This article has been indexed from Cybersecurity Insiders
This blog was written by an independent guest blogger. In March 2021, cybersecurity researcher Le Xuan Tuyen discovered a security bug in Microsoft Exchange Server. The vulnerability, dubbed ProxyToken, lets attackers bypass the authentication process to access victims’ emails and configure their mailboxes. Normally, Exchange uses two sites, a front and back end, to authenticate […]
The post How to better secure user authentication protocols appeared first on Cybersecurity Insiders.
Read the original article: How to better secure user authentication protocols