Multi-factor authentication security testing and possible bypasses This post contains 11 methods of MFA bypassing
How I hacked cryptocurrency-related companies A tale of 7 vulnerabilities on services related to the cryptocurrency