In the vast realm of cyber threats, a relatively newer but impactful method has emerged: Adversary In the Middle (AiTM) attacks. AiTM attacks have recently become more popular as organizations started to adopt MFA (Multi-Factor Authentication) in their environments since this technique offers an interesting way to evade the MFA security control.

Read the blog post (on nil.com).

Author: David Kasabji

‹ back