"The implied attack assumes that MFA is not used or has been bypassed. If you can get access to download the encrypted database, like what happens with most password databases that are stolen, you don’t need to deal with MFA (or those pesky password lockouts) when making attempts thereafter."hivesystems.com/blog/are-your-…
Passwords that felt secure a year ago might not hold up in 2025. Hive Systems’ updated Password Table reveals just how much faster hackers can break into accounts today.
Corey Neskey (Hive Systems)
tomgrzybow
in reply to Khurram Wadee • • •tomgrzybow
in reply to Khurram Wadee • • •Khurram Wadee
in reply to Khurram Wadee • • •tomgrzybow
in reply to Khurram Wadee • • •Brad Koehn ☑️
in reply to Khurram Wadee • • •I’m really happy with YubiKeys (plural) as places to keep passkeys, ssh keys, and the like. As long as I credentials on two or more of them, I know I cannot screw it up: I cannot be tricked into sharing them, I cannot be fooled into entering them on the wrong website, or exposing them through a misconfiguration or hack. That peace of mind is worth a lot.
That said, for passwords I use 1Password, and I keep 2FA on YubiKeys whenever possible.