Advertisement · 728 × 90
#
Hashtag
#AitM
Advertisement · 728 × 90
Sophisticated AiTM Phishing Campaign Targets TikTok for Business Accounts to Bypass MFA A sophisticated adversary-in-the-middle (AiTM) phishing campaign is actively targeting TikTok for Business accounts to steal credentials, session cookies, and bypass MFA.

⚠️ Phishing Alert: Sophisticated AiTM campaign targeting TikTok for Business accounts to bypass MFA and steal session cookies. Attackers use Google Storage URLs to evade detection. #Phishing #AiTM #TikTok

0 0 0 0
Preview
Postřehy z bezpečnosti: Starkiller – AitM reverzní proxy pro obcházení MFA - Root.cz Podíváme se na novou sadu nástrojů usnadňující útočníkům obcházení MFA, na aktivitu APT28 zneužívající zero-day v MSHTML, na to, jak si poradila AI…

#Starkiller#AitM reverzní proxy pro obcházení #MFA

Tak tohle je taky zrůdnost.

www.root.cz/clanky/postr...

0 0 0 0
Preview
As Sony considers more PS5 price hikes, we've officially entered a terrible new era Switch 2, Xbox Series X, and PlayStation 5 users will be wrung dry by gaming companies in an effort to mitigate the rising memory crisis caused by AI

FUCK AI and also Sony on this because what do you mean you are passing the cost off to the current consumer base to build your new stuff. How about you take that as a cost since im sure they have invested in AI and things that we never asked for. Might cancel sub cause of this tbh... #aitm

4 0 1 0
Awakari App

‘DKnife’ Implant Used by Chinese Threat Actor for Adversary-in-the-Middle Attacks Used since at least 2019, DKnife has been targeting the desktop, mobile, and IoT devices of Chinese users. The ...

#Malware #& #Threats #AitM #backdoor #China #DKnife #framework

Origin | Interest | Match

0 0 0 0
Preview
Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms after the initial penetration read more about Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms

Microsoft Flags Multi-Stage AitM Phishing and BEC Attacks Targeting Energy Firms reconbee.com/microsoft-fl...

#microsoft #multistage #AitM #phishing #BECattacks #cybersecurity #cyberattacks

0 0 0 0

Socket researchers uncover 27 npm packages used as phishing infrastructure targeting manufacturing and healthcare sectors.

Read More: www.security.land/npm-registry...

#SecurityLand #ThreatHorizon #Potatosecurity #Research #NPM #Phishing #CriticalInfrastructure #AiTM #Spearphishing #Dev

1 0 0 0
Preview
npm Registry Abused for Targeted Spearphishing Campaign A five-month spearphishing operation has transformed the npm registry into a durable hosting layer for AiTM credential theft, specifically targeting sales teams in the manufacturing and healthcare ind...

Socket researchers uncover 27 npm packages used as phishing infrastructure targeting manufacturing and healthcare sectors.

Read More: www.security.land/npm-registry...

#SecurityLand #ThreatHorizon #Cybersecurity #Research #NPM #Phishing #CriticalInfrastructure #AiTM #Spearphishing #Dev

5 0 0 0
Post image

Campagna phishing Calendly colpisce Google Workspace e Facebook Business con AiTM, BITB e job lure sofisticati per rubare credenziali e account ads.

#AiTM #Calendly #FacebookBusiness #GoogleWorkspace #malvertising
www.matricedigitale.it/2025/12/03/p...

0 0 0 0
Post image

Sneaky2FA has integrated Browser-in-the-Browser (BITB) tactics, generating fake Microsoft login windows that look identical to real OS/browser pop-ups.

#CyberSecurity #Phishing #BITB #AiTM #Microsoft365 #Sneaky2FA

0 0 1 0
Post image

Campagne phishing 2025 colpiscono ospiti hotel e dirigenti LinkedIn con domini falsi e attacchi AitM che rubano carte e credenziali MFA.

#AiTM #linkedin #Netcraft #PushSecurity
www.matricedigitale.it/2025/11/14/c...

0 0 0 0

📰 ConnectWise Perbaiki Celah Kritis pada Automate yang Bisa Disalahgunakan untuk Serangan AiTM

👉 Baca artikel lengkap di sini: ahmandonk.com/2025/10/18/connectwise-a...

#aitm #automate #connectwise #cve-2025-11492 #cve-2025-11493 #exploit #msp #on-premise #pat

0 0 0 0
Post image

VoidProxy is turning OTP MFA into wall art—AitM steals your session, not just your creds. Passkeys/FastPass held up in observed attacks. Are you still betting on SMS? 🔐🎭

Read: blog.alphahunt.io/voidproxy-ai...

#AlphaHunt #VoidProxy #AitM

0 0 0 0
Preview
VoidProxy Emerges as Advanced Phishing-as-a-Service Platform Targeting Enterprise Authentication Systems | Security Land VoidProxy phishing platform bypasses MFA and SSO security, targeting Microsoft 365 and Google accounts through sophisticated AitM attacks.

