Yubico, IBM, and Auth0 partner to secure agentic AI with human oversight. Learn more.

Skip to content
  • Investors
  • Contact Sales
  • Partners
  • Support
Yubico Logo
0

All YubiKeys Compare YubiKeys What is a YubiKey? Set up your YubiKey
YubiKey 5 Series
Learn More Buy
YubiKey 5 FIPS Series
Learn more Buy
YubiKey Bio Series
Learn more Buy
Security Key Series
Learn more Buy
YubiHSM 2 & YubiHSM 2 FIPS
Learn more Buy
Accessories
Buy

  • Thank you

    Thank you for your interest in our

    Secure it Forward program.

    Our team is reviewing your submission and will follow-up soon. We’re looking forward to learning more about your organization and appreciate your patience as we determine the best way we can help support your team.

    • The passkey spectrum: Importance of user choice in digital security journeys This post is co-authored by Patryk Les, Principal Product Designer, UX, and Luke Walker, Director – Developer Program, at Yubico A banking customer buys a hardware security key to protect their account. They open the bank’s security settings, choose ‘Create a passkey’, and expect to use the key they bought for exactly this purpose. But […] Read more
    • OpenAI’s Advanced Account Security program: Top 5 things Codex users need to know The industry often speaks about “moving at the speed of AI” – a concept that presents two conflicting sides of the same coin. While global AI adoption empowers defenders to identify and remediate vulnerabilities faster than ever, it simultaneously arms attackers with sophisticated tools to exploit digital infrastructure. As AI transitions from simple chatbots to […] Read more
    • Yubico Logo YSA-2026-02 Security Advisory YSA-2026-02 – webauthn-server-core User Impersonation Published Date: 2026-05-12 Tracking IDs: YSA-2026-02 CVE: CVE-2026-46419   CVSS: 7.7 Summary A security update is available for the Yubico open-source software project webauthn-server-core to resolve a user impersonation vulnerability. No Yubico hardware is affected. In specific implementations, an attacker that has an existing account with a relying party […] Read more

Join our newsletter

Distributed monthly, it includes product news, new applications, case studies, events, and discounts. Unsubscribe anytime.

By subscribing you agree to our Privacy Policy.
Subscribe
About us The team Innovation history Secure it forward program Yubico blog Press Room Events Partner programs Careers Investors
YubiKey 5 Series YubiKey 5 FIPS Series Security Key Series YubiKey Bio Series YubiHSM 2 & YubiHSM 2 FIPS Accessories Yubico Authenticator Computer login tools Software Development kits
YubiKey as a Service YubiEnterprise Delivery Contact Sales Yubico Enrollment Suite Professional Services
All Solutions Initiatives Industries Use cases Technologies
Setting up your YubiKey Find the right YubiKey Works with YubiKey Catalog What is a YubiKey Case studies Webinars White papers and reports Documentation All downloads Support Home Support services Buying and shipping information
LinkedIn YouTube Instagram X Facebook
  • Sitemap
  • Cookies
  • Legal
  • Privacy
  • Terms of use
  • Accessibility
  • Legal Imprint