Adversary-in-the-middle (AiTM) phishing is capable of circumventing multifactor authentication (MFA) through reverse-proxy functionality.
Dig into an example of a real-life attack and explore how to mitigate these types of attacks.
#AiTM #mfa #2fa #multifactorauthentication #azure #azuread #azureactivedirectory #defender #xdr #microsoft365defender #microsoft #microsoftsecurity #microsoft365 #conditionalaccess #antiphishing #sentinel #microsoftsentinel #identity #identityprotection #reverseproxy #cybersecurity #iam #iag #ueba #credentialtheft #phishing #soc #securityanalyst #monitoring #risk
#AiTM #mfa #2fa #multifactorauthentication #azure #azuread #azureactivedirectory #defender #xdr #microsoft365defender #microsoft #microsoftsecurity #microsoft365 #conditionalaccess #antiphishing #sentinel #MicrosoftSentinel #identity #identityprotection #reverseproxy #cybersecurity #iam #iag #ueba #credentialtheft #phishing #soc #SecurityAnalyst #monitoring #risk
#phishing #antiphishing #infosec
Thanks to the pandemic, in 2022 we went from about 250 employees working from home to about 2,000.
How do you make WFH employees feel included?
What if, when there are Town Hall type meetings, you send all the WFH employees a gift card for Door Dash, Grubhub, or Uber Eats?
What if at least half of those employees report it as phishing every time you do it?
Did we train them too well?
#phishing #antiphishing #infosec
C'est bien! avec des potentialités évidentes dans le domaine. (couplé par ex. dans l'appréciation avec une investigation automatique des détails techniques de connexion et affichage) #chatGPT #antiphishing