VoidProxy phishing service bypasses MFA & SSO for M365/Google accounts. Okta Threat Intelligence reveals sophisticated AitM attacks.

#SecurityLand #ThreatHorizon #CyberSecurity #EnterpriseSecurity #AitM #Phishing #VoidProxy #Okta #ThreatIntelligence

Read More: www.security.land/voidproxy-em...

1 0 0 0
Preview
VoidProxy Phishing-as-a-Service Operation Enables AiTM Attacks Targeting Google, Microsoft Accounts Okta Threat Intelligence has uncovered VoidProxy, a phishing-as-a-service (PhaaS) platform using AiTM attacks to steal credentials and session tokens.

Full read: www.technadu.com/voidproxy-ph...

Has anyone seen similar AiTM toolkits in the wild? What detection rules worked for you?
#Phishing #AiTM #Cybersecurity #FIDO2 #WebAuthn

0 0 0 0
Post image

VoidProxy — new Phishing-as-a-Service — powers AiTM attacks vs Google & Microsoft: compromised ESPs → fake logins → MFA/session cookie theft.

Okta: “VoidProxy represents a mature, scalable, & evasive threat to traditional email security and authentication controls.”

#Phishing #AiTM #Cybersecurity

0 0 1 0
Post image

Adversary-in-the-Middle (AiTM) attacks are bypassing MFA and evading EDR systems, posing significant cybersecurity threats. Learn how to protect your organization. #CyberSecurity #AiTM #MFA #EDR Link: thedailytechfeed.com/adversary-in...

1 0 0 0
Post image

We're seeing a spike in AitM phishing that bypasses MFA via reverse proxies & stolen session cookies. Use phishing-resistant MFA (security keys/passkeys), device binding, shorter sessions, & URL checks. #HigherEdSecurity #AitM #MFA #RENISAC #highered #Phishing www.ren-isac.net/services/pub...

0 1 0 0
Preview
Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies community also keeps tabs on Secret Blizzard read more about Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies

Secret Blizzard Deploys Malware in ISP-Level AitM Attacks on Moscow Embassies reconbee.com/secret-blizz...

#secretblizzard #malware #malwareattack #AitM #moscowembassy #cyberattack

0 0 0 0
Post image

Secret Blizzard compromette server e traffico per spionaggio diplomatico, usando AiTM e malware come ApolloShadow.

#AiTM #ApolloShadow #cyberespionage #evidenza #fsb #malware #SecretBlizzard #Storm0156
www.matricedigitale.it/2025/08/01/s...

0 0 0 0
Post image

These sheets aim to assist SOC analysts in detecting and investigating #AitM #phishing compromises by offering context, technical details, infrastructure overview, detection opportunities, and more.

All are available in the PDF report and our Community GitHub.

1 2 1 0
Post image

A few weeks ago, we published our global analysis of Adversary-in-the-Middle #phishing threats, providing actionable intelligence on multiple #AitM phishing kits.

This report includes 11 sheets covering the most widespread #AitM phishing kits as of Q1 2025.

5 2 1 0
Rise of AitM Phishing-as-a-Service

~Sekoia~
Report details the surge in Adversary-in-the-Middle (AitM) Phishing-as-a-Service, ranking Tycoon 2FA, Storm-1167, and NakedPages as top threats.
-
IOCs: Tycoon 2FA, Storm-1167, NakedPages
-
#AitM #PhaaS #ThreatIntel

0 0 0 0
Post image

Stay ahead of cyber threats! Learn how to defend against advanced Adversary-in-the-Middle (AiTM) attacks with our comprehensive guide. #CyberSecurity #AiTM #MFA #PhishingProtection Link: thedailytechfeed.com/defending-ag...

0 0 0 0
Evolving Identity Attack Techniques & Defenses

~Microsoft~
Attackers advance phishing (AiTM, device code, OAuth) for cloud identity theft; strong, phishing-resistant MFA is key for defense.
-
IOCs: Evilginx
-
#AiTM #IdentitySecurity #Phishing #ThreatIntel

0 0 0 0
Preview
Enhancing Browser-Based Phishing Prevention: Strategies and Solutions | The DefendOps Diaries Explore advanced strategies to prevent browser-based phishing attacks and enhance cybersecurity defenses.

Enhancing Browser-Based Phishing Prevention: Strategies and Solutions

#phishingprevention
#cybersecurity
#browsersecurity
#aitm
#zerotrust

0 0 0 0

🔍Leaked code reveals a token refresh script used in adversary-in-the-middle (AITM) attacks.

If you're not monitoring OAuth token activity, you're flying blind.

Stay vigilant.

#CyberSecurity #AITM #OAuth #infosec #MiTM

github.com/zolderio/AIT...

0 0 0 0