New Blog Post: Detecting Malicious Remote Authentication Requests