Multi-factor authentication security testing and possible bypasses This post describes 11 ways of bypassing MFA.
How I hacked cryptocurrency-related companies A tale of 7 vulnerabilities on services related to the cryptocurrency