Campaign of the month

Campaign of the month

Learn about the latest cyber attacks and vulnerabilities in our monthly Campaigns.

Adversary in the Middle

Multifactor Authentication (MFA) is a popular and crucial security concept used by organizations worldwide. However, it is not invulnerable. A good example of threats to MFA are Adversary in the Middle (AiTM) attacks where adversaries bypass different user authentication techniques while remaining inconspicuous. These types of attacks are growing due to the increasing use of MFA and pose significant threats to individuals and organizations.

This Spotlight takes a deep dive into AiTM attacks, looking at how they’re constructed and how your organization can improve its readiness for them.