Like all security controls, MFA itself is vulnerable to attacks. Man in the middle, prompt bombing, SIM swaps, social engineering and session hijacking are a few examples of attacks against MFA implementations. In this session, we will discuss common threats and ways to counter them.