Governance & Risk Management
,
Managed Security Service Provider (MSSP)
,
Multi-factor & Risk-based Authentication
Huntress’s Kyle Hanslovan Warns of MFA Bypass, Rogue Apps, Fake Device Enrollments
While multifactor authentication is considered the gold standard for identity management, attackers are now prioritizing session hijacking, rogue applications and device enrollment as methods to bypass even multi-factor authentication.
See Also: Identity and Access Management (IAM) Market Guide 2025
Hanslovan said attackers aim for persistence through malicious applications with seemingly legitimate functionality that are secretly used to siphon inbox data or maintain silent access, warned Huntress co-founder and CEO Kyle Hanslovan. And instead of relying on short-lived session tokens, Hanslovan said adversaries now try to register fake devices as trusted, enabling them to continually bypass MFA, retain long-term access and create a persistent backdoor (see: Huntress Lands $150M to Boost Posture, Recovery Capabilities).
“The most exciting cat-and-mouse tradecraft is currently happening no longer just on the endpoint,” Hanslovan said. “I would actually say it’s probably about 50% of the new hotness we’re actually seeing. ‘Hey, when I get into your identity, that allows that one-to-many action. How can I just absolutely wreck companies?'”
In this video interview with Information Security Media Group, Hanslovan also discussed:
- Unlocking underutilized tools for SMBs and mid-market companies;
- How managed SIEM compares to legacy SIEM and open-source tools;
- Skill-based, behavioral learning over traditional phishing simulation.
Prior to leading Huntress, Hanslovan served in the U.S. intelligence community, where he supported defensive and offensive cyber operations over the past decade. He actively participates in the ethical hacking community as a Black Hat conference trainer and STEM mentor. He served in the Maryland Air National Guard as a cyberwarfare operator.

