⚠️ Phishing Alert: Sophisticated AiTM campaign targeting TikTok for Business accounts to bypass MFA and steal session cookies. Attackers use Google Storage URLs to evade detection. #Phishing #AiTM #TikTok
#Starkiller – #AitM reverzní proxy pro obcházení #MFA
Tak tohle je taky zrůdnost.
www.root.cz/clanky/postr...
FUCK AI and also Sony on this because what do you mean you are passing the cost off to the current consumer base to build your new stuff. How about you take that as a cost since im sure they have invested in AI and things that we never asked for. Might cancel sub cause of this tbh... #aitm
‘DKnife’ Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks Used since at least 2019, DKnife has been targeting the desktop, mobile, and IoT devices of Chinese users. The ...
#Malware #& #Threats #AitM #backdoor #China #DKnife #framework
Origin | Interest | Match
Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms reconbee.com/microsoft-fl...
#microsoft #multistage #AitM #phishing #BECattacks #cybersecurity #cyberattacks
Socket researchers uncover 27 npm packages used as phishing infrastructure targeting manufacturing and healthcare sectors.
Read More: www.security.land/npm-registry...
#SecurityLand #ThreatHorizon #Potatosecurity #Research #NPM #Phishing #CriticalInfrastructure #AiTM #Spearphishing #Dev
Socket researchers uncover 27 npm packages used as phishing infrastructure targeting manufacturing and healthcare sectors.
Read More: www.security.land/npm-registry...
#SecurityLand #ThreatHorizon #Cybersecurity #Research #NPM #Phishing #CriticalInfrastructure #AiTM #Spearphishing #Dev
Campagna phishing Calendly colpisce Google Workspace e Facebook Business con AiTM, BITB e job lure sofisticati per rubare credenziali e account ads.
#AiTM #Calendly #FacebookBusiness #GoogleWorkspace #malvertising
www.matricedigitale.it/2025/12/03/p...
Sneaky2FA has integrated Browser-in-the-Browser (BITB) tactics, generating fake Microsoft login windows that look identical to real OS/browser pop-ups.
#CyberSecurity #Phishing #BITB #AiTM #Microsoft365 #Sneaky2FA
Campagne phishing 2025 colpiscono ospiti hotel e dirigenti LinkedIn con domini falsi e attacchi AitM che rubano carte e credenziali MFA.
#AiTM #linkedin #Netcraft #PushSecurity
www.matricedigitale.it/2025/11/14/c...
📰 ConnectWise Perbaiki Celah Kritis pada Automate yang Bisa Disalahgunakan untuk Serangan AiTM
👉 Baca artikel lengkap di sini: ahmandonk.com/2025/10/18/connectwise-a...
#aitm #automate #connectwise #cve-2025-11492 #cve-2025-11493 #exploit #msp #on-premise #pat
VoidProxy is turning OTP MFA into wall art—AitM steals your session, not just your creds. Passkeys/FastPass held up in observed attacks. Are you still betting on SMS? 🔐🎭
Read: blog.alphahunt.io/voidproxy-ai...
#AlphaHunt #VoidProxy #AitM
VoidProxy phishing service bypasses MFA & SSO for M365/Google accounts. Okta Threat Intelligence reveals sophisticated AitM attacks.
#SecurityLand #ThreatHorizon #CyberSecurity #EnterpriseSecurity #AitM #Phishing #VoidProxy #Okta #ThreatIntelligence
Read More: www.security.land/voidproxy-em...
Full read: www.technadu.com/voidproxy-ph...
Has anyone seen similar AiTM toolkits in the wild? What detection rules worked for you?
#Phishing #AiTM #Cybersecurity #FIDO2 #WebAuthn
VoidProxy — new Phishing-as-a-Service — powers AiTM attacks vs Google & Microsoft: compromised ESPs → fake logins → MFA/session cookie theft.
Okta: “VoidProxy represents a mature, scalable, & evasive threat to traditional email security and authentication controls.”
#Phishing #AiTM #Cybersecurity
Adversary-in-the-Middle (AiTM) attacks are bypassing MFA and evading EDR systems, posing significant cybersecurity threats. Learn how to protect your organization. #CyberSecurity #AiTM #MFA #EDR Link: thedailytechfeed.com/adversary-in...
We're seeing a spike in AitM phishing that bypasses MFA via reverse proxies & stolen session cookies. Use phishing-resistant MFA (security keys/passkeys), device binding, shorter sessions, & URL checks. #HigherEdSecurity #AitM #MFA #RENISAC #highered #Phishing www.ren-isac.net/services/pub...
Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies reconbee.com/secret-blizz...
#secretblizzard #malware #malwareattack #AitM #moscowembassy #cyberattack
Secret Blizzard compromette server e traffico per spionaggio diplomatico, usando AiTM e malware come ApolloShadow.
#AiTM #ApolloShadow #cyberespionage #evidenza #fsb #malware #SecretBlizzard #Storm0156
www.matricedigitale.it/2025/08/01/s...
These sheets aim to assist SOC analysts in detecting and investigating #AitM #phishing compromises by offering context, technical details, infrastructure overview, detection opportunities, and more.
All are available in the PDF report and our Community GitHub.
A few weeks ago, we published our global analysis of Adversary-in-the-Middle #phishing threats, providing actionable intelligence on multiple #AitM phishing kits.
This report includes 11 sheets covering the most widespread #AitM phishing kits as of Q1 2025.
~Sekoia~
Report details the surge in Adversary-in-the-Middle (AitM) Phishing-as-a-Service, ranking Tycoon 2FA, Storm-1167, and NakedPages as top threats.
-
IOCs: Tycoon 2FA, Storm-1167, NakedPages
-
#AitM #PhaaS #ThreatIntel
Stay ahead of cyber threats! Learn how to defend against advanced Adversary-in-the-Middle (AiTM) attacks with our comprehensive guide. #CyberSecurity #AiTM #MFA #PhishingProtection Link: thedailytechfeed.com/defending-ag...
~Microsoft~
Attackers advance phishing (AiTM, device code, OAuth) for cloud identity theft; strong, phishing-resistant MFA is key for defense.
-
IOCs: Evilginx
-
#AiTM #IdentitySecurity #Phishing #ThreatIntel
Enhancing Browser-Based Phishing Prevention: Strategies and Solutions
#phishingprevention
#cybersecurity
#browsersecurity
#aitm
#zerotrust
🔍Leaked code reveals a token refresh script used in adversary-in-the-middle (AITM) attacks.
If you're not monitoring OAuth token activity, you're flying blind.
Stay vigilant.
#CyberSecurity #AITM #OAuth #infosec #MiTM
github.com/zolderio/AIT...