tag
AitM
12 posts
- Welcome to BlackFile: Inside a Vishing Extortion Operation
- Breaking the code: Multi-stage ‘code of conduct’ phishing campaign leads to AiTM token compromise
- Defending Against CORDIAL SPIDER and SNARKY SPIDER with Falcon Shield
- Email threat landscape: Q1 2026 trends and insights
- Token Bingo: Don’t Let Your Code be the Winner
- Investigating Storm-2755: “Payroll pirate” attacks targeting Canadian employees
- SOHO router compromise leads to DNS hijacking and adversary-in-the-middle attacks
- APT28 exploit routers to enable DNS hijacking operations
- New widespread EvilTokens kit: device code phishing as-a-service – Part 1
- Tycoon2FA Phishing-as-a-Service Platform Persists Following Takedown
- Inside Tycoon2FA: How a leading AiTM phishing kit operated at scale
- Europol, Microsoft, TrendAI™ and Collaborators Halt Tycoon 2FA Operations