How to better secure user authentication protocols

This article has been indexed from Cybersecurity Insiders

This blog was written by an independent guest blogger. In March 2021, cybersecurity researcher Le Xuan Tuyen discovered a security bug in Microsoft Exchange Server. The vulnerability, dubbed ProxyToken, lets attackers bypass the authentication process to access victims’ emails and configure their mailboxes. Normally, Exchange uses two sites, a front and back end, to authenticate […]

The post How to better secure user authentication protocols appeared first on Cybersecurity Insiders.

Read the original article: How to better secure user authentication protocols