Aug. 26, 2023, 5:35 a.m. | /u/G_Force1

cybersecurity www.reddit.com

I'm evaluating moving to Passwordless and my company is using BYOD.
This will change my attack surface.
I'm trying to brainstorm all the possible attack vectors how someone could compromise a mobile and gain access to the authenticator app on the mobile, so I can come up with compensating and mitigating controls.
I looked at the MITRE ATT&CK mobile matrix and it only had 4 initial attack vectors, but it feels there would be many more attack vectors that a …

access app attack attack surface attack vectors authenticator authenticator app byod change compromise compromised cybersecurity device mobile mobile device moving passwordless

CyberSOC Technical Lead

@ Integrity360 | Sandyford, Dublin, Ireland

Cyber Security Strategy Consultant

@ Capco | New York City

Cyber Security Senior Consultant

@ Capco | Chicago, IL

Sr. Product Manager

@ MixMode | Remote, US

Security Compliance Strategist

@ Grab | Petaling Jaya, Malaysia

Cloud Security Architect, Lead

@ Booz Allen Hamilton | USA, VA, McLean (1500 Tysons McLean Dr)