While multi-factor authentication (MFA) is designed to amp up the security of IT environments, attackers have managed to design cyberattack techniques that compromise MFA using a combination of social engineering and technical manipulation. This e-book notes some of the MFA hacking methods while also going through ways to thwart them.