Syndicated Blog

HYPR Blog
Get the latest insights on passwordless authentication and identity security in HYPR’s blog. Discover recent attacks, and learn more about best practices.
Evilginx Attack Demo: How Hackers Bypass Microsoft MFA

How to Prevent Evilginx Attacks Targeting Entra ID

Attackers continually refine their methods to compromise user identities and gain unauthorized access to sensitive systems. One particularly insidious threat is Evilginx, a phishing framework designed to bypass traditional multi-factor authentication (MFA) ...
Fake IT Workers: How HYPR Stopped a Fraudulent Hire

Fake IT Workers: How HYPR Stopped a Fraudulent Hire

Since 2022, the FBI and other agencies have been sounding the alarm about North Koreans posing as US or other non-North Korean based IT workers and infiltrating companies. In July, security firm ...
Microsoft’s SFI Offers a Blueprint for Identity Security

Microsoft’s SFI Offers a Blueprint for Identity Security

A few weeks ago, Microsoft issued its first Secure Future Initiative Progress Report. Launched in November 2023, the Secure Future Initiative (SFI) is Microsoft’s acknowledgement that it needs to drastically improve its ...
What Is Phishing-Resistant MFA and How Does it Work?

What Is Phishing-Resistant MFA and How Does it Work?

Phishing, despite its somewhat innocuous name, remains one of the foremost security threats facing businesses today. Improved awareness by the public and controls such as multi-factor authentication (MFA) have failed to stem ...
Going Passwordless: 6 Tips to Navigate Passkey Adoption

Going Passwordless: 6 Tips to Navigate Passkey Adoption

By now, most of us realize that passkeys and passwordless authentication beat passwords in nearly every way — they’re more secure, resist phishing and theft, and eliminate the need to remember and ...
HYPR and Microsoft Partner on Entra FIDO2 Provisioning APIs

HYPR and Microsoft Partner on Entra FIDO2 Provisioning APIs

Yesterday at the Black Hat conference, Microsoft announced the public preview of Entra FIDO2 provisioning APIs. HYPR worked closely with Microsoft on these critical enhancements, which make it easier for Entra customers ...
How To Improve Okta Security

How To Improve Okta Security

Okta is one of the most widely-used single sign-on (SSO) providers, making authentication more convenient for organizations and their users alike. We at HYPR use Okta. This convenience, however, comes at a ...
Identity Evolved: The Rise of Multi-Factor Verification

Identity Evolved: The Rise of Multi-Factor Verification

Identity verification has traditionally played an important but limited role in the world of identity and access management (IAM). To establish someone’s identity, you need to prove that they are who they ...
Key Takeaways From Horizon3.ai’s Analysis of an Entra ID Compromise

Key Takeaways From Horizon3.ai’s Analysis of an Entra ID Compromise

As enterprises shift from on-premises to cloud systems, hybrid cloud solutions have become essential for optimizing performance, scalability, and user ease. However, risks arise when poorly configured environments connect to the cloud ...
What’s the State of Identity Assurance Today? Recap of the 2024 Report

What’s the State of Identity Assurance Today? Recap of the 2024 Report

Identity security is at a crossroads. As digital transformation accelerates, organizations are increasingly vulnerable to identity-focused attacks, which are now the primary entry point for cybercriminals. The incorporation of artificial intelligence (AI) ...