Deepfake voice attacks bypass multi-factor authentication by exploiting identity verification processes rather than breaking authentication controls.... Read more
Featured article |
Cyber Security
7 ways deepfake voice attacks bypass MFA (and how to respond)
Author
As Head of Security Consulting at The Missing Link, I lead offensive security engagements focused on red teaming, penetration testing, and adversary simulation. With a background in software development and systems engineering, I help organisations uncover real-world vulnerabilities and strengthen their defences. Outside of work, I’m usually experimenting with firmware or pulling apart how systems behave under pressure. If it runs code, I’m interested in how it works and how it can be broken.
Our Authors
Cyber Security
7 ways deepfake voice attacks bypass MFA (and how to respond)