2022-09-24 at 4:29 pm
#38310

Participant
Thank you Tanyawat for sharing and the excellent ideas. It is interesting how the hacker got access once the developer successfully authenticated using multi-factor authentication! I think the system should detect if one user accessed the system from two different locations, especially at the same time.