kevin Surace
2 minute read
Scattered Spider is targeting Fortune 500 firms

Scattered Spider Is Hunting the Fortune 500 — And Most MFA Still Won’t Stop Them

A new report from CyberCube just confirmed what many of us in cybersecurity have long suspected: Scattered Spider is targeting hundreds of major enterprises with precision. Nearly 300 companies—each with over $500 million in annual revenue—have been flagged as high-risk. Why? Because they’re still running the same legacy technologies this threat group exploits with shocking ease.

Kevin Surace
1 minute read
Scattered Spider 500+ domains

Scattered Spider’s Expanding Web: 500+ Phishing Domains and One Simple Way to Stop Them

If your organization still relies on passwords, SMS codes, or authenticator apps to protect employee logins, it’s not a matter of if you’ll be breached—it’s when.

Kevin Surace
3 minute read
The MFA your trust is lying to you

The MFA You Trust Is Lying to You

As seen in Bleeping Computer

Kevin Surace
< 1 minute read
What are passkeys? Passkeys vs Token

Passkeys vs. Token: Why Secure Biometric Hardware Is the Future of Passwordless Security

The shift to a passwordless future is well underway. Tech giants like Apple, Google, and Microsoft have embraced passkeys, and for good reason. Passwords have long been the weakest link in cybersecurity—easily guessed, phished, stolen, or reused across accounts. Passkeys represent a serious improvement. They’re phishing-resistant, user-friendly, and eliminate the need to remember or manage credentials.

Kevin Surace
4 minute read
Ingram Micro Down. Ransomed.

Ingram Micro Down. Ransomed. Why? Legacy MFA. Again.

Token Would Have Stopped This Cold. Another week, another breach. This time it’s Ingram Micro, one of the largest tech distributors on the planet. Systems down for days. Operations halted. Now they’re staring down a ransomware demand, possibly for millions.

Kevin Surace
2 minute read
Amazon's email to customers

Amazon's Email to Customers and Why it Won't Protect Anyone

Amazon just sent out a warning about phishing emails targeting Prime members—scammers spoofing login pages and tricking users into handing over their credentials. Sound familiar?

Kevin Surace
1 minute read
Qantas breach could have been avoided

How Token Would Have Stopped the Qantas Breach Cold

Last week, Qantas joined a growing list of high-profile companies breached by Scattered Spider, a sophisticated threat group known for exploiting human error and weak authentication systems—not by hacking through firewalls, but by walking right through the front door.

Kevin Surace
2 minute read

Stay Identity Assured

Subscribe to The Assured Identity Brief for sharp insights on identity security, authentication, and the threats security leaders must stay ahead of.