Deep-Dive Analysis of Multi-Factor Authentication Request Generation Attacks

With so many phishing attacks targeting credentials, more organizations are realizing they need multi-factor authentication (MFA) for users with access to critical data.

In this webinar, four-time Microsoft MVP Nick Cavalanci, along with LogRhythm Threat Research Engineers, Sally Vincent and Dan Kaiser, discuss:

  • Real-world examples of MFA prompt bombing
  • Mitigation strategies to thwart this kind of attack

Sally and Dan guide you through an analysis of MFA product logs relevant to detect unusual authentication activity. Throughout their threat hunting example, you will observe real-time detection of multi-factor authentication request generation using LogRhythm’s dashboarding, investigation, and real-time analytics capability.

Watch this live webinar to gain more insight into MFA prompt bombing and mitigation strategies!